Multi-dimensional optimization of a visual model for measurement assurance of model-specific test equipment that integrates data flow information analysis is the focus of this study. According to the different emphase...
详细信息
In the medical field, managing high-dimensional massive medical imaging data and performing reliable medical analysis from it is a critical challenge, especially in resource-limited environments such as remote medical...
详细信息
Interactive public displays are now pervasive;however, designing gestures to interact with them is still a challenge for embodied interaction. We introduce a methodology, based on Conceptual Metaphor Theory (CMT) and ...
详细信息
Service Mesh Technologies (SMTs) are increasingly popular in simplifying the networking between microservices. They allow one to declaratively and programmatically define service-to-service policies and interactions, ...
详细信息
ISBN:
(纸本)9798400700828
Service Mesh Technologies (SMTs) are increasingly popular in simplifying the networking between microservices. They allow one to declaratively and programmatically define service-to-service policies and interactions, and take all sorts of network management logic (e.g., traffic splitting, request tracing, security, reliability) out of the application. This simplifies the development of microservice architectures, which are widely used in cloud and edge applications. However, the suitability for different SMTs for use in edge applications is unclear. Thus, this work compares the two most popular SMTs (Istio and Linkerd) in terms of performance and overhead for resource-constrained devices. Through extensive experimentation and comparing with a baseline of standard networking in a Kubernetes cluster, we identify that Linkerd offers a more edge-friendly SMT option in contrast to Istio. Overall, Istio's communications are similar to 10% slower than Linkerd at an increased 1.2-1.4x more memory and similar to 1.2x more CPU utilization.
Home health monitoring systems (HHMS) are presented as a cost-effective solution that will assist with collaborative care of older adults. However, instead of care recipients feeling like collaborators, such systems o...
详细信息
ISBN:
(纸本)9781450394215
Home health monitoring systems (HHMS) are presented as a cost-effective solution that will assist with collaborative care of older adults. However, instead of care recipients feeling like collaborators, such systems often disempower them. In this paper, we examine the dissemination, onboarding, and initial use of an HHMS to see how the discourse used by developers and participants affects users' collaborative care efforts. We found that the textual information provided often contrasted with how our participants managed their care. Instead of providing participants with 'independence,' 'safety,' and 'peace of mind,' care recipients were placed in a more dependent, less proactive role, and care providers were pressured to take on more responsibilities. We position HHMS, as they are currently marketed and onboarded, as normalizing pseudo-institutionalization. As an alternative we advocate that the discourse and design of such systems should reflect and re-enforce the varied roles care recipients take in managing their care.
The Internet of Things (IoT) is transforming the world. On the one hand, its rapid integration into many systems is making automation easier, but on the other hand dependence of many processes on IoT is also making th...
详细信息
ISBN:
(纸本)9781450399210
The Internet of Things (IoT) is transforming the world. On the one hand, its rapid integration into many systems is making automation easier, but on the other hand dependence of many processes on IoT is also making the IoT an attractive target for exploitation. One of the attacks that IoT devices can suffer from is device impersonation. To verify that the sender of a piece of information is who it claims to be, digital signatures are a solution. Applying digital signatures requires some overhead, and that overhead may impact the performance of an IoT network. In this paper, we observed the computational impact of using the Elliptic Curve Digital Signature Algorithm (ECDSA) to create and verify IoT devices' digital signatures. We used two criteria to evaluate the performance of our small IoT network: the packet loss and the average time needed to sign and verify a packet in a small IoT network. We also analyzed the same system without using digital signatures. Our evaluations show that in a small IoT sensor network, ECDSA computational impact is quite low.
Understanding Android applications' behavior is essential to many security applications, e.g., malware analysis. Although many systems have been proposed to perform such dynamic analysis, they are limited by their...
详细信息
Convolution kernels are widely seen in deep learning workloads and are often responsible for performance bottlenecks. Recent research has demonstrated that a direct convolution approach can outperform the traditional ...
详细信息
The majority of existing Wi-Fi backscatter systems transmit tag data at rates lower than 250 kbps, as the tag data is modulated at OFDM symbol level, allowing for demodulation using commercial Wi-Fi receivers. However...
详细信息
Wireless embedded systems assist us in collecting data from the physical world, through sensor data analysis, such systems allow us to understand our environment. However, deploying wireless embedded systems and analy...
详细信息
暂无评论