Recently, an increasing number of researchers have been dedicated to transferring the impressive novel view synthesis capability of Neural Radiance Fields (NeRF) to resource-constrained mobile devices. One common solu...
详细信息
Blockchain technology, based on decentralized data storage and distributed consensus design, has become a promising solution to address data security risks and provide privacy protection in the Internet-of-Things (IoT...
详细信息
As virtual reality (VR) continues to expand, particularly in social VR platforms and immersive gaming, understanding the factors that shape user experience is becoming increasingly important. Avatars and locomotion me...
详细信息
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and...
详细信息
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and massive data is exchanged between the aerial vehicles and the ground control *** on the mission of these aerial vehicles,some of the collected and transmitted data is sensitive and ***,many security protocols have been presented to offer privacy and security ***,majority of these schemes fail to consider attack vectors such as side-channeling,de-synchronization and known secret session temporary information *** last attack can be launched upon adversarial physical capture of these *** addition,some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high *** this paper,an authentication protocol based on lightweight quadratic residues and hash functions is *** formal security analysis is executed using the widely deployed random oracle *** addition,informal security analysis is carried out to show its robustness under the Dolev–Yao(DY)and Canetti–Krawczyk(CK)threat *** terms of operational efficiency,it is shown to have relatively lower execution time,communication costs,and incurs the least storage costs among other related ***,the proposed protocol provides a 25%improvement in supported security and privacy features and a 6.52%reduction in storage *** overall,the proposed methodology offers strong security and privacy protection at lower execution time,storage and communication overheads.
Bias detection and mitigation is an active area of research in machine learning. This work extends previous research done by the authors Van Busum and Fang (Proceedings of the 38th ACM/SIGAPP Symposium on Applied Comp...
详细信息
The increasing prevalence of Extended Reality (XR) and head-mounted displays (HMDs), alongside rapid advancements in 3D reality capture technology, unlocks a new paradigm for capturing and reliving past memories/exper...
详细信息
作者:
Ain, Qurat UlRana, TauseefAamana
Department of Computer Science Islamabad Pakistan NUST
Military College of Signals Department of Computer Software Engineering Islamabad Pakistan
Department of Software Engineering Rawalpindi Pakistan
To assess the quality, acceptability and user experience of interactive applications, usability is one of the most integral quality attributes. However, significant number of usability bugs are being experienced by th...
详细信息
Requirements elicitation is one of the fundamental sub-processes of requirements engineering which is used to find the needs of stakeholders. There are several activities in this sub-process, i.e., identification of s...
详细信息
Univariate time series forecasting is pivotal in domains such as climate modeling, finance, and healthcare, where both short-term precision and long-term reliability are essential. This study introduces AUNET (Attenti...
详细信息
Virtual experiences can significantly influence our perception and behavior in the real world, shaping how we interact with and navigate physical environments. In this paper, we examine the impact of learning navigati...
详细信息
暂无评论