Critical thinking plays a crucial role in children's education for fostering cognitive development, cultivating independent thinking habits, and enhancing their ability to problem-solving. However, the current edu...
详细信息
Conference authorship, attendance and presentation is a key measure of quality in the HCI academic, yet we know conferences are not equally accessible for reasons that have nothing to do with quality. In this paper we...
详细信息
ISBN:
(纸本)9781450391573
Conference authorship, attendance and presentation is a key measure of quality in the HCI academic, yet we know conferences are not equally accessible for reasons that have nothing to do with quality. In this paper we examine two axes of diversity: gender, and geographic location (of both authors and conferences) and examine how they affect participation at major HCI conferences. Diversity in a group is associated with better outcomes from its work, and HCI has made numerous contributions to increasing representation in other communities. Reflecting on our own situation can produce recommendations for the planning of future HCI conferences, and identify challenges of representation that the HCI community should endeavor to address.
Explainable AI (XAI) is concerned with how to make AI models more understandable to people. To date these explanations have predominantly been technocentric - mechanistic or productivity oriented. This paper introduce...
详细信息
To run services in Trusted Execution Environments and Secure Enclaves is an established approach to protect privacy-sensitive data or payment processing. The increased importance of service elasticity in e.g. cloud co...
详细信息
ISBN:
(纸本)9781450392556
To run services in Trusted Execution Environments and Secure Enclaves is an established approach to protect privacy-sensitive data or payment processing. The increased importance of service elasticity in e.g. cloud computing, but also between edge and cloud, highlights the need of (hardware) architecture agnostic secure migration of such processing. We present an enclave software design, based on a WebAssembly (WASM) runtime, that allows for secure migration of enclave services with integrity and confidentiality guarantees for both enclave code and software state (data). We provide security analysis for our migration approach, and architecture benchmarking for a wide variety of existing (and future) secure enclave hardware as proof that elasticity in computation-without compromising security-is an achievable goal.
Technological advances and the explosion of epidemics have contributed to a surge in the number of online learning platforms. Because single modal data is often not enough in evaluating the usability of interface inte...
详细信息
We consider the problem of controlling a Linear Quadratic Regulator (LQR) system over a finite horizon T with fixed and known cost matrices Q,R, but unknown and non-stationary dynamics At, Bt. The sequence of dynamics...
详细信息
The proceedings contain 11 papers. The topics discussed include: multiple ensembling techniques for monitoring the physical activities and predicting the performance of the students;a comprehensive review of influence...
The proceedings contain 11 papers. The topics discussed include: multiple ensembling techniques for monitoring the physical activities and predicting the performance of the students;a comprehensive review of influence node identification in complex networks;improving lifestyle of visually impaired people using virtual reality;algorithm for optimization in medical image processing applied in heterogeneous architecture;application of real-time operating systems in the design of medical devices;smart farming using artificial intelligence;optimized cluster centroids for segmentation of skin cancer using triangular intuitionistic fuzzy sets;analog and digital RoF spatial Mux MIMO-LTE system based A2 (arithmetic Aquila) optimization model for 5G network;comparison of state - of - art deep learning algorithms for detecting cyberbullying in twitter;and stock market technical analysis using Japanese candlesticks and machine learning.
This paper presents the first edge computing framework for RTI systems combining intermediate sensor fusion with model quantization. Traditional RTI approaches [1] rely on centralized architectures (450 ms latency), w...
详细信息
ISBN:
(纸本)9798400714795
This paper presents the first edge computing framework for RTI systems combining intermediate sensor fusion with model quantization. Traditional RTI approaches [1] rely on centralized architectures (450 ms latency), while our key innovations enable 73% faster edge processing (120 ms) through hybrid ResNet architecture compressed via 8-bit quantization and intermediate fusion of RTI attenuation maps and RGB features. Our work introduces an on-device processing pipeline implemented on low-power IoT devices---including Jetson Nano, Raspberry Pi, and ESP32---that enables real-time inference without cloud-based *** our proposed system, radio tomography data is integrated with RGB camera input using an intermediate fusion strategy. This approach addresses RTI's inherent low spatial resolution and the "blob effect" by combining complementary features extracted from both modalities [2]. Optimized deep learning models---enhanced through model quantization, TensorRT acceleration, and lightweight inference techniques---are employed to efficiently meet the constraints of embedded hardware while maintaining high detection *** show 94.2% accuracy vs 92.5% in cloud systems with 67% lower energy use 5.5W vs 15W. First implementation of realtime RGB-RTI fusion on edge devices, outperforming SOTA edge-RTI by 18% in latency. These findings underscore the potential for deploying privacy-preserving, low-power, and real-time human detection systems in smart buildings, security applications, and IoT-based occupancy monitoring.
Over the past decade, mobile apps have been widely adopted as a digital intervention method for mental health support, offering scalable and accessible solutions to address the growing global mental health challenges....
详细信息
The report substantiates the feasibility of using reconfigurable modules (R-modules) National Instruments Corporation (NI) for measuring the values of controlled parameters and subsequent processing of the data obtain...
详细信息
暂无评论