|
|
|
Tuan Phong Tran, Anh Hung Ngoc Tran, Thuan Minh Nguyen and Myungsik Yoo
Multi-access edge computing (MEC) brings computations closer to mobile users, thereby decreasing service latency and providing location-aware services. Nevertheless, given the constrained resources of the MEC server, it is crucial to provide a limited nu...
ver más
|
|
|
|
|
|
|
Ali Pashazadeh, Giovanni Nardini and Giovanni Stea
In recent years, the need for computation-intensive applications in mobile networks requiring more storage, powerful processors, and real-time responses has risen substantially. Vehicular networks play an important role in this ecosystem, as they must su...
ver más
|
|
|
|
|
|
|
Vassilis Papaspirou, Maria Papathanasaki, Leandros Maglaras, Ioanna Kantzavelou, Christos Douligeris, Mohamed Amine Ferrag and Helge Janicke
Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. ...
ver más
|
|
|
|
|
|
|
Luís Gameiro, Carlos Senna and Miguel Luís
The Information-Centric Network (ICN) paradigm has been touted as one of the candidates for the Internet of the future, where the Named Data Network (NDN) architecture is the one leading the way. Despite the large amount of works published in the literat...
ver más
|
|
|
|
|
|
|
Jiajian Tang, Zhenfu Cao, Jiachen Shen and Xiaolei Dong
With the development of privacy-preserving techniques, the increasing demand for secure multiparty computation (MPC) of mobile devices has become a significant challenge. Unfortunately, it is inapplicable for mobile devices to implement the existing secu...
ver más
|
|
|
|
|
|
|
Viktar Atliha and Dmitrij ?e?ok
Image captioning is a very important task, which is on the edge between natural language processing (NLP) and computer vision (CV). The current quality of the captioning models allows them to be used for practical tasks, but they require both large compu...
ver más
|
|
|
|
|
|
|
Laurent Antonczak and Thierry Burger-Helmchen
While creativity is most commonly associated with idea generation and problem solving at the individual or team level, it is likewise associated with environments, technologies, tools and artefacts favouring or hindering creative capabilities. Research s...
ver más
|
|
|
|
|
|
|
Joseph Isabona, Agbotiname Lucky Imoize, Stephen Ojo, Olukayode Karunwi, Yongsung Kim, Cheng-Chi Lee and Chun-Ta Li
Modern cellular communication networks are already being perturbed by large and steadily increasing mobile subscribers in high demand for better service quality. To constantly and reliably deploy and optimally manage such mobile cellular networks, the ra...
ver más
|
|
|
|
|
|
|
Shaked Delarea and Yossi Oren
Fault attacks are traditionally considered under a threat model that assumes the device under test is in the possession of the attacker. We propose a variation on this model. In our model, the attacker integrates a fault injection circuit into a maliciou...
ver más
|
|
|
|
|
|
|
Kai Ilie Smith and Sara Shirowzhan
The outbreak of the Delta Variant of COVID-19 presents a natural experiment without modern precedent. As authorities scrambled to control the spread of the disease in Australia?s largest cities, construction workers were allowed to keep working on site w...
ver más
|
|
|
|