Synthetic Aperture Radar (SAR) tomography is an advanced technique for monitoring deformations of the Earth's surface. However, the computational complexity of SAR tomography algorithms often restricts their appli...
详细信息
With the acceleration of technological progress and industrial transformation, the new generation of information technology represented by human intelligence, big data and other technologies is the cutting-edge techno...
详细信息
We present a systems approach for tracking of mobile systems in an avalanche scenario using an ultra-wideband (UWB)-based ranging and localization system. UWB-based positioning is particularly challenging in outdoor s...
详细信息
Fifth-generation (5G) wireless networks are now operational to deploy all over the world. The technology of 5G's objective is to link heterogeneous machines and devices with significant improvements high quality o...
详细信息
ISBN:
(纸本)9781450397964
Fifth-generation (5G) wireless networks are now operational to deploy all over the world. The technology of 5G's objective is to link heterogeneous machines and devices with significant improvements high quality of service (QoS), internet bandwidth, and improved system throughput to enable several upright applications. Despite all these benefits that 5G will provide, still, significant issues need to be resolved, such as decentralization, transparency, and risks associated with data interoperability, network privacy, and security vulnerabilities. Modern networks link an enormous number of devices to the Internet, and in this complicated situation, the use of BC and SDN has been effectively advocated to assure security, privacy, and secrecy. This study offers a blockchain-enabled SDN framework for securing transactions that makes use of Software Defined Network (SDN) and Network Function Virtualization (NFV) to overcome these issues. The proposed framework can address the man-in-the-middle attack between control and data plane in SDN networks. A controller authentication scheme is provided using smart contracts. Smart contracts automatically authenticate the SDN controller to increase the efficiency of controller verification. The communicated data can also be authenticated using smart contracts. The proposed framework can enhance network transparency, data security, and user privacy. Each SDN controller can access verifiable data using the proposed framework.
The proceedings contain 42 papers. The topics discussed include: resource-efficient sensor fusion via system-wide dynamic gated neural networks;a large-scale P2P botnet detection framework via topology and traffic co-...
ISBN:
(纸本)9798331519186
The proceedings contain 42 papers. The topics discussed include: resource-efficient sensor fusion via system-wide dynamic gated neural networks;a large-scale P2P botnet detection framework via topology and traffic co-verification;resource allocation and task offloading for slicing-based communication and computing in space-air-ground integrated networks;topology design with resource allocation and entanglement distribution for quantum networks;driving important scene detection based on user preferences;beta: a novel learning-based adaptive streaming approach with spatial and temporal optimization;scalable and distributed optimization of shared 3D object quality for large-scale hybrid-metaverses;budget-constrained traveling salesman problem: a cooperative multi-agent reinforcement learning approach;and an intelligent prefetch strategy with multi-round cell enhancement in volumetric video streaming.
The evolution of quantum computing technologies has been advancing at a steady pace in the recent years, and the current trend suggests that it will become available at scale for commercial purposes in the near future...
详细信息
ISBN:
(纸本)9781665481526
The evolution of quantum computing technologies has been advancing at a steady pace in the recent years, and the current trend suggests that it will become available at scale for commercial purposes in the near future. The acceleration can be boosted by pooling compute infrastructures to either parallelize algorithm execution or solve bigger instances that are not feasible on a single quantum computer, which requires an underlying Quantum Internet: the interconnection of quantum computers by quantum links and repeaters to exchange entangled quantum bits. However, Quantum Internet research so far has been focused on provisioning point-to-point flows only, which is suitable for (e.g.) quantum sensing and metrology, but not for distributed quantum computing. In this paper, after a primer on quantum computing and networking, we investigate the requirements and objectives of smart computing on distributed nodes from the perspective of quantum network provisioning. We then design a resource allocation strategy that is evaluated through a comprehensive simulation campaign, whose results highlight the key features and performance issues, and lead the way to further investigation in this direction.
Today, more than 4 billion people use social media globally now, and this trend is growing year over year with significant implications for privacy. Verification and authentication are highly difficult tasks because o...
详细信息
The proceedings contain 68 papers. The topics discussed include: efficient algorithms for obnoxious facility location on a line segment or circle;vehicular edge computing-driven optimized multihop clustering with data...
ISBN:
(纸本)9798350313062
The proceedings contain 68 papers. The topics discussed include: efficient algorithms for obnoxious facility location on a line segment or circle;vehicular edge computing-driven optimized multihop clustering with data aggregation;cloud telescope: a distributed architecture for capturing internet background radiation;a multi-stakeholder cloud-continuum framework for 6G networks security & service management;unveiling equity: exploring feature dependency using complex-valued neural networks and attention mechanism for fair data analysis;RoMA: resilient multi-agent reinforcement learning with dynamic participating agents;attribute-based searchable proxy re-encryption blockchain data sharing scheme;and a sensor predictive model for power consumption using machine learning.
The tremendous increase in implementing IoT devices for critical infrastructures yells for higher performance and robust protection. Traditional cloud based IoT architecture is unsuitable for delay-sensitive or real-t...
详细信息
distributedcomputing is becoming a prime need of the current era. The users are demanding more from the existing computing systems in terms of the computational power. The inherent nature of distributedcomputing ena...
详细信息
暂无评论