This volume of the Lecture Notes in computerscience series contains the papers accepted for presentation at the Third International Conference on Autonomous - frastructure, Management and Security (AIMS 2009). The co...
详细信息
ISBN:
(数字)9783642026270
ISBN:
(纸本)9783642026263
This volume of the Lecture Notes in computerscience series contains the papers accepted for presentation at the Third International Conference on Autonomous - frastructure, Management and Security (AIMS 2009). The conference took place in Enschede, The Netherlands, hosted by the University of Twente. AIMS 2009 was - ganized and supported by the EC IST-EMANICS Network of Excellence (#26854) and co-sponsored by IFIP WG 6.6 and the Strategic Research Orientation of the University of Twente on Dependable systems and Networks (DSN). AIMS 2009 constituted the Third edition of a single-track and standalone c- ference on management and security aspects of distributed and autonomous systems, which took place initially in Oslo, Norway in June 2007, followed by AIMS 2008 in Bremen, Germany. The theme of the AIMS 2009 conference was “Scalability of Networks and S- vices,” focusing on how scalable networked systems can be monitored, managed, and protected in an ef cient and autonomous way. The research papers that have been - lected for publication in the present proceedings have approached this theme from d- ferent perspectives, covering topics such as network resource management, overlays andpeer-to-peernetworks,networkcon gurationandoptimization,andmonitoringand visualization.
In the Internet of Things (IoT) era, the pervasive application of tremendous end devices puts forth an unprecedented demand for data processing. To address this challenge, the end-edge-cloud system has emerged as a so...
详细信息
In the Internet of Things (IoT) era, the pervasive application of tremendous end devices puts forth an unprecedented demand for data processing. To address this challenge, the end-edge-cloud system has emerged as a solution, where task offloading plays a crucial role in efficiently allocating computing resources. Meanwhile, driven by the growing social awareness of privacy, privacy-aware task offloading methods have attracted significant attention. However, existing privacy-aware task offloading methods face various limitations, such as being applicable to specific scenarios, poor transfer ability of offloading strategies, etc. This paper studies the privacy-aware task offloading problem in the end-edge-cloud system and proposes PATO, a Privacy-Aware Task Offloading strategy. PATO consists of two core modules. Specifically, a novel self-supervised feature mapping module transforms sensitive information via complex unidirectional mapping. Subsequently, a DRL-based decision-making module is trained to utilize transformed information to make task offloading decisions. Subtly combining the self-supervised feature mapping module and the DRL-based decision-making module, the proposed PATO addresses both privacy protection and task offloading challenges. Furthermore, PATO is designed as a general solution for task offloading problems and exhibits good transfer ability.
Review considers reasons for design of automation, difficulties in process, and practice of partial automation;five distinct design studies in design of naval ships are indicated and related to digital ship model evol...
详细信息
Review considers reasons for design of automation, difficulties in process, and practice of partial automation;five distinct design studies in design of naval ships are indicated and related to digital ship model evolved on basis of feasibility studies;further development work is noted and future ship design method suggested;design problems programmed by personnel of U S Bureau of Ships design Div and computer utilization programs at David Taylor Model Basin in field of surface ship design are listed. Before Assn Senior Engrs, U S Bur Ships.
The First International Workshop on Traffic Monitoring and Analysis (TMA 2009) was an initiative from the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for t...
详细信息
ISBN:
(数字)9783642016455
ISBN:
(纸本)9783642016448
The First International Workshop on Traffic Monitoring and Analysis (TMA 2009) was an initiative from the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks" (***). The COST program is an intergovernmental framework for European Cooperation in science and Technology, allowing the coordination of nationally funded research on a European level. Each COST Action contributes to reducing the fragmentation in research and opening the European Research Area to cooperation worldwide. Traffic monitoring and analysis (TMA) is now an important research topic within the field of networking. It involves many research groups worldwide that are coll- tively advancing our understanding of the Internet. The importance of TMA research is motivated by the fact that modern packet n- works are highly complex and ever-evolving objects. Understanding, developing and managing such environments is difficult and expensive in practice. Traffic monitoring is a key methodology for understanding telecommunication technology and improving its operation, and the recent advances in this field suggest that evolved TMA-based techniques can play a key role in the operation of real networks. Moreover, TMA offers a basis for prevention and response in network security, as typically the det- tion of attacks and intrusions requires the analysis of detailed traffic records. On the more theoretical side, TMA is an attractive research topic for many reasons.
The first part includes the Keynote addresses by Rajesh Gupta, Department of Energy science and engineering, Indian Institute of Technology, Bombay; P.T. Ajith Kumar, President and Leading Scientist Light Logics Holog...
详细信息
ISBN:
(数字)9789811039089
ISBN:
(纸本)9789811039072;9789811099946
The first part includes the Keynote addresses by Rajesh Gupta, Department of Energy science and engineering, Indian Institute of Technology, Bombay; P.T. Ajith Kumar, President and Leading Scientist Light Logics Holography and Optics, Crescent Hill, Trivandrum, Kerala; and K.K. Ghosh, Institute of engineering & Management, Kolkata, India.;The subsequent parts focus on contributory papers in : Green Photonics; Fibre andIntegrated Optics; Lasers, Interferometry; Optical Communication and Networks; Optical and Digital Data and Image Processing; Opto-Electronic Devices, Terahertz Technology; Nano-Photonics, Bio-Photonics, Bio-Medical Optics; Lasers, Quantum Optics and Information Technology; E. M. Radiation Theory and Antenna; Cryptography; Quantum and Non-Linear Optics, Opto-Electronic Devices; Non-Linear Waveguides; Micro-Electronics and VLSI; Interdisciplinary.
As robots increasingly permeate diverse domains like healthcare, education, service industries, and homes, accurately understanding humans’ responses to and behaviour towards robots is crucial. While many HRI studies...
详细信息
As robots increasingly permeate diverse domains like healthcare, education, service industries, and homes, accurately understanding humans’ responses to and behaviour towards robots is crucial. While many HRI studies focus on either quantitative or qualitative approaches, we advocate a mixed-method approach. This study investigated robot norm violations by implementing a scenario where a mobile manipulator robot and a human, in-person, carry out a physical, competitive task. Sixty-two participants were recruited and randomly assigned to either an experimental or a control condition (balanced for age/gender). The scenario was a competitive scavenger hunt game where participants took turns with a robot. We investigated the robot behaviours’ effects on trust, discomfort, competence, enjoyment, participant behaviour, and physiological changes. The mixed-method approach integrated physiological measurements, behavioural observations, and qualitative responses, thus offering a comprehensive account of human-robot interaction dynamics in the context of norm violations. Questionnaire results reveal significant shifts in human perceptions and attitudes when social norms are violated by robots, compared to a norm-compliant control condition. Specifically, trust and enjoyment decrease, discomfort increases, and the robot’s perceived competence is compromised. These findings are extended through additional analyses of participants’ physiological changes, behaviours, and responses to open-ended questions. Behavioural observations indicated increased verbal engagement and emotional responses, while physiological data showed elevated stress levels in the experimental group. Our study highlights the advantage of a mixed-methods approach combining different qualitative and quantitative data, providing a more comprehensive picture of participants’ perceptions of a robot, and how they react and respond to robot norm violations.
暂无评论