Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 148, Issue CMar 2024
Reflects downloads up to 10 Nov 2024Bibliometrics
Skip Table Of Content Section
Reviews
review-article
Automating application-driven customization of ASIPs: A survey
Abstract

The rapid advancements and stringent requirements of modern embedded computing systems have led to a surge in the demand for customized processors that can efficiently cater to specific application needs. This survey paper delves into the realm ...

review-article
Machine learning-based computation offloading in multi-access edge computing: A survey
Abstract

The advancement of technology towards the realization of the evolving mobile computing paradigm brings a rapid paradigm shift in its usage, especially in the Internet, computation, and communications, that has a profound impact on businesses, ...

Research Paper
research-article
Code generation for Security and Stability Control System based on extended reactive component
Abstract

The Security and Stability Control System (SSCS) is developed to ensure the safe and stable operation of power grids, effectively mitigating failure propagation through emergency control strategies. However, due to the diversity, complexity, and ...

research-article
CLFLDP: Communication-efficient layer clipping federated learning with local differential privacy
Abstract

Privacy preserving is a severe challenge in machine learning and artificial intelligence. Recently, many works have been devoted to solving this problem by proposing various federated learning frameworks and introducing local differential ...

research-article
VSPAKE: Provably secure verifier-based PAKE protocol for client/server model in TLS ciphersuite
Abstract

Nowadays, password-authenticated key exchange (PAKE) protocols have actually been widely used in our daily life to provide security assurance, by which two parties can achieve mutual authentication and cryptographic session key establishment via ...

research-article
Attribute-based searchable encryption with decentralized key management for healthcare data sharing
Abstract

In this paper, we address the secure sharing of sensitive healthcare data in blockchain-based healthcare. As a form of sensitive information, healthcare data is often encrypted before being uploaded to cloud servers. Extensive research has been ...

research-article
Homogeneous teacher based buffer knowledge distillation for tiny neural networks
Abstract

Knowledge Distillation (KD) has shown great promise in improving the performance of tiny neural networks. Most existing KD methods have the large teacher–student discrepancy, thus, students hardly learn useful knowledge and may not achieve ...

research-article
Ensuring consistent recovery under power failure with minimal NVM write overhead
Abstract

Intermittent embedded devices and systems are widely used in various scenarios, but they often experience power failures due to unstable power supplies. Non-volatile memory (NVM) is gaining popularity in embedded systems due to its byte-...

research-article
VPSS: A DAG scheduling heuristic with improved response time bound
Abstract

Real-time and embedded systems are shifting from single-core to multi-core platforms, on which software must be parallelized to fully utilize the computation power of multi-core hardware. Most current real-time parallel tasks can be modeled as ...

research-article
An efficient multi-task learning CNN for driver attention monitoring
Abstract

Driver Monitoring System (DMS), usually equipped with a camera, is an emerging vehicle safety system that can monitor driver attentiveness and trigger timely alarms when signs of inattention are detected. Since a single indicator (e.g., eye blink ...

research-article
HiEval: A scheduling performance estimation approach for spatial accelerators via hierarchical abstraction
Abstract

Workload scheduling strategy, referred to as mapping, plays a vital role in exploring hardware spatial accelerator performance. Evaluating all possible mappings experimentally is infeasible, thus we propose HiEval, to efficiently and accurately ...

research-article
Parametric WCET as a function of procedure arguments: Analysis and applications
Abstract

Traditional Worst-Case Execution Time analysis derives an upper-bound to the execution time of a program for any possible combination of its software and hardware parameters. In comparison, Parametric Worst-Case Execution Time analysis derives a ...

research-article
Doppel: A BFT consensus algorithm for cyber-physical systems with low latency
Abstract

The integration of blockchain technology with Cyber-Physical Systems (CPS) has gained significant attention across various industry domains such as manufacturing, healthcare, transportation, and energy management. The consensus mechanism serves ...

Special issue on Distributed Learning and Blockchain Enabled Infrastructures for Next Generation of Big Data Driven Cyber-Physical Systems
research-article
HCEC: An efficient geo-distributed deep learning training strategy based on wait-free back-propagation
Abstract

Valuable data is often distributed across multiple data centers (DCs). Deep learning (DL) tasks, constrained by privacy regulations, utilize local training and model averaging to facilitate collaborative training across multiple DCs. However, the ...

research-article
Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things
Abstract

While federated learning (FL) is a well-known privacy-preserving (PP) solution, recent studies demonstrate that it still has privacy problems and vulnerabilities, particularly in the context of the Next Generation Internet-of-Things (NG-IoT). ...

Special issue of International Conference on Reliable Software Technologies AEiC 2023
research-article
Time-predictable task-to-thread mapping in multi-core processors
Abstract

The performance of time-predictable systems can be improved in multi-core processors using parallel programming models (e.g., OpenMP). However, schedulability analysis of parallel applications is a big challenge due to their sophisticated ...

Special issue on Architecture of Computing Systems Conference 2023
research-article
Real-time rate control of WebRTC video streams in 5G networks: Improving quality of experience with Deep Reinforcement Learning
Abstract

Adapting to a dynamic environment is a critical challenge in deploying robust systems that will be tasked with transmitting media streams in 5G networks. The Web Real-Time Communication (WebRTC) protocol is one of the most popular solutions for ...

Comments