|
|
|
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac...
ver más
|
|
|
|
|
|
Zoe Mbikayi, Agnes Steinert, Dominik Heimsch, Moritz Speckmaier, Philippe Rudolph, Hugh Liu and Florian Holzapfel
The use of non-piloted eVTOL aircraft in non-segregated airspace requires reliable and deterministic automatic flight guidance systems for the aircraft to remain predictable to all the users of the airspace and maintain a high level of safety. In this pa...
ver más
|
|
|
|
|
|
Wenjun Li, Xueying Yang, Chao Xu and Yongjie Yang
In the directed co-graph edge-deletion problem, we are given a directed graph and an integer k, and the question is whether we can delete, at most, k edges so that the resulting graph is a directed co-graph. In this paper, we make two minor contributions...
ver más
|
|
|
|
|
|
Anna Agustí-Torra, Marc Ferré-Mancebo, Gabriel David Orozco-Urrutia, David Rincón-Rivera and David Remondo
Time-Sensitive Networking (TSN) aims to provide deterministic communications over Ethernet. The main characteristics of TSN are bounded latency and very high reliability, thus complying with the strict requirements of industrial communications or automot...
ver más
|
|
|
|
|
|
Jiawei Zhu, Bo Li, Hao Ouyang, Yuhan Wang and Ziyue Bai
Walking exercise is a prevalent physical activity in urban areas, with streetscapes playing a significant role in shaping preferences. Understanding this influence is essential for creating urban environments conducive to walking exercise and improving r...
ver más
|
|
|