Designing proper incentives in mobile crowdsensing (MCS) networks represents a critical mechanism in engaging distributed mobile users (workers) to contribute heterogeneous data for diverse applications (tasks). We de...
详细信息
Cloud storage is an emerging archetype used by businesses for data storage. Clients require easy access to data in the cloud, which helps clients with limited computing power move their high-value, high-risk principle...
详细信息
This paper presents a thorough exploration of Cryptoprocessors in the context of the Internet of Things (IoT). The focus is on hardware support, cryptographic processors, and energy-efficient designs to fortify the se...
详细信息
ISBN:
(数字)9798350369441
ISBN:
(纸本)9798350369458
This paper presents a thorough exploration of Cryptoprocessors in the context of the Internet of Things (IoT). The focus is on hardware support, cryptographic processors, and energy-efficient designs to fortify the security of IoT ecosystems. Leveraging insights from recent research papers, the survey examines various aspects of Cryptoprocessor implementations, ranging from lightweight countermeasures to advanced lattice-based post-quantum cryptography. The proposed paper amalgamates findings from studies on hardware architectures, energy-efficient designs, and innovative cryptographic algorithms to provide a holistic overview of state-of-the-art advancements in IoT security. The synthesis of this survey’s exploration aims to contribute to the ongoing discourse on securing IoT devices through robust hardware-backed cryptographic solutions.
Current multi-object tracking (MOT) aims to predict trajectories of targets (i.e., "where") in videos. Yet, knowing merely "where" is insufficient in many crucial applications. In comparison, seman...
详细信息
This innovative practice full paper introduces the design, organization, and evaluation of two one-week summer camps to introduce multi-disciplinary engineering technology and programming to high school students. This...
详细信息
ISBN:
(数字)9798350351507
ISBN:
(纸本)9798350363067
This innovative practice full paper introduces the design, organization, and evaluation of two one-week summer camps to introduce multi-disciplinary engineering technology and programming to high school students. This program is designed to increase students' interests and knowledge of multi-disciplinary engineering and computing, foster collaboration, and build community. By engaging in our program, students not only think critically and enhance their problem-solving skills but also develop foundational proficiency in engineering and computational thinking. This crucial skill set is recognized as essential in the 21st century, opening doors to enriching engineering capabilities and creating diverse opportunities for pursuing careers in multiple engineering fields. This paper introduces the organizational structure, coordination strategies, core curriculum instructions, and the program assessment result which demonstrates a substantial improvement in knowledge and increased interest in computing and engineering across all participant cohorts. The primary objective of this paper is to furnish a detailed guide, equipping institutions with the essential information required to successfully host similar summer programs. Furthermore, it aims to catalyze endeavors geared towards enhancing young students' participation in the fields of computing and engineering.
Real-time automata(RTAs) are a subclass of timed automata with only one clock which resets at each transition. In this paper, we present an active learning algorithm for deterministic real-time automata(DRTAs) in both...
详细信息
Real-time automata(RTAs) are a subclass of timed automata with only one clock which resets at each transition. In this paper, we present an active learning algorithm for deterministic real-time automata(DRTAs) in both continuous-time semantics and discrete-time semantics. For a target language recognized by a DRTA A, we convert the problem of learning DRTA A to the problem of learning a canonical real-time automaton A with the same recognized language, i.e., L(A) = L(A). The algorithm is inspired by existing learning algorithms for symbolic automata.
Sparse Neural Networks (SNNs) can potentially demonstrate similar performance to their dense counterparts while saving significant energy and memory at inference. However, the accuracy drop incurred by SNNs, especiall...
详细信息
Dual three-phase permanent magnet synchronous motor drives have gained considerable interest in those applications requiring high levels of reliability. However, they often suffer from high-order harmonic currents and...
详细信息
Two plane drawings of graphs on the same set of points are called disjoint compatible if their union is plane and they do not have an edge in common. Let S be a convex point set of 2n ≥ 10 points and let H be a famil...
详细信息
Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for clo...
详细信息
Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing.
暂无评论