筛选条件 共查询到198条结果
排序方式
An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 116 ()

Authentication schemes based on homomorphic message authentication codes (HMACs) with or without a homomorphic cryptographic signature (HCS) have alwa......

A global-energy-aware virtual machine placement strategy for cloud data centers

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 116 ()

Virtual machine (VM) placement is a key technique for energy optimization in cloud data centers. Previous work generally focus on how to place the VMs......

Digital signature with cryptographic reverse firewalls

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 116 ()

The Snowden's Prism incident warned people great threats from internal adversaries. Cryptographic Reverse Firewalls (CRFs), one mean to resolve the pr......

An enhanced planned obsolescence attack by aging networks-on-chip

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 117 ()

Despite of a controversial practice, having the key components of a product undergo accelerated aging has been a very effective approach for planned o......

Hybrid short-term traffic forecasting architecture and mechanisms for reservation-based Cooperative ITS

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 117 ()

Traffic forecasting is a critical challenge for Intelligent Transportation Systems (ITS), increasingly enabled by the deepening interconnectedness of ......

C2AADL_Reverse: A model-driven reverse engineering approach to development and verification of safety-critical software

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 118 ()

The safety-critical system communities have been struggling to manage and maintain their legacy software systems because upgrading such systems has be......

SparkNoC: An energy-efficiency FPGA-based accelerator using optimized lightweight CNN for edge computing

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 115 ()

Over the past few years, Convolution Neural Networks (CNN) have been extensively adopted in broad AI applications and have achieved noticeable effect.......

A cross-layer fault propagation analysis method for edge intelligence systems deployed with DNNs

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 116 ()

To evaluate the impact of soft errors on convolutional neural networks (CNNs) deployed in edged computation systems, we propose a data-driven assessme......

A QoS-guaranteed online user data deployment method in edge cloud computing environment

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 118 ()

App vendors now have a new way to deploy applications on edge servers thanks to the rise of edge cloud computing. App vendors will be able to deliver ......

Wireless edge caching based on content similarity in dynamic environments

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 115 ()

Edge caching could greatly relieve the burden of the backbone network and reduce the content request latency experienced by end-user devices. This mak......

A public key encryption scheme based on a new variant of LWE with small cipher size

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 117 ()

The lattice cryptosystem is considered to be able to resist the attacks of quantum computers. Lattice-based Public Key Encryption (PKE) schemes have a......

Balancing memory-accessing and computing over sparse DNN accelerator via efficient data packaging

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 117 ()

Embedded devices are common carriers for deploying inference networks, which leverage the customized accelerator to achieve the promised performance w......

AucSwap: A Vickrey auction modeled decentralized cross-blockchain asset transfer

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 117 ()

With the rapid development of blockchain technology, the cross-blockchain asset transfer has been in great demand. However, most existing cross-blockc......

Understanding security failures of anonymous authentication schemes for cloud environments

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 118 ()

Currently, password-based remote authentication mechanism has become an essential procedure to ensure users access the resources of the cloud server s......

Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment

期刊: JOURNAL OF SYSTEMS ARCHITECTURE, 2021; 115 ()

Intelligent telehealth system (ITS) provides patients and medical institutions with a lot of convenience, medical institutions can achieve medical ser......

共198条页码: 1/14页15条/页