Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 12 Nov 2024Bibliometrics
Skip Table Of Content Section
Research Paper
research-article
UAV-assisted dependency-aware computation offloading in device–edge–cloud collaborative computing based on improved actor–critic DRL
Abstract

Unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) has become a popular research topic, addressing challenges posed by the pressure of cloud computing and the limited service scope of MEC. However, the limited computing resources ...

research-article
Integrated analysis of reliability, power, and performance for IoT devices and servers
Abstract

The Internet of Things (IoT) is currently widely used in various sectors and spaces. IoT devices are becoming small yet powerful servers and perform server-like functions. Reliability is a critical aspect in both IoT devices and servers, as they ...

research-article
Reliability-aware scheduling for ( m , k )-firm real-time embedded systems under hard energy budget constraint
Abstract

For real-time embedded systems, feasibility, Quality of Service (QoS), reliability, and energy constraint are among the primary design concerns. In this research, we proposed a reliability-aware scheduling scheme for real-time embedded systems ...

research-article
Predictable and optimized single-path code for predicated processors
Abstract

Single-path code is a code generation technique for real-time systems that reduces execution time variability. However, doing so can incur significant execution-time overhead and does not guarantee constant execution times. In this paper, we ...

research-article
Expanding hardware accelerator system design space exploration with gem5-SALAMv2
Abstract

With the prevalence of hardware accelerators as an integral part of the modern systems on chip (SoCs), the ability to model accelerators quickly and accurately within the system in which it operates is critical. This paper presents gem5-SALAMv2 ...

research-article
Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme
Abstract

With the popularity of Internet of Things (IoT) applications, data sharing among IoT devices has become more frequent. Many researchers have proposed fine-grained access control schemes and searchable encryption algorithms to support privacy-...

research-article
A revocable and comparable attribute-based signature scheme from lattices for IoMT
Abstract

The Internet of Medical Things (IoMT) refers to the utilization of the Internet of Things (IoT) technology in the healthcare industry. Access control is particularly important for IoMT due to the sensitive nature of patient data, such as ...

research-article
SEDCPT: A secure and efficient Dynamic Searchable Encryption scheme with cluster padding assisted by TEE
Abstract

Dynamic Searchable Symmetric Encryption (DSSE), which enables users to search and update encrypted data on an untrusted server without decryption, is a proven method when dealing with availability issues for outsourced data. However, the existing ...

research-article
Providing spatial isolation for Mixed-Criticality Systems
Abstract

Hard real-time systems, characterized by stringent timeliness requirements, occur in an increasing variety of industrial sectors. Some such domains carry important safety-critical concerns, notably avionics, space, and automotive. One common ...

Highlights

  • Mixed-criticality systems support higher utilization compared to partitioned systems.
  • Software-based spatial isolation is required to supplant traditional partitioning.
  • Spatial isolation is granted with runtime’s support and memory ...

research-article
Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system
Abstract

Preserving the confidentiality and integrity of data transmission is paramount in the Internet of Things (IoT)-based healthcare systems. Current encryption techniques that allow plaintext checks primarily serve a specific cryptosystem, lacking ...

research-article
GPU implementation of the Frenet Path Planner for embedded autonomous systems: A case study in the F1tenth scenario
Abstract

Autonomous vehicles are increasingly utilized in safety-critical and time-sensitive settings like urban environments and competitive racing. Planning maneuvers ahead is pivotal in these scenarios, where the onboard compute platform determines the ...

Graphical abstract

Display Omitted

Highlights

  • Novel GPU-based implementation of Frenet Path Planner.
  • Outperforms other implementation concerning execution time.
  • Tested on a real F1tenth racing car.
  • Source code publicity available.

research-article
IEmu: Interrupt modeling from the logic hidden in the firmware
Abstract

The security of embedded firmware has become a critical issue in light of the rapid development of the Internet of Things. Current security analysis approaches, such as dynamic analysis, still face bottlenecks and difficulties due to the wide ...

research-article
Evaluating single event upsets in deep neural networks for semantic segmentation: An embedded system perspective
Abstract

As the deployment of artificial intelligence (AI) algorithms at edge devices becomes increasingly prevalent, enhancing the robustness and reliability of autonomous AI-based perception and decision systems is becoming as relevant as precision and ...

research-article
Efficient iNTRU-based public key authentication keyword searchable encryption in cloud computing
Abstract

With the popularity of cloud computing, a large number of personal and corporate data are outsourced to the cloud. This centralized storage and processing mode not only improves the efficiency of data processing, but also brings challenges to ...

Highlights

  • A secure and efficient public key authentication keyword searchable encryption.
  • The scheme is based on the inhomogeneous NTRU problem.
  • The scheme is implemented quickly based on palisade library.
  • The design again verifies that ...

research-article
Real-time intelligent on-device monitoring of heart rate variability with PPG sensors
Abstract

Heart rate variability (HRV) is a vital sign with the potential to predict stress and various diseases, including heart attack and arrhythmia. Typically, hospitals utilize electrocardiogram (ECG) devices to capture the heart’s bioelectrical ...

Graphical abstract

Display Omitted

Highlights

  • The UP-RaNN method drastically decreases the search space considering the hardware.
  • A real-time HRV monitoring system is designed for embedded devices.
  • Adaptive runtime reconfiguration can accommodate various performance demands.

...

research-article
Optimization of block-scaled integer GeMMs for efficient DNN deployment on scalable in-order vector processors
Abstract

A continuing rise in DNN usage in distributed and embedded use cases has demanded more efficient hardware execution in the field. Low-precision GeMMs with optimized data formats have played a key role in more memory and computationally-efficient ...

research-article
Backdoor-resistant certificateless-based message-locked integrity auditing for computing power network
Abstract

With the evolution of 6G technology, the computing power network (CPN), a crucial infrastructure underpinning the future of digital transformation, is being tightly integrated with 6G to jointly foster significant enhancements in network ...

Highlights

  • Integrate CRF to solve data integrity audit in computing power network.
  • BRCLMIA has the functions of authority management and data deduplication.
  • Prevent the attacker from generating false certificates to ensure the audit’s ...

research-article
A Privacy-Preserving Three-Factor Authentication System for IoT-Enabled Wireless Sensor Networks
Abstract

Recently, Sahoo et al. introduced a three-factor authentication scheme for Wireless Sensor Networks (WSNs) based on an elliptic curve cryptosystem. Nonetheless, upon closer examination, we have identified critical vulnerabilities in their scheme, ...

research-article
Structured segment rescaling with Gaussian processes for parameter efficient ConvNets
Abstract

We introduce a novel mechanism for structured pruning on ConvNet blocks and channels. Our mechanism, Structured Segment Rescaling (SSR) down-samples a ConvNet’s dimensions using depth and width modifiers that respectively remove whole blocks and ...

Reviews
review-article
Coarse-grained reconfigurable architectures for radio baseband processing: A survey
Abstract

Emerging communication technologies, such as 5G and beyond, have introduced diverse requirements that demand high performance and energy efficiency at all levels. Furthermore, the real-time requirements of different services vary significantly — ...

Special issue on Reliable Software Technologies (AEiC2024)
research-article
Assuring the safety of rechargeable energy storage systems in electric vehicles
Abstract

Energy storage systems, especially lithium-ion batteries have gained significant attention and interest due to their potential in storing electrical energy and environmental sustainability. They play a crucial role in electric vehicles and ...

research-article
A framework for static analysis and verification of low-level RTOS code
Abstract

Modern embedded software development uses model-based methods to support long-term maintenance, portability, and correctness. A growing trend is to use formal methods to create software models and verify their correctness against requirement ...

research-article
The MATERIAL framework: Modeling and AuTomatic code Generation of Edge Real-TIme AppLications under the QNX RTOS
Abstract

Modern edge real-time automotive applications are becoming more complex, dynamic, and distributed, moving away from conventional static operating environments to support advanced driving assistance and autonomous driving functionalities. This ...

Special Issue on Design and Architectures for Signal and Image Processing (DASIP)
research-article
Automated level-based clustering of dataflow actors for controlled scheduling complexity
Abstract

Dataflow Models of Computation (MoCs) significantly enhance parallel computing by efficiently expressing application parallelism on multicore architectures, unlocking greater performance and throughput. However, the complexity of graphs within ...

Special issue on Virtualization in High-Performance Cloud Computing
research-article
Virtualized real-time workloads in containers and virtual machines
Abstract

Real-time virtualization is currently a hot topic, and there is much ongoing research on real-time Virtual Machines and hypervisors. However, most of the previous research focused either on reducing the latencies introduced by the virtualization ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.