Edge Computing (EC) extends computing functionalities from remote cloud data centers to the proximity of end-user devices at the network edges, thereby reducing application response time. However, existing solutions f...
详细信息
Edge Computing (EC) extends computing functionalities from remote cloud data centers to the proximity of end-user devices at the network edges, thereby reducing application response time. However, existing solutions face challenges in scalability, efficient resource management, and near real-time adaptation in dynamic environments. In this paper, we jointly investigate the application placement and load distribution challenges in an EC-enabled mobile network. We propose a hierarchical distributed Limited Look-Ahead Control (LLC) approach that mitigates centralized control bottlenecks by breaking down the overall decision problem into a series of local problems solved cooperatively through a two-tier architecture. The global controller processes system-wide information and sets local constraints, while local controllers make autonomous decisions coordinated through mutual information exchange. Utilizing LLC allows for anticipation and adaptation to load fluctuations. Even though the results indicate that the trade-off between system performance and scalable decisions depends on how the overall problem is decomposed, our distributed solution significantly reduces the controller's execution time compared to a centralized approach.
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
ISBN:
(纸本)9783031823480
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy of Individuals in Their Textual Contributions;plausible Deniability of Redacted Text;exploring Distribution Learning of Synthetic Data Generators for Manifolds;HEDAS: Secure and Efficient distributed OLAP Using Fully Homomorphic Encryption;card-Based Cryptographic Protocols for Three-Input Functions with a Standard Deck of Cards Using Private Operations;grid-Based Decompositions for Spatial Data Under Local Differential Privacy;balancing Privacy and Utility in Multivariate Time-Series Classification;dynamic k-Anonymity for Electronic Health Records: A Topological Framework;Using Static Code Analysis for GDPR Compliance Checks;privacy-Preserving Tabular Data Generation: Systematic Literature Review;A DPIA Repository for Interdisciplinary Data Protection Research;secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification;route Discovery in Private Payment Channel networks;A Comparative Study of Rust Smart Contract SDKs for Application-Specific Blockchains;offchain Runtime Verification (for The Tezos Blockchain);quantifying Liveness and Safety of Avalanche’s Snowball;We Will DAG You;assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?;Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script;Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol;benchmarking Post-quantum Cryptography in Ethereum-Based Blockchains;exploring Anomaly Detection for Marine Radar systems;hunting Vulnerabilities in the Maritime Domain: A Domain Wide Cybersecurity Vulnerability Analysis;threat Modeling in Satellite Communications for Maritime Operations;cybersecurity Challenges in Industrial Control systems: An Interview Study with Asset Owners in Norway;usage of Cybersecurity Standards
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
ISBN:
(纸本)9783031823619
The proceedings contain 33 papers. The special focus in this conference is on Data Privacy Management. The topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy of Individuals in Their Textual Contributions;plausible Deniability of Redacted Text;exploring Distribution Learning of Synthetic Data Generators for Manifolds;HEDAS: Secure and Efficient distributed OLAP Using Fully Homomorphic Encryption;card-Based Cryptographic Protocols for Three-Input Functions with a Standard Deck of Cards Using Private Operations;grid-Based Decompositions for Spatial Data Under Local Differential Privacy;balancing Privacy and Utility in Multivariate Time-Series Classification;dynamic k-Anonymity for Electronic Health Records: A Topological Framework;Using Static Code Analysis for GDPR Compliance Checks;privacy-Preserving Tabular Data Generation: Systematic Literature Review;A DPIA Repository for Interdisciplinary Data Protection Research;secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification;route Discovery in Private Payment Channel networks;A Comparative Study of Rust Smart Contract SDKs for Application-Specific Blockchains;offchain Runtime Verification (for The Tezos Blockchain);quantifying Liveness and Safety of Avalanche’s Snowball;We Will DAG You;assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?;Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script;Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol;benchmarking Post-quantum Cryptography in Ethereum-Based Blockchains;exploring Anomaly Detection for Marine Radar systems;hunting Vulnerabilities in the Maritime Domain: A Domain Wide Cybersecurity Vulnerability Analysis;threat Modeling in Satellite Communications for Maritime Operations;cybersecurity Challenges in Industrial Control systems: An Interview Study with Asset Owners in Norway;usage of Cybersecurity Standards
While digital displays and glass cockpits have become widespread in modern aircraft, analog instruments remain. These gauges can be challenging to digitize or integrate into automated safety systems. This work investi...
详细信息
ISBN:
(纸本)9783031773884;9783031773891
While digital displays and glass cockpits have become widespread in modern aircraft, analog instruments remain. These gauges can be challenging to digitize or integrate into automated safety systems. This work investigates the application of computer vision to evaluate aircraft instruments of varying complexity. For ease of acquisition, training data was recorded from a flight simulator and used to train neural networks. The resulting models have high accuracy when evaluating single pointer gauges in lighting conditions similar to the training data set, as well as with entirely different lighting conditions. Performance remains robust even with more complex instruments, such as dual pointer airspeed gauges and attitude indicators. Potential future work on this system includes applying it to real-life aircraft and integration with safety systems, including detection of instrument display failures.
Federated Learning (FL) emerged as a leading secure, distributed learning technology based on sharing insights instead of data. The privacy-ensuring capability of FL has enabled its extensive use in Data-Sensitive App...
详细信息
Federated Learning (FL) emerged as a leading secure, distributed learning technology based on sharing insights instead of data. The privacy-ensuring capability of FL has enabled its extensive use in Data-Sensitive Applications like healthcare and finance. However, the transmitted insights are at risk of leakage as the security of the medium cannot be guaranteed and can lead to the inference of the user data. Quantization is sometimes used to change these transmitted values to provide security but at the cost of accuracy loss in global models. Coupled with client dropouts, this increases performance loss. In this paper, we propose a Federated Workload-Aware Framework with Linear Quantization (Fed-WALQ), which layers the quantization process with an active client-selection technique based on the sustainable workload of the clients. The framework minimizes the dropout rates and compensates for the loss due to quantization. Through numerical experiments compared against traditional FL and Quantization-enabled FL over multiple datasets, the Fed-WALQ shows improvements in security over the former and accuracy over the latter. The accuracy improvement varies with the complexities of the involved datasets, while a substantial drop in straggler node percentages is seen in all cases (up to 91.8% drop).
This article presents a method for graffiti identification based on the analysis of its dominant colors using artificial intelligence. The method employs a K-Means clustering algorithm to group the pixels of a graffit...
详细信息
Navigating unfamiliar environments remains a challenge for individuals with visual impairments. Fortunately, recent technological advancements have brought forth innovative smart stick prototypes to aid in independent...
详细信息
The proceedings contain 154 papers. The topics discussed include: transient stability analysis of power system considering multiple inverter aggregation model;development of the safeguard companion for secondary safet...
ISBN:
(纸本)9798331533694
The proceedings contain 154 papers. The topics discussed include: transient stability analysis of power system considering multiple inverter aggregation model;development of the safeguard companion for secondary safety measures of relay protection;an open interconnection system for computing power based on service mesh;securing distributed power dispatching systems: a framework for cybersecurity and 5G integration;utilizing deep belief networks for power system state estimation and anomaly detection;fire detection approach for 10kV distribution room based on spatial perception and hybrid attention mechanism;research on the application of information sharing technology in distributed photovoltaic aggregation optimization control strategy;and construction and optimization of key quality problem graph of power equipment based on association rule mining.
The increasing integration of distributed Energy Resources (DERs) into modern power grids presents challenges in maintaining energy efficiency, grid stability, and cost-effectiveness. To address these challenges, this...
详细信息
The increasing pervasiveness of digital infrastructures, also extending into marine domains, makes Underwater Wireless Sensor networks (UWSNs) an essential tool for the development of novel marine sustainability and m...
详细信息
暂无评论