Multi-grain reconfigurable and scalable overlays for hardware accelerator composition
In this paper, the reconfigurable nature of SRAM-based FPGAs is exploited to build a dynamically multi-grain reconfigurable and scalable overlay architecture. The composition of the overlay can be reconfigured on the fly to map ...
EBIAC: Efficient biometric identity-based access control for wireless body area networks
Wireless body area networks (WBAN) is a promising technology in E-health systems. It provides a mechanism to collect and transmit human body’s psychological data by miniature wearable or implantable sensors. However, how to protect the ...
An exact comparison of global, partitioned, and semi-partitioned fixed-priority real-time multiprocessor schedulers
We evaluate the performance of global, partitioned, and semi-partitioned fixed-priority (FP) multiprocessor schedulers for sporadic real-time tasks. By conducting a range of exhaustive experiments, we support a prior observation of ...
An identity-based proxy re-encryption for data deduplication in cloud
Cloud computing offers a huge resource pool by centralizing various resources with the rapid growth of digital data. Data storage is the most acceptable service in cloud computing. As one of the key technologies of cloud storage ...
THAMON: Thermal-aware High-performance Application Mapping onto Opto-electrical network-on-chip
Nanophotonics as a promising candidate for future on-chip networks has several benefits such as bandwidth transparency, light-speed data rate and low power consumption. Despite significant features of optical on-chip data transmission, ...
A survey on vision-based driver distraction analysis
Motor vehicle crashes are great threats to our life, which may result in numerous fatalities, as well as tremendous economic and societal costs. Driver inattention, either distraction or fatigue, is the major cause among human factors ...
Are task mappings with the highest frequency of servers so good? A case study on Heterogeneous Earliest Finish Time (HEFT) algorithm
In the current heterogeneous computing environment, scheduling strategies play a key role in achieving high performance under current heterogeneous computing environment. Various algorithms have been proposed to generate high-quality ...
Towards functional safety compliance of matrix–matrix multiplication for machine learning-based autonomous systems
Autonomous systems execute complex tasks to perceive the environment and take self-aware decisions with limited human interaction. This autonomy is commonly achieved with the support of machine learning algorithms. The nature of these ...
Safe and secure platooning of Automated Guided Vehicles in Industry 4.0
Automated Guided Vehicles (AGVs) are widely used for materials transportation. Operating them in a platooned manner has the potential to improve safety, security and efficiency, control overall traffic flow and reduce resource usage. ...
Optimal computational resource pricing in vehicular edge computing: A Stackelberg game approach
Vehicular edge computing (VEC) pushes the computational resources to the logical edge of the networks, thus enabling vehicles to run resource-hungry and time-sensitive applications by outsourcing operations. Many studies revolved ...