Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Blockchain (2)
- Cloud images (1)
- Cooperative intrusion detection system (1)
- Cyberattacks (1)
- Cybersecurity (1)
-
- DNN partitioning (1)
- Deep Neural Networks (1)
- Edge computing (1)
- Edge/Cloud Inference (1)
- Electronic Health Records (1)
- Energy saving (1)
- Features (1)
- Healthcare (1)
- Latency (1)
- Long-term optimization (1)
- Multi-view 3D reconstruction (1)
- Quorum (1)
- Resource allocation (1)
- Signatures (1)
- Stress test (1)
- Tps (1)
- Virtual machines (1)
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang
Resource Management In Mobile Edge Computing For Compute-Intensive Application, Xiaojie Zhang
Dissertations, Theses, and Capstone Projects
With current and future mobile applications (e.g., healthcare, connected vehicles, and smart grids) becoming increasingly compute-intensive for many mission-critical use cases, the energy and computing capacities of embedded mobile devices are proving to be insufficient to handle all in-device computation. To address the energy and computing shortages of mobile devices, mobile edge computing (MEC) has emerged as a major distributed computing paradigm. Compared to traditional cloud-based computing, MEC integrates network control, distributed computing, and storage to customizable, fast, reliable, and secure edge services that are closer to the user and data sites. However, the diversity of applications and a variety …
Blockchain-Based Architecture For Secured Cyberattack Signatures And Features Distribution, Oluwaseyi J. Ajayi
Blockchain-Based Architecture For Secured Cyberattack Signatures And Features Distribution, Oluwaseyi J. Ajayi
Dissertations and Theses
One effective way of detecting malicious traffic in computer networks is intrusion detection systems (IDS). Despite the increased accuracy of IDSs, distributed or coordinated attacks can still go undetected because of the single vantage point of the IDSs. Due to this reason, there is a need for attack characteristics' exchange among different IDS nodes. Another reason for IDS coordination is that a zero-day attack (an attack without a known signature) experienced in organizations located in different regions is not the same. Collaborative efforts of the participating IDS nodes can stop more attack threats if IDS nodes exchange these attack characteristics …
Adaptive Effort Classifiers: A System Design For Partitioned Edge/Cloud Inference, Divya Sankar
Adaptive Effort Classifiers: A System Design For Partitioned Edge/Cloud Inference, Divya Sankar
Dissertations and Theses
The massive growth in availability of real-world data from connected devices and the overwhelming success of Deep Neural Networks (DNNs) in many ArtificialIntelligence (AI) tasks have enabled AI-based applications and services to become commonplace across the spectrum of computing devices from edge/Internet-of-Things (IoT) devices to data centers and the cloud. However, DNNs incur high computational cost (compute operations, memory footprint and bandwidth),which far outstrip the capabilities of modern computing platforms. Therefore improving the computational efficiency of DNNs wide-spread commercial deployment and success.In this thesis, we address the computational efficiency challenge in the context ofAI inference applications executing on edge/cloud systems, …
Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera
Quorum Blockchain Stress Evaluation In Different Environments, Daniel P. Mera
Student Theses
In today’s world, the Blockchain technology is used for different purposes has brought an increment in the development of different Blockchain platforms, services, and utilities for storing data securely and efficiently. Quorum Blockchain, an Ethereum fork created by JPMorgan Chase, has placed itself in one of the widely used, efficient and trustful Blockchain platforms available today. Because of the importance which Quorum is contributing to the world, it is important to test and measure different aspects of the platform, not only to prove how efficient the software can be but as well as to have a clear view on what …