Energy-aware fault-tolerant scheduling for imprecise mixed-criticality systems with semi-clairvoyance
Integrating tasks with different functions and criticality levels onto the same hardware platform forms mixed-criticality systems (MCSs). Semi-clairvoyant scheduling, in which the mode transition is revealed at the arrival of high-criticality ...
A comprehensive survey of digital twins: Applications, technologies and security challenges
Alongside advancements in Artificial Intelligence (AI), significant progress has been made in big data processing, edge/cloud computing, and ubiquitous computing in the past two decades. These advancements catalyzed the development and adoption ...
REDB: Real-time enhancement of Docker containers via memory bank partitioning in multicore systems
Docker is a lightweight virtualization technology adopted by numerous companies to develop, deploy, and manage applications. However, All Docker containers running on the same system share system resources, leading to performance interference ...
Untraceable blockchain-assisted authentication and key exchange in medical consortiums
Medical consortium provides tamper-proof data sharing of patient medical records. Since the communications of patients’ devices with hospital servers are accomplished through insecure mediums, scholars have suggested secure authentication ...
Decentralized computation offloading via multi-agent deep reinforcement learning for NOMA-assisted mobile edge computing with energy harvesting devices
Supporting latency-sensitive and computation-intensive applications is hardly possible for mobile devices (MDs) with limited battery capacity and low computing resources. Therefore, mobile edge computing (MEC) and wireless power transfer (WPT) ...
Highlights
- Formulating the problem of decentralized computation offloading in NOMA-assisted MEC.
- Aiming at reducing delay and energy of MDs under deadline and battery level constraints.
- Proposing an offloading scheme based on multi-agent DRL ...
An SGX-based online voting protocol with maximum voter privacy
Electronic voting (E-voting), a crucial method in modern society, balances efficiency with the need for equity, reliability, and privacy to accurately record votes and maintain democracy. However, there is the challenge of potential leakage of ...
Efficient privacy-preserving Gaussian process via secure multi-party computation
Gaussian processes (GPs), known for their flexibility as non-parametric models, have been widely used in practice involving sensitive data (e.g., healthcare, finance) from multiple sources. With the challenge of data isolation and the need for ...
A gene-inspired metaheuristic for scheduling workflow tasks in mobile edge computing-supported cyber–physical systems
This paper proposes a cost-minimization scheduling algorithm for the joint optimization of task offloading and resource allocation for workflow applications in a mobile edge computing (MEC)-supported cyber–physical system. We model this ...
Resource-aware Montgomery modular multiplication optimization for digital signal processing
Homomorphic encryption is an important technology for protecting data privacy, and the performance of modular multiplication directly affects the efficiency of homomorphic encryption. Currently, there are numerous FPGA-based acceleration ...
A survey on Persistent Memory indexes: Recent advances, challenges and opportunities
The Non-volatile Memory (NVM) technology belongs to a novel class of storage devices that offer byte-addressability like DRAM and durability as in persistent storage. The NVM is known as Storage Class Memory (SCM), Non-volatile RAM (NVRAM), or ...
Cold start latency mitigation mechanisms in serverless computing: Taxonomy, review, and future directions
Today, Function-as-a-Service (FaaS), as an emerging path to implementing serverless computing paradigm, seems quite promising in responding to the growing increase in requests for microservices. However, the serverless computing model also brings ...
NGS: A network GPGPU system for orchestrating remote and virtual accelerators
In General-Purpose computing on Graphics Processing Unit (GPGPU), the use of CPUs is combined with that of GPUs. CPUs are used for sequential code, while GPUs are used for parallel code. GPGPU has been enabled by two key factors: (i) the ...