A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
DAAS: Differentiable Architecture and Augmentation Policy Search
[article]
2022
arXiv
pre-print
The searched architecture is evaluated by training on datasets with fixed data augmentation policies. ...
Therefore, this work considers the possible coupling between neural architectures and data augmentation and proposes an effective algorithm jointly searching for them. ...
Therefore, the gradient of search loss Lv w.r.t. architecture parameters a = {α, β} can be formulated as Algorithm 1 DAAS: Differentiable Architecture and Augmentation Policy Search Parameters of supernet ...
arXiv:2109.15273v2
fatcat:qvet6o3mqjgr7dtgfjakero3iu
PolicyCLOUD: A prototype of a Cloud Serverless Ecosystem for Policy Analytics
[article]
2022
arXiv
pre-print
PolicyCLOUD allows flexible exploitation and management of policy-relevant dataflows by enabling the practitioner to register datasets and specify a sequence of transformations and/or information extraction ...
Furthermore, PolicyCLOUD has developed a first of its kind legal and ethical framework that covers the usage and dissemination of datasets and analytic functions throughout its policy-relevant dataflows ...
The authors are grateful to the rest of the PolicyCLOUD crew for their cooperation and support. Funding statement. "The research leading to the results presented in this article received funding from ...
arXiv:2201.06077v1
fatcat:crefonoz5rh6vpsclik7drhv3q
Reintegrating biology: A data-centric approach
2020
Zenodo
Here, we define the primary challenges in data integration and present a vision for a Data as a Service (DaaS) oriented architecture that enables frictionless data reuse, hypothesis testing, and discovery ...
The proposed data integration infrastructure includes standards development, a suite of tools and services, and strategies for education and sustainability. ...
Acknowledgements The authors would like to thank the National Science Foundation for creating the collaborative space to draft this manuscript and our fellow BII workshop participants for feedback and ...
doi:10.5281/zenodo.3871982
fatcat:qwqr4cdzxbek3osxraipap6bja
Mobile Web Services: State of the Art and Challenges
2014
International Journal of Advanced Computer Science and Applications
We study the different provisioning architectures, enabler technologies, publishing and discovery mechanisms, and maintenance of up-to-date service registries. ...
We focus our discussions on its applicability, reliability, and challenges of mobile environments and resource constraints. ...
DaaS [74] is a context-aware cloud-based platform that offers discovery as a service. ...
doi:10.14569/ijacsa.2014.050324
fatcat:hdu2kik4kffl3pxsfqej4fqv3y
Enforcing privacy in e-commerce by balancing anonymity and trust
2011
Computers & security
A stronger version is designed and adopted, together with an innovative differential-privacy preserving function, in the new privacy paradigm. ...
The strengthened e-poll protocol and the new differential-privacy preserving function, which strictly speaking only are side contributions of this paper, each appear as important as the new e-commerce ...
This work was partially supported by the FP7-ICT-2007-1 Project no. 216471, "AVANTSSAR: Automated Validation of Trust and Security of Service-oriented Architectures" (www.avantssar.eu). ...
doi:10.1016/j.cose.2011.08.005
fatcat:co247afcdvfdhea56tljgu6ptq
Science and Technology Parks: A Futuristic Approach
2022
IEEE Access
Furthermore, this study evaluates security and privacy challenges associated with autonomous systems and data-oriented services and recommends appropriate security measures. ...
Therefore, this paper carries out an in-depth study of world s best practices in smart cities and science and technology parks, their characteristics, and value-added contributions that excite the prospective ...
Similarly, DaaS can access iSecurity and Safety system for various search, rescue and relief efforts. ...
doi:10.1109/access.2022.3159798
fatcat:6tnosyhsqnfspbszbgx7dxcvaq
Adversarial Attacks and Defenses in Deep Learning
2020
Engineering
Hence, adversarial attack and defense techniques have attracted increasing attention from both machine learning and security communities and have become a hot research topic in recent years. ...
With the rapid developments of artificial intelligence (AI) and deep learning (DL) techniques, it is critical to ensure the security and robustness of the deployed algorithms. ...
[66] first propose the use of an AC-GAN architecture [32] for data augmentation to improve the generality of PGD adversarial training. ...
doi:10.1016/j.eng.2019.12.012
fatcat:zig3ascmqjfgboauj2276wuvcy
Guest Editorial Special Issue on Intent-Based Networking for 5G-Envisioned Internet of Connected Vehicles
2021
IEEE transactions on intelligent transportation systems (Print)
By offering a wide variety of infotainment services, fleet operations, and invehicle applications, IoCV has gained the tremendous capacity to provide a safer and sustainable transportation system to the ...
To accomplish these objectives, a programmable and scalable network paradigm is the need of the hour that ...
Space Search algorithms for the flow classification suitable for GPUs using CUDA (compute unified device architecture). ...
doi:10.1109/tits.2021.3101259
fatcat:gwasd62i7jdkfn4vjkvtenqejm
A Survey on Intrusion Detection Systems for Fog and Cloud Computing
2022
Future Internet
Hence, there is an absolute need to differentiate boundaries in personal information and cloud and fog computing globally and the adoption of specific information security policies and regulations. ...
policies. ...
The first approach considers where the traffic originates from a subscriber and aims towards the internet-it uses DaaS units to analyze the traffic and differentiate between anomalies and maliciousness ...
doi:10.3390/fi14030089
fatcat:wxlz2xeduzdpvbyf63rwosal7e
Technical Research Priorities for Big Data
[chapter]
2021
The Elements of Big Data Value
AbstractTo drive innovation and competitiveness, organisations need to foster the development and broad adoption of data technologies, value-adding use cases and sustainable business models. ...
This chapter details a community-driven initiative to identify and characterise the key technical research priorities for research and development in data technologies. ...
, or DaaS). ...
doi:10.1007/978-3-030-68176-0_5
fatcat:c2ydwkla6ngrxfatohkuxqnfm4
TrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware
[chapter]
2015
Lecture Notes in Computer Science
With scalability, fault tolerance, ease of programming, and flexibility, MapReduce has gained many attractions for large-scale data processing. ...
Thanks to TrustedMR, encrypted data can then be processed by untrusted computing nodes without any modification to the existing MapReduce framework and code. ...
This work is partially funded by project ANR-11-INSE-0005 "Keeping your Information Safe and Secure". ...
doi:10.1007/978-3-319-26148-5_3
fatcat:nsunishsirbudn24ujpn5l3hc4
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
2018
Future generations computer systems
. vehicular networks, augmented reality). ...
The main goal of this study is to holistically analyse the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration ...
Acknowledgements This work was partially supported by the Spanish Ministry of Economy and Competitiveness through the PERSIST (TIN2013-41739-R) project, and by the European Commission through the NeCS ...
doi:10.1016/j.future.2016.11.009
fatcat:haixt66hn5ftbgr2rytmliffiq
The Potential of Cloud Federation
2021
Zenodo
Organizational principles and best practices of federations are described, as well as mechanisms for technical and service organization and coordination. ...
The use of federated IT service structures to enable effective cloud-to-edge integration as well as secure access, sharing and analysis of distributed data is also described. ...
standards and policies. ...
doi:10.5281/zenodo.4733566
fatcat:zywgvqxrxrbz5bvmqx3r5ocamu
A summary of two recent UAS command and control (C2) communications feasibility studies
2016
2016 IEEE Aerospace Conference
This paper will summarize the solicitation, approach and results of the two studies teams led by Aviation Management Associates, Inc. and Exelis Inc. ...
The studies investigated the feasibility of "Point-to-Point" (PTP) and "Network" approaches to UAS C2 to better understand potential user needs and to explore evolutionary paths to establishing a nation-wide ...
of the same basic C2 architecture and infrastructure. ...
doi:10.1109/aero.2016.7500666
fatcat:qgr2nnlomndoffaauichphvucu
Matching-based Service Offloading for Compute-less Driven IoT Networks
[article]
2022
arXiv
pre-print
., augmented reality, virtual reality, artificial intelligence) are computation-intensive and delay-sensitivity. ...
With the advent of the Internet of Things (IoT) and 5G networks, edge computing is offering new opportunities for business model and use cases innovations. ...
ACKNOWLEDGMENTS The authors would like to thank the Natural Sciences and Engineering Research Council of Canada (NSERC) for the financial support of this research. ...
arXiv:2201.04195v1
fatcat:bv6v26eewfgdxblafwkmjtvehq
« Previous
Showing results 1 — 15 out of 128 results