This work aims to contribute to our understanding of when multi-task learning through parameter sharing in deep neural networks leads to improvements over single-task learning. We focus on the setting of learning from...
详细信息
The report presents ideas and experiences in creating an electronic magazine for exposing knowledge and skills acquired during the practical training of students. We present the rational on relying on a Content Manage...
详细信息
The report presents ideas and experiences in creating an electronic magazine for exposing knowledge and skills acquired during the practical training of students. We present the rational on relying on a Content Management System such as WordPress to set up a dynamic site where students can create articles with topics related to their practical training that would appear in public after a review process that would include their work and college supervisors. The benefits of such an endeavor could be multifold; students will be improving their writing and reporting skills, instructors will be gaining insights on the activities students are facing when entering the marketplace and employers will be gaining visibility in college settings that could help them attract prospective employees or establish synergies with the technological institutions.
Service quality commitments in cloud service provisioning are typically described in Service Level Agreements (SLA). Service availability is always a major parameter to be included in such SLAs. and the cloud provider...
详细信息
Service quality commitments in cloud service provisioning are typically described in Service Level Agreements (SLA). Service availability is always a major parameter to be included in such SLAs. and the cloud provider is bounded to guarantee a minimum availability value, for which current cloud monitoring systems employ a naive estimator. In this paper a new estimation method is proposed for service availability, which is based on the bootstrap technique and employs a non-parametric statistical hypothesis test. Through Monte Carlo simulation, the method is shown to be much more accurate than the naive one under three stochastic models for the durations of operating and outage periods, exhibiting a Type I error probability lower than 1 % in most cases, while the naive estimator yields error probabilities around 40%.
The evaluation of the Jones polynomial at roots of unity is a paradigmatic problem for quantum computers. In this work we present experimental results obtained from existing noisy quantum computers for special cases o...
详细信息
One of the main concerns regarding Internet of Things (IoT) networks is the security of the communications between IoT nodes and the upper layers of the architecture. Since the vast majority of IoT nodes are constrain...
详细信息
One of the main concerns regarding Internet of Things (IoT) networks is the security of the communications between IoT nodes and the upper layers of the architecture. Since the vast majority of IoT nodes are constrained in terms of power consumption and computational capabilities, the security of their communications is usually lightly addressed. Thus, new IoT hardware platforms are facing this lack of security by including hardware-accelerated cryptographic capabilities. This brings the opportunity to use advanced security mechanisms such as Transport Layer Security (TLS). In this paper, two of the most used TLS authentication algorithms (i.e., ECDSA and RSA) are compared using a resource-constrained IoT node based on the ESP32 SoC (System-on-Chip). The tests are driven by the concept of security level, allowing for a fair comparison in terms of the computational power required to break each cryptographic algorithm. Specifically, security levels from 80 to 192 were tested. A 512-byte JSON file was downloaded 100 consecutive times while measuring both energy consumption and the average time per transaction. The results show that, although ECDSA outperforms RSA in all the performed tests, real-world scenario testing is needed to determine which security configuration is the best for a hardware platform. Software optimizations and implementations could lead to scenarios where higher security level alternatives outperform simpler and theoretically lighter ones in terms of energy consumption and data throughput. Specifically, the obtained results show that the curve secp256r1 outperforms the curve secp224r1, while providing a higher security level, due to optimizations made on the libraries implementing the ECC operations.
Leakage Assessment and Side Channel Attacks (SCA) leakage trace acquisition tools and platforms require a considerable amount of time to collect millions of traces and rely on custom, hard to change or handle acquisit...
详细信息
Leakage Assessment and Side Channel Attacks (SCA) leakage trace acquisition tools and platforms require a considerable amount of time to collect millions of traces and rely on custom, hard to change or handle acquisition control mechanisms. To match these problems, in this paper, a flexible and scalable architecture for leakage trace collection is proposed, providing a fast, reconfigurable and flexible control mechanism that can be easily scaled to a wide variety of Devices Under Test (DUT). The proposed system migrates test vector generation, control and transmission, from off-board Personal computer (PC) to an on-board embedded-system hardware control mechanism. The proposed solution provides a toolset that can be used to structure various leakage assessment scenarios, regardless of the DUT's implemented cryptographic algorithm. The proposed approach enables single, multiple encryption per control loop round and DUT clock frequency adjustment to achieve accurate and fast leakage trace collection even for low-mid range oscilloscopes.
In this paper we address the Phase Retrieval problem, which aims to recover the phase of the Fourier transform of a signal when only magnitude measurements are available. Following recent developments in Phase Retriev...
详细信息
In this paper we address the Phase Retrieval problem, which aims to recover the phase of the Fourier transform of a signal when only magnitude measurements are available. Following recent developments in Phase Retrieval, the problem can be transformed into a convex semidefinite programming optimization problem, which can be solved using Matrix Completion techniques. In this paper the acquisition process is modeled using a likelihood function, which splits the original problem into two convex optimization problems, and alternates between the solution of each of them. To relate both convex problems we introduce a heuristic, which results in fast convergence of the proposed method.
Syntactic annotation is costly and not available for the vast majority of the world's languages. We show that sometimes we can do away with less labeled data by exploiting more readily available forms of mark-up. ...
详细信息
Surface crystallization processes in the 80GeSe 2 -20Ga 2 Se 3 chalcogenide glasses annealed at 380 °C for 25 h and 80 h were studied using atomic force microscopy method. It is shown that crystallites of GeSe 2...
详细信息
ISBN:
(纸本)9781538663844
Surface crystallization processes in the 80GeSe 2 -20Ga 2 Se 3 chalcogenide glasses annealed at 380 °C for 25 h and 80 h were studied using atomic force microscopy method. It is shown that crystallites of GeSe 2 phase are formed in the crystallized glasses on the surface. Optimal conditions of crystallization process were selected for preparation of glasses for IR photonics and sensor electronics.
In the process of collectively inventing new words for new concepts in a population, conflicts can quickly become numerous, in the form of synonymy and homonymy. Remembering all of them could cost too much memory, and...
详细信息
暂无评论