Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 127, Issue CJun 2022
Reflects downloads up to 12 Nov 2024Bibliometrics
Skip Table Of Content Section
Research Paper
research-article
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems
Abstract

Smart grid systems enable bidirectional data communication between users and a smart grid control center (CC), by utilizing various communication infrastructures and embedded devices. To extract valuable information from users’ power ...

research-article
MIAT Efficient analysis of adaptive variable-rate tasks▪
Abstract

Response time analysis of adaptive variable-rate tasks (AVR tasks) is a challenging problem in automotive real-time systems. While in periodic event-triggered systems, the worst-case response time is easy to determine, the analysis of ...

research-article
Symbolic identification of shared memory based bank conflicts for GPUs
Abstract

Graphic processing units (GPUs) are routinely used for general purpose computations to improve performance. To achieve the sought performance gains, care must be invested in fine tuning the way GPU programs interact with the underlying ...

research-article
Multiserver configuration for cloud service profit maximization in the presence of soft errors based on grouped grey wolf optimizer
Abstract

With the growing demand of cloud customers for computing resources, cloud computing has become more and more popular. As a pay-as-you-go model, cloud computing enables customers to use cloud services on demand anytime, anywhere over ...

research-article
IRO: Integrity–Reliability enhanced Ring ORAM
Abstract

Memory security and reliability are two major design concerns in cloud computing systems. State-of-the-art memory security–reliability co-designs (e.g., Synergy) have achieved a good balance in performance, security, and reliability. ...

research-article
Heterogeneous online/offline signcryption for secure communication in Internet of Things
Abstract

Internet of things (IoT) is a promising network that combines various information sensing devices with the Internet to realize the interconnection of pervasive things. Security is a pivotal issue to ensure widespread adoption of the ...

research-article
A survey on silicon PUFs
Abstract

Integrated Circuits (ICs) and electronic devices have become an integral part of daily human life (mobile, home, car, etc.). However, specific security measures should be taken to protect the communicated information to and from these ...

research-article
Towards highly-concurrent leaderless state machine replication for distributed systems
Abstract

State Machine Replication (SMR) is a fault-tolerant service implementation technique used by many modern Internet services. A single leader is used in classic SMR to order all state machine commands. Due to the scalability and ...

Reviews
review-article
A survey of energy-aware scheduling in mixed-criticality systems
Abstract

Unlike traditional embedded systems only have one criticality level, mixed-criticality (MC) systems integrate different types of applications or functionalities into a common and shared platform. There are many studies focusing on ...

Special Issue on Cyber Security for Internet of Things (WASA2021)
research-article
Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control
Abstract

Programmable controllers, critical components in Industrial Control Systems (ICS), are the bridge between cyberspace and physical world. With the development of the Industrial Internet of Things (IIoT), they are no longer physically ...

research-article
Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks
Abstract

Internet of Things (IoT) has become more important for setting up a smart environment, e.g., smart home. It is a network of connected devices, which can provide many benefits such as automating and controlling the tasks on a daily ...

Special issue on Dependability in IoT Systems/Apps/Tools and Applications (DependSys-IoT21)
research-article
A survey and taxonomy of consensus protocols for blockchains
Abstract

Blockchain is an emerging decentralized and distributed technology. Along with the beneficial features of decentralization, transparency, and security the consensus algorithms of blockchains form key building blocks for this ...

research-article
Adversarial attacks and defenses in Speaker Recognition Systems: A survey
Abstract

Speaker recognition has become very popular in many application scenarios, such as smart homes and smart assistants, due to ease of use for remote control and economic-friendly features. The rapid development of SRSs is inseparable ...

Special Issue for Memory and Storage Computing (MSC)
research-article
PQ-PIM: A pruning–quantization joint optimization framework for ReRAM-based processing-in-memory DNN accelerator
Abstract

Pruning and quantization are two efficient techniques to achieve performance improvement and energy saving for ReRAM-based DNN accelerators. However, most existing ReRAM-based DNN accelerators using pruning and quantization are based ...

Comments