Service computing is growing popular thanks to the cloud computing technology. However, the behavior of cloud services is complicated as they involve a large number of components and complex interactions between them....
详细信息
ISBN:
(纸本)9798350395716;9798350395709
Service computing is growing popular thanks to the cloud computing technology. However, the behavior of cloud services is complicated as they involve a large number of components and complex interactions between them. It is highly helpful for service users and providers to well understand the service behavior if they can exhaustively explore potential component interactions and service scenarios. This paper discusses the challenges associated with this and an approach to achieving this goal. This paper also reports our progress of exploring the use of symbolic execution for service analysis, together with our research plan.
Bitcoin was released in 2008 as an electronic peer-to-peer payment system. The aim was to enable financial transactions in an anonymous manner between participating parties. However, Bitcoin is considered a pseudonymo...
详细信息
ISBN:
(纸本)9798350328127
Bitcoin was released in 2008 as an electronic peer-to-peer payment system. The aim was to enable financial transactions in an anonymous manner between participating parties. However, Bitcoin is considered a pseudonymous network rather than anonymous, as the identity of the address owner is unknown, but every transaction is permanently stored on the Bitcoin blockchain and can be tracked by anyone. The structure of the blockchain, its transactions, and the Bitcoin network make it possible to deanonymize pseudonyms through various methods such as flow analysis, heuristics, and network traffic observations. Once a connection is established between pseudonyms used in the Bitcoin network and the real world, all previous transactions can be attributed to that identity. In 2021, Taproot was introduced to further increase privacy within the Bitcoin Network by introducing a new address format which will allow transactions to be more indistinguishable from one another. In this paper, we analyze current methods for deanonymizing Bitcoin transactions to understand which parts of the Bitcoin protocol they exploit. In addition, we look at the changes introduced by Taproot and determine the extent to which these changes affect the methods and what assumptions must be made for these methods to remain applicable.
As deep neural networks continue to expand and become more complex, most edge devices are unable to handle their extensive processing requirements. Therefore, the concept of distributed inference is essential to distr...
详细信息
ISBN:
(纸本)9798350333398
As deep neural networks continue to expand and become more complex, most edge devices are unable to handle their extensive processing requirements. Therefore, the concept of distributed inference is essential to distribute the neural network among a cluster of nodes. However, distribution may lead to additional energy consumption and dependency among devices that suffer from unstable transmission rates. Unstable transmission rates harm real-time performance of IoT devices causing low latency, high energy usage, and potential failures. Hence, for dynamic systems, it is necessary to have a resilient DNN with an adaptive architecture that can downsize as per the available resources. This paper presents an empirical study that identifies the connections in ResNet that can be dropped without significantly impacting the model's performance to enable distribution in case of resource shortage. Based on the results, a multi-objective optimization problem is formulated to minimize latency and maximize accuracy as per available resources. Our experiments demonstrate that an adaptive ResNet architecture can reduce shared data, energy consumption, and latency throughout the distribution while maintaining high accuracy.
This paper considers the problem of localizing a static transmitter using a robot with a single receiving antenna and a single communication chamiel in unknown complex environments. Existing solutions using Time -of-A...
详细信息
ISBN:
(纸本)9781665495127
This paper considers the problem of localizing a static transmitter using a robot with a single receiving antenna and a single communication chamiel in unknown complex environments. Existing solutions using Time -of-Arrival (TOA) and Angle -of-Arrival (AOA) rely on complex wireless communication systems with multiple receive antennas or multiple communication channels, which are not available for robots with off-the -shelf low-cost radios. This paper develops a localization framework using Received Signal Strength (RSS) to estimate unknown channel model parameters considering mullipath fading and spatial -correlated shadowing effects. The robot moves along a predefined trajectory to collect RSS data. AOA information is also estimated and integrated with the robot SLAM (Simultaneous Localization and Mapping) results to improve the localization accuracy. Numerical simulations and experiments in an indoor environment are conducted. Results show that 90% of the estimation error is smaller than 2 m to localize a randomly placed transmitter in a 10 x 10 m(2) area.
We propose a comprehensive health monitoring of astronauts which is based on Ballistocardiography (BCG). BCG uses high-precision accelerometers to measure the motion of the heart at the body surface. In contrast to co...
详细信息
ISBN:
(纸本)9781665495127
We propose a comprehensive health monitoring of astronauts which is based on Ballistocardiography (BCG). BCG uses high-precision accelerometers to measure the motion of the heart at the body surface. In contrast to conventional methods (e.g. Electrocardiography (ECG)), BCG enables the derivation of heart-related parameters that can otherwise only be recorded by imaging methods such as echocardiography. A huge issue is the signal quality of the acceleration measurement, however, by means of differential arrangement of digital acceleration sensors, the signal quality and also the susceptibility to interference can be reduced when measuring the smallest accelerations. In preparation for a BCG experiment on the international Space Station (ISS), a pre-flight measurement system was developed whose architectural design is similar to the flight hardware, but extended by a reference ECG. To simplify measurement campaigns, the simultaneously recorded BCG and ECG data can be visualized in real time, which will be shown in this demo.
Edge computing presents a promising paradigm for the management and processing of the vast volumes of data generated by Internet of Things (IoT) devices. By merging cloud services with decentralized processing at the ...
详细信息
ISBN:
(纸本)9798350387339
Edge computing presents a promising paradigm for the management and processing of the vast volumes of data generated by Internet of Things (IoT) devices. By merging cloud services with decentralized processing at the edge of the network, edge computing optimizes resource utilization while mitigating communication overhead and data transfer delays. Despite advancements, there are issues regarding cloud/edge-based application requirements. A distributed edge storage solution is crucial, ensuring data proximity, minimizing network congestion, and adapting to changing demands. Nevertheless, implementing or selecting an efficient edge-enabled storage system presents numerous challenges due to the distributed and heterogeneous nature of the edge, as well as its limited resource capabilities. Hence, it is essential for the research community to actively contribute towards clarifying the objectives and delineating the strengths and weaknesses of different storage solutions. This work presents an overview and performance analysis of three storage solutions in the edge computing context, namely MinIO, IPFS, and BigchainDB. The evaluation considers a set of Quality of Service (QoS) and resource utilization metrics. The systems are deployed on a cluster of four Raspberry Pis, which function as a network of edge devices. The results demonstrate the superiority of IPFS and provide insights into the performance of the evaluated storage systems for edge deployments.
Detecting human stress levels and emotional states with physiological body-worn sensors is a complex task, but one with many health-related benefits. Robustness to sensor measurement noise and energy efficiency of low...
详细信息
ISBN:
(纸本)9781665495127
Detecting human stress levels and emotional states with physiological body-worn sensors is a complex task, but one with many health-related benefits. Robustness to sensor measurement noise and energy efficiency of low-power devices remain key challenges in stress detection. We propose SELFCARE, a fully wrist-based method for stress detection that employs context-aware selective sensor fusion that dynamically adapts based on data from the sensors. Our method uses motion to determine the context of the system and learns to adjust the fused sensors accordingly, improving performance while maintaining energy efficiency. SELF-CARE obtains state-of-theart performance across the publicly available WESAD dataset, achieving 86.34% and 94.12% accuracy for the 3-class and 2-class classification problems, respectively. Evaluation on real hardware shows that our approach achieves up to 2.2x (3-class) and 2.7x (2-class) energy efficiency compared to traditional sensor fusion.
An innovative approach to password cracking by leveraging a distributedcomputing model is developed. The sys- tem comprises a client-server architecture where clients receive segmented password ranges for parallelize...
详细信息
An innovative approach to password cracking by leveraging a distributedcomputing model is developed. The sys- tem comprises a client-server architecture where clients receive segmented password ranges for parallelized hashing attempts. The Java-based implementation employs MD5 hashing and divides the password into smaller units for distribution among multiple clients. Each client independently processes its assigned password range, attempting to match the hash against a pre- determined target. The server orchestrates the distribution of password segments and collects results from clients, facilitating the cracking process. Security measures include secure communication protocols, and ethical considerations center around legality, user consent, and emphasizing the educational value of responsible hacking practices. The work explores the tech- nical challenges of distributed password cracking, addressing efficiency, scalability, and security implications, while fostering a deeper understanding of cybersecurity and distributedsystems.
Autonomous machines are expected to work in unknown environments where machines may be destroyed or reinforced. We model a continuous version of the mobile-agent dispersion problem and simulate the dynamic response wh...
详细信息
ISBN:
(纸本)9798331521561;9798331521554
Autonomous machines are expected to work in unknown environments where machines may be destroyed or reinforced. We model a continuous version of the mobile-agent dispersion problem and simulate the dynamic response when a machine team arrives to help another machine team.
Quantum technology is a new technological paradigm. Specifically, quantum sensing promises to revolutionize important technologic parameters, like sensitivity or specificity. It's every day applicability is signif...
详细信息
ISBN:
(纸本)9798350357929
Quantum technology is a new technological paradigm. Specifically, quantum sensing promises to revolutionize important technologic parameters, like sensitivity or specificity. It's every day applicability is significantly hampered by technical obstacles such as the need for exotic operation conditions or the use of hard to integrate materials for sensing function. Hence, there is a pressing need for the invention of practical sensorsystems as well as their integration into a useable periphery. This goal can be achieved by using dopants in wide band gap semiconductors which allow for room temperature operation and do have the potential to interface with common control environments. The present paper exemplifies the development process for a magnetic field quantum sensor based on dopants in diamond.
暂无评论