UAV-assisted dependency-aware computation offloading in device–edge–cloud collaborative computing based on improved actor–critic DRL
Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) has become a popular research topic, addressing challenges posed by the pressure of cloud computing and the limited service scope of MEC. However, the limited computing resources ...
Integrated analysis of reliability, power, and performance for IoT devices and servers
The Internet of Things (IoT) is currently widely used in various sectors and spaces. IoT devices are becoming small yet powerful servers and perform server-like functions. Reliability is a critical aspect in both IoT devices and servers, as they ...
Reliability-aware scheduling for ( m , k )-firm real-time embedded systems under hard energy budget constraint
For real-time embedded systems, feasibility, Quality of Service (QoS), reliability, and energy constraint are among the primary design concerns. In this research, we proposed a reliability-aware scheduling scheme for real-time embedded systems ...
Predictable and optimized single-path code for predicated processors
Single-path code is a code generation technique for real-time systems that reduces execution time variability. However, doing so can incur significant execution-time overhead and does not guarantee constant execution times. In this paper, we ...
Expanding hardware accelerator system design space exploration with gem5-SALAMv2
With the prevalence of hardware accelerators as an integral part of the modern systems on chip (SoCs), the ability to model accelerators quickly and accurately within the system in which it operates is critical. This paper presents gem5-SALAMv2 ...
Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme
With the popularity of Internet of Things (IoT) applications, data sharing among IoT devices has become more frequent. Many researchers have proposed fine-grained access control schemes and searchable encryption algorithms to support privacy-...
A revocable and comparable attribute-based signature scheme from lattices for IoMT
The Internet of Medical Things (IoMT) refers to the utilization of the Internet of Things (IoT) technology in the healthcare industry. Access control is particularly important for IoMT due to the sensitive nature of patient data, such as ...
SEDCPT: A secure and efficient Dynamic Searchable Encryption scheme with cluster padding assisted by TEE
Dynamic Searchable Symmetric Encryption (DSSE), which enables users to search and update encrypted data on an untrusted server without decryption, is a proven method when dealing with availability issues for outsourced data. However, the existing ...
Providing spatial isolation for Mixed-Criticality Systems
Hard real-time systems, characterized by stringent timeliness requirements, occur in an increasing variety of industrial sectors. Some such domains carry important safety-critical concerns, notably avionics, space, and automotive. One common ...
Highlights
- Mixed-criticality systems support higher utilization compared to partitioned systems.
- Software-based spatial isolation is required to supplant traditional partitioning.
- Spatial isolation is granted with runtime’s support and memory ...
Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system
Preserving the confidentiality and integrity of data transmission is paramount in the Internet of Things (IoT)-based healthcare systems. Current encryption techniques that allow plaintext checks primarily serve a specific cryptosystem, lacking ...
GPU implementation of the Frenet Path Planner for embedded autonomous systems: A case study in the F1tenth scenario
Autonomous vehicles are increasingly utilized in safety-critical and time-sensitive settings like urban environments and competitive racing. Planning maneuvers ahead is pivotal in these scenarios, where the onboard compute platform determines the ...
Graphical abstractDisplay Omitted
Highlights
- Novel GPU-based implementation of Frenet Path Planner.
- Outperforms other implementation concerning execution time.
- Tested on a real F1tenth racing car.
- Source code publicity available.
IEmu: Interrupt modeling from the logic hidden in the firmware
The security of embedded firmware has become a critical issue in light of the rapid development of the Internet of Things. Current security analysis approaches, such as dynamic analysis, still face bottlenecks and difficulties due to the wide ...
Evaluating single event upsets in deep neural networks for semantic segmentation: An embedded system perspective
As the deployment of artificial intelligence (AI) algorithms at edge devices becomes increasingly prevalent, enhancing the robustness and reliability of autonomous AI-based perception and decision systems is becoming as relevant as precision and ...
Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing
With the popularity of cloud computing, a large number of personal and corporate data are outsourced to the cloud. This centralized storage and processing mode not only improves the efficiency of data processing, but also brings challenges to ...
Highlights
- A secure and efficient public key authentication keyword searchable encryption.
- The scheme is based on the inhomogeneous NTRU problem.
- The scheme is implemented quickly based on palisade library.
- The design again verifies that ...
Real-time intelligent on-device monitoring of heart rate variability with PPG sensors
Heart rate variability (HRV) is a vital sign with the potential to predict stress and various diseases, including heart attack and arrhythmia. Typically, hospitals utilize electrocardiogram (ECG) devices to capture the heart’s bioelectrical ...
Graphical abstractDisplay Omitted
Highlights
- The UP-RaNN method drastically decreases the search space considering the hardware.
- A real-time HRV monitoring system is designed for embedded devices.
- Adaptive runtime reconfiguration can accommodate various performance demands.
Optimization of block-scaled integer GeMMs for efficient DNN deployment on scalable in-order vector processors
A continuing rise in DNN usage in distributed and embedded use cases has demanded more efficient hardware execution in the field. Low-precision GeMMs with optimized data formats have played a key role in more memory and computationally-efficient ...
Backdoor-resistant certificateless-based message-locked integrity auditing for computing power network
With the evolution of 6G technology, the computing power network (CPN), a crucial infrastructure underpinning the future of digital transformation, is being tightly integrated with 6G to jointly foster significant enhancements in network ...
Highlights
- Integrate CRF to solve data integrity audit in computing power network.
- BRCLMIA has the functions of authority management and data deduplication.
- Prevent the attacker from generating false certificates to ensure the audit’s ...
A Privacy-Preserving Three-Factor Authentication System for IoT-Enabled Wireless Sensor Networks
Recently, Sahoo et al. introduced a three-factor authentication scheme for Wireless Sensor Networks (WSNs) based on an elliptic curve cryptosystem. Nonetheless, upon closer examination, we have identified critical vulnerabilities in their scheme, ...
Structured segment rescaling with Gaussian processes for parameter efficient ConvNets
We introduce a novel mechanism for structured pruning on ConvNet blocks and channels. Our mechanism, Structured Segment Rescaling (SSR) down-samples a ConvNet’s dimensions using depth and width modifiers that respectively remove whole blocks and ...
Coarse-grained reconfigurable architectures for radio baseband processing: A survey
Emerging communication technologies, such as 5G and beyond, have introduced diverse requirements that demand high performance and energy efficiency at all levels. Furthermore, the real-time requirements of different services vary significantly — ...
Assuring the safety of rechargeable energy storage systems in electric vehicles
Energy storage systems, especially lithium-ion batteries have gained significant attention and interest due to their potential in storing electrical energy and environmental sustainability. They play a crucial role in electric vehicles and ...
A framework for static analysis and verification of low-level RTOS code
Modern embedded software development uses model-based methods to support long-term maintenance, portability, and correctness. A growing trend is to use formal methods to create software models and verify their correctness against requirement ...
The MATERIAL framework: Modeling and AuTomatic code Generation of Edge Real-TIme AppLications under the QNX RTOS
Modern edge real-time automotive applications are becoming more complex, dynamic, and distributed, moving away from conventional static operating environments to support advanced driving assistance and autonomous driving functionalities. This ...
Automated level-based clustering of dataflow actors for controlled scheduling complexity
Dataflow Models of Computation (MoCs) significantly enhance parallel computing by efficiently expressing application parallelism on multicore architectures, unlocking greater performance and throughput. However, the complexity of graphs within ...
Virtualized real-time workloads in containers and virtual machines
Real-time virtualization is currently a hot topic, and there is much ongoing research on real-time Virtual Machines and hypervisors. However, most of the previous research focused either on reducing the latencies introduced by the virtualization ...