Vehicle-to-everything (V2X) communication is crucial in Intelligent Transportation systems (ITSs) for enhancing road safety, traffic efficiency, and convenience. To address the need for trust in V2X communications, a ...
详细信息
this paper introduces the Smart Annotation and Anonymization tool, a sophisticated software application developed using PyQT5, aimed at optimizing object detection and recognition processes. the tool seamlessly integr...
详细信息
We introduce TNIC, a trusted NIC architecture for building trustworthy distributedsystems deployed in heterogeneous, untrusted (Byzantine) cloud environments. TNIC builds a minimal, formally verified, silicon root-of...
详细信息
ISBN:
(纸本)9798400710797
We introduce TNIC, a trusted NIC architecture for building trustworthy distributedsystems deployed in heterogeneous, untrusted (Byzantine) cloud environments. TNIC builds a minimal, formally verified, silicon root-of-trust at the network interface level. We strive for three primary design goals: (1) a host CPU-agnostic unified security architecture by providing trustworthy network-level isolation;(2) a minimalistic and verifiable TCB based on a silicon root-of-trust by providing two core properties of transferable authentication and non-equivocation;and (3) a hardware-accelerated trustworthy network stack leveraging SmartNICs. Based on the TNIC architecture and associated network stack, we present a generic set of programming APIs and a recipe for building high-performance, trustworthy, distributedsystems for Byzantine settings. We formally verify the safety and security properties of our TNIC while demonstrating its use by building four trustworthy distributedsystems. Our evaluation of TNIC shows up to 6x performance improvement compared to CPU-centric TEE systems.
the proliferation of Internet of things (IoT) and advancements in cloud and fog computing have catalyzed the development of the Cloud Continuum, an enhanced cloud system integrating diverse computational resources and...
详细信息
Autonomous and distributed Industrial Internet of things (IIoT) systems are increasingly developed and deployed. they have an enormous demand for resilience and availability. At the same time, they are in a constantly...
详细信息
ISBN:
(纸本)9781665464512
Autonomous and distributed Industrial Internet of things (IIoT) systems are increasingly developed and deployed. they have an enormous demand for resilience and availability. At the same time, they are in a constantly changing system environment. the underlying edge computing infrastructure is characterized by ever increasing processing power and connectivity as well as a high degree of decentralization. To reduce downtime and long redesign loops, self-adaptation capabilities are needed. Automatic reallocation of the executed tasks to the compute nodes is a possible self-adaptation measure. However, the reallocation should be compliant withthe different demands, constraints and specifications of the design. At the same time, a major challenge is that the allocation decision should be fast enough to be calculated at runtime. this paper therefore proposes an allocation method that uses demands in the form of policies to compute automatic reallocation at runtime. the integration of the allocation method into runtime is enabled by combining constraint programming, step-wise multi-criteria solution approaches, and resource management at multiple levels. the policy-based allocation method is tested and evaluated in the context of a smart factory site for the function offloading of automated guided vehicles (AGVs) and driverless micromobiles. Our results show that the allocation method is capable of recalculating the allocation during runtime in milliseconds while maintaining design conformity. this enables the system to react to changes in the environment, thereby reducing the downtime of decentralized Industrial Internet of things systems and increasing availability.
—QoS-conscious dispensed and cooperative media algorithms for Wi-Fi networks leverage the particular features of a wireless communications platform to allow the transmission of digital media withthe progressed pleas...
详细信息
Sysrepo is a YANG(Yet another next Generation)-based configuration and operational state data store for Unix/Linux based applications. Applications will be able to use sysrepo to store their configurations, provided b...
详细信息
It is needless to mention that the proven capability of cloud computing and digital twin-based monitoring and control systems will play a major role in the implementation of digital twin-based lithium-ion battery mana...
详细信息
Rainfall prediction is not an easy task when utilizing conventional approaches. For many stakeholders, including people planning their daily lives, farmers caring their crop, and fishermen who depend on the weather fo...
详细信息
the proceedings contain 88 papers. the special focus in this conference is on Ubiquitous computing and Ambient Intelligence. the topics include: Towards a Digital and Ubiquitous Ecosystem of Mobile Technology-Based So...
ISBN:
(纸本)9783031485893
the proceedings contain 88 papers. the special focus in this conference is on Ubiquitous computing and Ambient Intelligence. the topics include: Towards a Digital and Ubiquitous Ecosystem of Mobile Technology-Based Solutions to Facilitate Data Management Based on Sustainable Development Goals;towards Abnormal Behaviour Detection on Elderly People at Home through Smart Plugs and Its Relationship with Activities of Daily Living;a Framework for Managing the Experimental Evaluation of Ambient Assisted Living systems;towards a Virtual Reality Visualization of Hand-Object Interactions to Support Remote Physical therapy;Creating Personalized Verbal Human-Robot Interactions Using LLM withthe Robot Mini;Automation of Error Recognition in therapies Executions Based on ECogFun-VR;walkability for Active Aging: Factors and Features for an Adapted Trip Planning;predicting User Adoption and Attrition of Digital Health;a distributed Cognition Approach to Understanding Compensatory Calendaring Cognitive systems of Older Adults with Mild Cognitive Impairment and their Care Partners;A Reinforcement Learning Algorithm for Improving the Generation of Telerehabilitation Activities of ABI Patients;Using Generative AI to Assist with Technology Adoption Assessment;"Why Did You Say that?": Understanding Explainability in Conversational AI systems for Older Adults with Mild Cognitive Impairment (MCI);proposal of a Device for Obstacle Detection Applied to Visually Impaired People;transforming Elderly Care through Ethical and Social Evaluation of Intelligent Activity Recognition systems in Nursing Homes;investigating Motivational Factors Influencing Users’ Consumption of Video Streaming Services: A Human Factor Perspective;translation and Validation of the AttrakDiff User Experience Questionnaire to Spanish;the Mind in Virtual Meetings: Comparing VR and Video Conferencing Environments through Experiential Impact Assessment and EEG Analysis;human-Centered Navigation systems: A Systematic Litera
暂无评论