Edge caching is an effective way to reduce congestion and latency in 5G networks. Non-volatile memory (NVM) devices are developing fast, with the potential of fast access, and higher endurance versus traditional stora...
详细信息
ISBN:
(数字)9781665471770
ISBN:
(纸本)9781665471770
Edge caching is an effective way to reduce congestion and latency in 5G networks. Non-volatile memory (NVM) devices are developing fast, with the potential of fast access, and higher endurance versus traditional storage devices, to further boost mobile data offloading efficiency in 5G networks. This paper studies how to effectively use the two-layer storage system (NVM-enhanced) in 5G edge caching. We first model an edge caching optimization problem with NVM storage devices included and develop a parallel distributed algorithm with guaranteed convergence in joint caching and routing decisions. A fully decentralized algorithm for scenarios without any coordination is further developed which also guarantees the convergence. Real-world trace-driven simulations and experiments over a small-scale system demonstrate that NVM significantly boosts the performance of edge caching and the proposed algorithms outperform the existing ones.
The proceedings contain 27 papers. The special focus in this conference is on Cyber Security, Cryptology, and Machine Learning. The topics include: Robust Secure Aggregation for Co-located IoT Devices with Corruption ...
ISBN:
(纸本)9783031769337
The proceedings contain 27 papers. The special focus in this conference is on Cyber Security, Cryptology, and Machine Learning. The topics include: Robust Secure Aggregation for Co-located IoT Devices with Corruption Localization;spoofing-Robust Speaker Verification Based on Time-Domain Embedding;provable Imbalanced Point Clustering;Mezzo TLS 1.3 Protocol, Suitable for Transmitting Already-Encrypted Data: – Short Paper –;LLMSecCode: Evaluating Large Language Models for Secure Coding;distributed Verifiable Random Function with Compact Proof;fiat-Shamir in the Wild;predicting the Degradation Rate of Technical systems at Early Stages of Development;reminisce for Securing Private-Keys in Public;minimally Intrusive Access Management to Content Delivery networks Based on Performance Models and Access Patterns;on the Effects of Neural Network-Based Output Prediction Attacks on the Design of Symmetric-Key Ciphers;entanglement-Based Mutual Quantum Distance Bounding;evaluation of Posits for Spectral Analysis Using a Software-Defined Dataflow Architecture;access Policy Prediction via User Behavior;a Probabilistic Model for Rounding Errors: A New Look at the Table-Maker’s Dilemma;on the Overflow and p-adic Theory Applied to Homomorphic Encryption;Beneath the Cream: Unveiling Relevant Information Points from CrimeBB with Its Ground Truth Labels;cybersecurity Enhancement for Wireless networks Using Aerial Reconfigurable Intelligent Surfaces;KNN+X;challenges in Timed-Cryptography: A Position Paper (Short Paper);Post Quantum Lightweight OWF Candidates: Based on Theoretically Secure Primitives: Xors, Error Detection Codes, Permutations, Polynomials, Interaction, and Nesting (Short Version);super-Teaching in Machine Learning;A Lattice Attack Against a Family of RSA-Like Cryptosystems;on the Security Related Properties of Randomly Constructed Combinatorial Structures;HBSS+: Simple Hash-Based Stateless Signatures Revisited: (Preliminary Version, Short Paper).
The demand for computer vision systems and algorithms is steadily increasing. However, users often have to deal with different or new languages, architectures and tools. Furthermore, there is often no linkage between ...
详细信息
ISBN:
(纸本)9781665497473
The demand for computer vision systems and algorithms is steadily increasing. However, users often have to deal with different or new languages, architectures and tools. Furthermore, there is often no linkage between vendors, defined standards, or model-based modularization to connect everything. We propose a modularized framework for distributing applications on heterogeneous systems consisting of CPUs, GPUs, and FPGAs. The user builds an OpenVX-compliant application without knowledge of the underlying hardware. The middleend automatically schedules and maps the nodes to the available OpenCL devices. Benefits of FPGA acceleration, such as pipelining and running multiple nodes in parallel, are taken into account. The backend generates a program including memory management, synchronization mechanisms and data transfers, even between vendors. This is executed in our parallelized OpenCL based runtime system with minimal overhead. We achieved speedups of 1.63 for a heterogeneous schedule in comparison to a single GPU design when limiting the FPGA resources. Without this limitation a speedup of 13.39 is achieved for the same application.
The exponential growth of new applications and services on the Internet demands increased bandwidth allocation and quality of service. However, traditional networks need help in addressing this issue. Software-defined...
详细信息
This paper investigates the potential of floating gate field-effect transistors (FETs) as primitives for subthreshold computation in analog neural networks. By leveraging the inherent properties of these transistors, ...
详细信息
Detecting communities in multi-layer heterogeneous information networks (HINs) is an important problem in graph analysis such as social network analysis and genome element analysis. Relational community detection on s...
详细信息
Alzheimer's Disease (AD) presents a pressing global health concern, significantly affecting the elderly. As the predominant form of dementia, AD progressively damages brain cells, resulting in significant neurolog...
详细信息
The pervasive integration of modern artificial intelligence into daily life necessitates robust human-computer interaction, underscored by advancements in computer technology. As the primary human tool, hand position,...
详细信息
Differential privacy, as a provable privacy protection framework, has been widely applied in recommendation systems. However, the integration of existing collaborative filtering algorithms with differential privacy ty...
详细信息
Mobile adhoc networks (MANETs) are characterized by their dynamic and decentralized nature, making them inherently vulnerable to security threats. This paper proposes a novel security framework that integrates Quantum...
详细信息
暂无评论