Search
Search Results
-
Minimizing cache usage with fixed-priority and earliest deadline first scheduling
Cache partitioning is a technique to reduce interference among tasks running on the processors with shared caches. To make this technique effective,...
-
A survey: contribution of ML & DL to the detection & prevention of botnet attacks
Machine Learning (ML) and Deep Learning (DL) are transforming the detection and prevention of botnets, significant threats in cybersecurity. In this...
-
A formal model-based approach to design failure-aware Internet of Things architectures
The Internet of Things (IoT) is expanding its application domains and deployments due to its rapid development. Within such architectures, ensuring...
-
MemPol: polling-based microsecond-scale per-core memory bandwidth regulation
In today’s multiprocessor systems-on-a-chip, the shared memory subsystem is a known source of temporal interference. The problem causes logically...
-
Real-time scheduling for parallel tasks with resource reclamation
This paper considers the real-time scheduling of a parallel task with reclaiming computing resources, which can be utilized for soft real-time tasks...
-
A multilevel graph approach for IoT-based complex scenario management through situation awareness and semantic approaches
Modern reality and the environments in which we live are characterized by technology components geared toward automatic management through pervasive...
-
Dependability analysis and disaster recovery measures in smart hospital systems
There is a growing importance of the Internet of Medical Things (IoMT), an emerging aspect of the Internet of Things (IoT), in smart healthcare. With...
-
Trainable Gaussian-based activation functions for sensor-based human activity recognition
Neural networks’ capability to model non-linear relationships strongly depends on their activation functions (AFs). This dependency makes the search...
-
Automated phase-type distribution fitting via expectation maximization
In numerous practical domains such as reliability and performance engineering, finance, healthcare, and supply chain management, a common challenge...
-
Early fire danger monitoring system in smart cities using optimization-based deep learning techniques with artificial intelligence
One primary safety concern for smart cities is fire. Traditional techniques are not appropriate because of their high false alarm rates, delayed...
-
Priority-based concurrency and shared resource access mechanisms for nested intercomponent requests in CAmkES
Component-based design encapsulates and isolates state and the operations on it, but timing semantics cross-cut these boundaries when a real-time...
-
HS–WOA–MANET: a hybrid meta-heuristic approach-based multi-objective constraints for energy efficient routing protocol in mobile ad hoc networks
A self-organizing, reconfigurable, and structure-less wireless network that provides intended communications without any radio infrastructure is...
-
Inference serving with end-to-end latency SLOs over dynamic edge networks
While high accuracy is of paramount importance for deep learning (DL) inference, serving inference requests on time is equally critical but has not...
-
Statistical verification of autonomous system controllers under timing uncertainties
Software in autonomous systems like autonomous cars, robots or drones is often implemented on resource-constrained embedded systems with...
-
Where Do Structures Come From?
The compactness theorem, Theorem 11.2, is one of the most frequently used basic tools of model theory. It implies that for every structure with an... -
Logical Seeing
This chapter serves as an interlude. Our goal in the following chapters is to show how tools of logic can used to uncover essential features of...