Future telecommunications networks are increasingly vulnerable to external attacks mainly due to the fast development of applications based on the massive use of IoT devices As a consequence, the perimeter of attacks ...
详细信息
ISBN:
(纸本)9798350377774;9798350377767
Future telecommunications networks are increasingly vulnerable to external attacks mainly due to the fast development of applications based on the massive use of IoT devices As a consequence, the perimeter of attacks on networks has expanded enormously and traditional security control techniques need to evolve to cope withthis issue. A promising approach leverages the potential of Programmable Data Planes, that will characterize future networks, to implement effective in-network Intrusion Detection systems (IDS). Initial works addressed the in-network IDS development, mainly with a centralized approach. In this paper, instead, we propose a Proof-of-Concept study dealing with a deployment approach that allows to distribute across the network nodes an in-network IDS created via a chain of Weak Learners. this, as demonstrated in the Prof-of-Concept experiments shown, allows to overcome some limitations of in-network centralized approaches, by working faster, and occupying fewer resources of the devices involved, while maintaining the level of precision sought.
Traffic congestion is a pervasive problem causing severe environmental and economic issues. In recent years, traffic signal control using reinforcement learning (RL) has come a long way. Most existing studies focus on...
详细信息
ISBN:
(纸本)9798331507879;9798331507862
Traffic congestion is a pervasive problem causing severe environmental and economic issues. In recent years, traffic signal control using reinforcement learning (RL) has come a long way. Most existing studies focus on using distributed agents with data exchange among neighbors, which, however, increases network complexity and usage and still suffers from the lack of broader coordination. Meanwhile, the attention mechanism has achieved tremendous success, and advances in vehicle-to-infrastructure (V2I) communications have enabled real-time collections of granular data. However, integrating these technologies into traffic signal control remains under-explored. therefore, we present GreenLight, a forward-thinking and eco-friendly traffic signal control framework that can be applied to V2I-equipped fog computing environments. For a large urban area, traffic signals are divided into clusters, each coordinated by a fog node with an RL agent. Intra-cluster indexed self-attention is applied to extract context-aware features that the fog-residing RL agent utilizes to determine the proper signal control command. Results of simulation experiments using both synthetic and real-world scenarios show that the presented framework yields lower waiting time, emissions, and fuel consumption compared to baseline methods, indicating its potential for next-generation transportation systems.
Users' personal information is one of the most important actives for nowadays enterprises. Knowing user preferences allows to offer personalized interactions and obtain more high-value information. In this context...
详细信息
ISBN:
(纸本)9783031485893;9783031485909
Users' personal information is one of the most important actives for nowadays enterprises. Knowing user preferences allows to offer personalized interactions and obtain more high-value information. In this context, crowdsensing shows as a technique that aims to collect information about the users and their Internet of Everything (IoE) environment. Personal smartphones are the devices that act as the interface between people and the IoE. However, most of the related works in the literature consider smartphones as mere sensors that gather user data, which is then transferred to the crowdsensing requester. As an alternative, in this paper we propose a distributed crowdsensing platform based on a extension of the Digital Avatars framework for Mobile Collaborative Social computing. In our proposal, smartphones are responsible for compiling and keeping the digital avatar or virtual profile of each of the users participating in the crowdsensing activity. Based on these avatars, the framework is extended to provide a distributed platform for boththe dissemination and the aggregation of the results of the activity, granting users with privacy and ownership of their personal data. Our proposal also takes into account trust and user reputation by means of subjective logic. the proposed system is tested and validated through a proof of concept.
the proceedings contain 26 papers. the topics discussed include: ShuffleBench: a benchmark for large-scale data shuffling operations withdistributed stream processing frameworks;vectorized intrinsics can be replaced ...
ISBN:
(纸本)9798400704444
the proceedings contain 26 papers. the topics discussed include: ShuffleBench: a benchmark for large-scale data shuffling operations withdistributed stream processing frameworks;vectorized intrinsics can be replaced with pure java code without impairing steady-state performance;rethinking ‘complement’ recommendations at scale with SIMD;an adaptive logging system (ALS): enhancing software logging with reinforcement learning techniques;time series forecasting of runtime software metrics: an empirical study;an empirical analysis of common OCI runtimes’ performance isolation capabilities;using evolutionary algorithms to find cache-friendly generalized Morton layouts for arrays;energy efficiency features of the Intel Alder Lake architecture;and Daedalus: self-adaptive horizontal autoscaling for resource efficiency of distributed stream processing systems.
As businesses increasingly depend on these cloud-based services, secure cloud computing is vital. there is no free way withthe cloud network, and our information is susceptible to vulnerability. Mitigation strategies...
详细信息
Data centers have been relying on renewable energy integration coupled with energy efficient specialized processing units and accelerators to increase sustainability. Unfortunately, the carbon generated from manufactu...
详细信息
ISBN:
(纸本)9798331507879;9798331507862
Data centers have been relying on renewable energy integration coupled with energy efficient specialized processing units and accelerators to increase sustainability. Unfortunately, the carbon generated from manufacturing these systems is becoming increasingly relevant due to these energy decarbonization and efficiency improvements. Furthermore, it is less clear how to mitigate this aspect of embodied carbon. As workloads continue to evolve over each hardware generation we explore the tradeoffs of fabricating new application-tuned hardware compared with more general solutions such as Field Programmable Gate Arrays (FPGAs). We also explore how REFRESH FPGAs can amortize embodied carbon investments from previous generations to meet the requirements of future generations workloads.
the proceedings contain 24 papers. the special focus in this conference is on Coordination Models and Languages. the topics include: Choreography automata;a choreography-driven approach to apis: the opendxl case study...
ISBN:
(纸本)9783030500283
the proceedings contain 24 papers. the special focus in this conference is on Coordination Models and Languages. the topics include: Choreography automata;a choreography-driven approach to apis: the opendxl case study;implementing multiparty session types in rust;gopi: compiling linear and static channels in go;foreword;preface;chorevolution: hands-on in-service training for choreography-based systems;sfj: an implementation of semantic featherweight java;event-based customization of multi-tenant saas using microservices;quality of service ranking by quantifying partial compliance of requirements;time-fluid field-based coordination;resilient distributed collection through information speed thresholds;refined mean field analysis: the gossip shuffle protocol revisited;a true concurrent model of smart contracts executions;renegotiation and recursion in bitcoin contracts;architecture modelling of parametric component-based systems;weighted pcl over product valuation monoids;choreographic development of message-passing applications: a tutorial;operational representation of dependencies in context-dependent event structures;towards a formally verified evm in production environment;on implementing symbolic controllability;combining sliver with cadp to analyze multi-agent systems;formal modeling and analysis of medical systems.
Digital computers have transformed human contact, employment, and time management, yet they have limits in drug development. Classical computers can only hold one piece of data at a time, making it impossible to repli...
详细信息
Serverless computing and, in particular, Function-as-a-Service (FaaS) have emerged as valuable paradigms to deploy applications without the burden of managing the computing infrastructure. While initially limited to t...
详细信息
ISBN:
(纸本)9798400704444
Serverless computing and, in particular, Function-as-a-Service (FaaS) have emerged as valuable paradigms to deploy applications without the burden of managing the computing infrastructure. While initially limited to the execution of stateless functions in the cloud, serverless computing is steadily evolving. the paradigm has been increasingly adopted at the edge of the network to support latency-sensitive services. Moreover, it is not limited to stateless applications, with functions often recurring to external data stores to exchange partial computation outcomes or to persist their internal state. To the best of our knowledge, several policies to schedule function instances to distributed hosts have been proposed, but they do not explicitly model the data dependency of functions and its impact on performance. In this paper, we study the allocation of functions and associated key-value state in geographically distributed environments. Our contribution is twofold. First, we design a heuristic for function offloading that satisfies performance requirements. then, we formulate the state migration problem via Integer Linear Programming, taking into account the heterogeneity of data, its access patterns by functions, and the network resources. Extensive simulations demonstrate that our policies allow FaaS providers to effectively support stateful functions and also lead to improved response times.
Exploring the Dynamics of allotted and Cooperative Media Algorithms, research how disbursed and cooperative media algorithms may be used to enhance media management and shipping in distributed structures. It examines ...
详细信息
暂无评论