real-time hand gesture detection enables intuitive non-verbal communication between humans and devices. In gaming, using hand gestures as a control mechanism enhances user engagement and provides a more immersive expe...
详细信息
The wide applications of deep learning techniques have motivated the inclusion of both embedded GPU devices and workstation GPU cards into contemporary Industrial Internet-of-Things (IIoT) systems. Due to substantial ...
详细信息
Our MATE is the first Test-time-Training (TTT) method designed for 3D data, which makes deep networks trained for point cloud classification robust to distribution shifts occurring in test data. Like existing TTT meth...
ISBN:
(纸本)9798350307184
Our MATE is the first Test-time-Training (TTT) method designed for 3D data, which makes deep networks trained for point cloud classification robust to distribution shifts occurring in test data. Like existing TTT methods from the 2D image domain, MATE also leverages test data for adaptation. Its test- time objective is that of a Masked Autoencoder: a large portion of each test point cloud is removed before it is fed to the network, tasked with reconstructing the full point cloud. Once the network is updated, it is used to classify the point cloud. We test MATE on several 3D object classification datasets and show that it significantly improves robustness of deep networks to several types of corruptions commonly occurring in 3D point clouds. We show that MATE is very efficient in terms of the fraction of points it needs for the adaptation. It can effectively adapt given as few as 5% of tokens of each test sample, making it extremely lightweight. Our experiments show that MATE also achieves competitive performance by adapting sparsely on the test data, which further reduces its computational overhead, making it ideal for real-timeapplications.
embedded devices are increasingly ubiquitous and their importance is hard to overestimate. While they often support safety-critical functions (e.g., in medical devices and sensor-alarm combinations), they are usually ...
详细信息
ISBN:
(纸本)9781450391429
embedded devices are increasingly ubiquitous and their importance is hard to overestimate. While they often support safety-critical functions (e.g., in medical devices and sensor-alarm combinations), they are usually implemented under strict cost/energy budgets, using low-end microcontroller units (MCUs) that lack sophisticated security mechanisms. Motivated by this issue, recent work developed architectures capable of generating Proofs of Execution (PoX) for the correct/expected software in potentially compromised low-end MCUs. In practice, this capability can be leveraged to provide "integrity from birth" to sensor data, by binding the sensed results/outputs to an unforgeable cryptographic proof of execution of the expected sensing process. Despite this significant progress, current PoX schemes for low-end MCUs ignore the real-time needs of many applications. In particular, security of current PoX schemes precludes any interrupts during the execution being proved. We argue that lack of asynchronous capabilities (i.e., interrupts within PoX) can obscure PoX usefulness, as several applications require processing real-time and asynchronous events. To bridge this gap, we propose, implement, and evaluate an Architecture for Secure Asynchronous Processing in PoX (ASAP). ASAP is secure under full software compromise, enables asynchronous PoX, and incurs less hardware overhead than prior work.
This study introduces a quantum-accelerated framework that integrates quantum optimization with physics-informed neural networks (PINNs) to solve PDEs more efficiently. By leveraging the Quantum Approximate Optimizati...
详细信息
Internet of Things (IoT) applications are heterogeneous in terms of the deployed hardware, developed protocols, and requirements of each of these applications. The decision whether to process such applications at the ...
详细信息
With Moore's law coming to its limits, the rate of increase in compute power available for processing applications is similarly coming to a halt. This implies that the compute intensive tasks, such as robotics, ar...
详细信息
The primary challenge in developing a practical predictive model for equipment cleaning is determining the variables the neural network should calculate, focusing on a cost-benefit analysis. Given the impracticality o...
详细信息
The fifth-generation (5G) mobile network promises to offer low latency services. Hence, there is interest in assessing various power distribution grid applications that can be deployed with a 5G infrastructure. This p...
详细信息
Modern data processing workloads often have highly unpredictable end-to-end latency characteristics that are caused by heterogeneity, time-variation, and parallelized processing. The increase in unpredictability is in...
详细信息
暂无评论