Filters








128 Hits in 3.2 sec

DAAS: Differentiable Architecture and Augmentation Policy Search [article]

Xiaoxing Wang, Xiangxiang Chu, Junchi Yan, Xiaokang Yang
2022 arXiv   pre-print
The searched architecture is evaluated by training on datasets with fixed data augmentation policies.  ...  Therefore, this work considers the possible coupling between neural architectures and data augmentation and proposes an effective algorithm jointly searching for them.  ...  Therefore, the gradient of search loss Lv w.r.t. architecture parameters a = {α, β} can be formulated as Algorithm 1 DAAS: Differentiable Architecture and Augmentation Policy Search Parameters of supernet  ... 
arXiv:2109.15273v2 fatcat:qvet6o3mqjgr7dtgfjakero3iu

PolicyCLOUD: A prototype of a Cloud Serverless Ecosystem for Policy Analytics [article]

Ofer Biran, Oshrit Feder, Yosef Moatti, Athanasios Kiourtis, Dimosthenis Kyriazis, George Manias, Argyro Mavrogiorgou, Nikitas M. Sgouros, Martim Taborda Barata, Isabella Oldani, María Angeles Sanguino, Pavlos Kranas
2022 arXiv   pre-print
PolicyCLOUD allows flexible exploitation and management of policy-relevant dataflows by enabling the practitioner to register datasets and specify a sequence of transformations and/or information extraction  ...  Furthermore, PolicyCLOUD has developed a first of its kind legal and ethical framework that covers the usage and dissemination of datasets and analytic functions throughout its policy-relevant dataflows  ...  The authors are grateful to the rest of the PolicyCLOUD crew for their cooperation and support. Funding statement. "The research leading to the results presented in this article received funding from  ... 
arXiv:2201.06077v1 fatcat:crefonoz5rh6vpsclik7drhv3q

Reintegrating biology: A data-centric approach

Anne E Thessen, Paul Bogdan, David J Patterson, Theresa Casey, Cesar Hinojo, Orlando de Lange, Melissa A Haendel
2020 Zenodo  
Here, we define the primary challenges in data integration and present a vision for a Data as a Service (DaaS) oriented architecture that enables frictionless data reuse, hypothesis testing, and discovery  ...  The proposed data integration infrastructure includes standards development, a suite of tools and services, and strategies for education and sustainability.  ...  Acknowledgements The authors would like to thank the National Science Foundation for creating the collaborative space to draft this manuscript and our fellow BII workshop participants for feedback and  ... 
doi:10.5281/zenodo.3871982 fatcat:qwqr4cdzxbek3osxraipap6bja

Mobile Web Services: State of the Art and Challenges

Khalid Elgazzar, Patrick Martin
2014 International Journal of Advanced Computer Science and Applications  
We study the different provisioning architectures, enabler technologies, publishing and discovery mechanisms, and maintenance of up-to-date service registries.  ...  We focus our discussions on its applicability, reliability, and challenges of mobile environments and resource constraints.  ...  DaaS [74] is a context-aware cloud-based platform that offers discovery as a service.  ... 
doi:10.14569/ijacsa.2014.050324 fatcat:hdu2kik4kffl3pxsfqej4fqv3y

Enforcing privacy in e-commerce by balancing anonymity and trust

Giampaolo Bella, Rosario Giustolisi, Salvatore Riccobene
2011 Computers & security  
A stronger version is designed and adopted, together with an innovative differential-privacy preserving function, in the new privacy paradigm.  ...  The strengthened e-poll protocol and the new differential-privacy preserving function, which strictly speaking only are side contributions of this paper, each appear as important as the new e-commerce  ...  This work was partially supported by the FP7-ICT-2007-1 Project no. 216471, "AVANTSSAR: Automated Validation of Trust and Security of Service-oriented Architectures" (www.avantssar.eu).  ... 
doi:10.1016/j.cose.2011.08.005 fatcat:co247afcdvfdhea56tljgu6ptq

Science and Technology Parks: A Futuristic Approach

Imran Makhdoom, Justin Lipman, Mehran Abolhasan, Duncan Challen
2022 IEEE Access  
Furthermore, this study evaluates security and privacy challenges associated with autonomous systems and data-oriented services and recommends appropriate security measures.  ...  Therefore, this paper carries out an in-depth study of world s best practices in smart cities and science and technology parks, their characteristics, and value-added contributions that excite the prospective  ...  Similarly, DaaS can access iSecurity and Safety system for various search, rescue and relief efforts.  ... 
doi:10.1109/access.2022.3159798 fatcat:6tnosyhsqnfspbszbgx7dxcvaq

Adversarial Attacks and Defenses in Deep Learning

Kui Ren, Tianhang Zheng, Zhan Qin, Xue Liu
2020 Engineering  
Hence, adversarial attack and defense techniques have attracted increasing attention from both machine learning and security communities and have become a hot research topic in recent years.  ...  With the rapid developments of artificial intelligence (AI) and deep learning (DL) techniques, it is critical to ensure the security and robustness of the deployed algorithms.  ...  [66] first propose the use of an AC-GAN architecture [32] for data augmentation to improve the generality of PGD adversarial training.  ... 
doi:10.1016/j.eng.2019.12.012 fatcat:zig3ascmqjfgboauj2276wuvcy

Guest Editorial Special Issue on Intent-Based Networking for 5G-Envisioned Internet of Connected Vehicles

Sahil Garg, Mohsen Guizani, Ying-Chang Liang, Fabrizio Granelli, Neeli Prasad, Ranga Rao Venkatesha Prasad
2021 IEEE transactions on intelligent transportation systems (Print)  
By offering a wide variety of infotainment services, fleet operations, and invehicle applications, IoCV has gained the tremendous capacity to provide a safer and sustainable transportation system to the  ...  To accomplish these objectives, a programmable and scalable network paradigm is the need of the hour that  ...  Space Search algorithms for the flow classification suitable for GPUs using CUDA (compute unified device architecture).  ... 
doi:10.1109/tits.2021.3101259 fatcat:gwasd62i7jdkfn4vjkvtenqejm

A Survey on Intrusion Detection Systems for Fog and Cloud Computing

Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu, Anna Kobusińska
2022 Future Internet  
Hence, there is an absolute need to differentiate boundaries in personal information and cloud and fog computing globally and the adoption of specific information security policies and regulations.  ...  policies.  ...  The first approach considers where the traffic originates from a subscriber and aims towards the internet-it uses DaaS units to analyze the traffic and differentiate between anomalies and maliciousness  ... 
doi:10.3390/fi14030089 fatcat:wxlz2xeduzdpvbyf63rwosal7e

Technical Research Priorities for Big Data [chapter]

Edward Curry, Sonja Zillner, Andreas Metzger, Arne J. Berre, Sören Auer, Ray Walshe, Marija Despenic, Milan Petkovic, Dumitru Roman, Walter Waterfeld, Robert Seidl, Souleiman Hasan (+2 others)
2021 The Elements of Big Data Value  
AbstractTo drive innovation and competitiveness, organisations need to foster the development and broad adoption of data technologies, value-adding use cases and sustainable business models.  ...  This chapter details a community-driven initiative to identify and characterise the key technical research priorities for research and development in data technologies.  ...  , or DaaS).  ... 
doi:10.1007/978-3-030-68176-0_5 fatcat:c2ydwkla6ngrxfatohkuxqnfm4

TrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware [chapter]

Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral
2015 Lecture Notes in Computer Science  
With scalability, fault tolerance, ease of programming, and flexibility, MapReduce has gained many attractions for large-scale data processing.  ...  Thanks to TrustedMR, encrypted data can then be processed by untrusted computing nodes without any modification to the existing MapReduce framework and code.  ...  This work is partially funded by project ANR-11-INSE-0005 "Keeping your Information Safe and Secure".  ... 
doi:10.1007/978-3-319-26148-5_3 fatcat:nsunishsirbudn24ujpn5l3hc4

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges

Rodrigo Roman, Javier Lopez, Masahiro Mambo
2018 Future generations computer systems  
. vehicular networks, augmented reality).  ...  The main goal of this study is to holistically analyse the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration  ...  Acknowledgements This work was partially supported by the Spanish Ministry of Economy and Competitiveness through the PERSIST (TIN2013-41739-R) project, and by the European Commission through the NeCS  ... 
doi:10.1016/j.future.2016.11.009 fatcat:haixt66hn5ftbgr2rytmliffiq

The Potential of Cloud Federation

Dietrich
2021 Zenodo  
Organizational principles and best practices of federations are described, as well as mechanisms for technical and service organization and coordination.  ...  The use of federated IT service structures to enable effective cloud-to-edge integration as well as secure access, sharing and analysis of distributed data is also described.  ...  standards and policies.  ... 
doi:10.5281/zenodo.4733566 fatcat:zywgvqxrxrbz5bvmqx3r5ocamu

A summary of two recent UAS command and control (C2) communications feasibility studies

Denise S. Ponchak, Gary Church, Elisabeth Auld, Stephen Henriksen
2016 2016 IEEE Aerospace Conference  
This paper will summarize the solicitation, approach and results of the two studies teams led by Aviation Management Associates, Inc. and Exelis Inc.  ...  The studies investigated the feasibility of "Point-to-Point" (PTP) and "Network" approaches to UAS C2 to better understand potential user needs and to explore evolutionary paths to establishing a nation-wide  ...  of the same basic C2 architecture and infrastructure.  ... 
doi:10.1109/aero.2016.7500666 fatcat:qgr2nnlomndoffaauichphvucu

Matching-based Service Offloading for Compute-less Driven IoT Networks [article]

Boubakr Nour, Soumaya Cherkaoui
2022 arXiv   pre-print
., augmented reality, virtual reality, artificial intelligence) are computation-intensive and delay-sensitivity.  ...  With the advent of the Internet of Things (IoT) and 5G networks, edge computing is offering new opportunities for business model and use cases innovations.  ...  ACKNOWLEDGMENTS The authors would like to thank the Natural Sciences and Engineering Research Council of Canada (NSERC) for the financial support of this research.  ... 
arXiv:2201.04195v1 fatcat:bv6v26eewfgdxblafwkmjtvehq
« Previous Showing results 1 — 15 out of 128 results