Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleApril 2024
Deployment of UAV-assisted 6G wireless networks using whale optimisation algorithm
- Md. Sakir Hossain,
- Nishat Tasnim Haque,
- Sadia Afrin,
- Md. Shakhawat Hossain,
- Md. Faisal Mahmud Anik,
- Swagoto Paul,
- Md. Ileas Pramanik,
- Md. Masudur Rahman
International Journal of Wireless and Mobile Computing (IJWMC), Volume 26, Issue 32024, pp 251–261https://doi.org/10.1504/ijwmc.2024.137882The UAV-assisted wireless network is envisioned as a key player in the sixth generation (6G) wireless systems. One of the most challenging tasks to make it practically viable is to deploy UAVs considering user density, propagation environment and other ...
- research-articleNovember 2023
Prodigy: Towards Unsupervised Anomaly Detection in Production HPC Systems
- Burak Aksar,
- Efe Sencan,
- Benjamin Schwaller,
- Omar Aaziz,
- Vitus J. Leung,
- Jim Brandt,
- Brian Kulis,
- Manuel Egele,
- Ayse K. Coskun
SC '23: Proceedings of the International Conference for High Performance Computing, Networking, Storage and AnalysisNovember 2023, Article No.: 26, pp 1–14https://doi.org/10.1145/3581784.3607076Performance variations caused by anomalies in modern High Performance Computing (HPC) systems lead to decreased efficiency, impaired application performance, and increased operational costs. While machine learning (ML)-based frameworks for automated ...
- posterOctober 2023
Deploying VizLens: Characterizing User Needs, Preferences, and Challenges of Physical Interfaces Usage in the Wild
ASSETS '23: Proceedings of the 25th International ACM SIGACCESS Conference on Computers and AccessibilityOctober 2023, Article No.: 89, pp 1–4https://doi.org/10.1145/3597638.3614493Blind or Visually Impaired (BVI) people often encounter flat, inaccessible interfaces. Current solutions lack cost-effectiveness, portability, and robustness in real-world settings. We introduce VizLens, a fully-automated, full-stack mobile application ...
- short-paperAugust 2023
Towards Practical Machine Learning Frameworks for Performance Diagnostics in Supercomputers
- Burak Aksar,
- Efe Sencan,
- Benjamin Schwaller,
- Vitus J. Leung,
- Jim Brandt,
- Brian Kulis,
- Manuel Egele,
- Ayse K. Coskun
AI4Sys '23: Proceedings of the First Workshop on AI for SystemsAugust 2023, pp 1–6https://doi.org/10.1145/3588982.3603609Supercomputers are highly sophisticated computing systems designed to handle complex and computationally intensive tasks. Despite their tremendous efficiency, performance problems still arise due to various factors, such as load imbalance, network ...
- research-articleJuly 2023
The Hunting-style Deployment of Underwater Sensor Networks
ACM Transactions on Sensor Networks (TOSN), Volume 19, Issue 4Article No.: 96, pp 1–22https://doi.org/10.1145/3604556Underwater pollution incidents occur frequently, and obtaining accurate information about their exact location and real-time situation is helpful for promptly formulating plans to contain and mitigate the situation. Autonomously adjusting the position of ...
-
- ArticleMarch 2023
Ensuring Area Coverage in Hybrid Wireless Sensor Networks
AbstractSuccess of Wireless Sensor Networks largely depends whether the deployed network can provide desired coverage with acceptable network lifetime. This paper proposes a distributed protocol for ensuring area coverage using a combination of mobile and ...
- research-articleMarch 2023
IMF2O2: A Fully Connected Sensor Deployment Algorithm for Underwater Sensor Networks
ACM Transactions on Sensor Networks (TOSN), Volume 19, Issue 3Article No.: 67, pp 1–22https://doi.org/10.1145/3577201To address the problems of node deployment schemes in existing underwater sensor networks that lack consideration of network connectivity and high deployment costs, this article constructs an optimization model that maximizes network coverage and ...
- research-articleFebruary 2023
Operationalizing machine learning models: a systematic literature review
SE4RAI '22: Proceedings of the 1st Workshop on Software Engineering for Responsible AIMay 2022, pp 1–8https://doi.org/10.1145/3526073.3527584Deploying machine learning (ML) models to production with the same level of rigor and automation as traditional software systems has shown itself to be a non-trivial task, requiring extra care and infrastructure to deal with the additional challenges. ...
- research-articleJanuary 2023
Decentralized Intent-Driven Coordination of Multi-Domain IP-Optical Networks
CNSM '22: Proceedings of the 18th International Conference on Network and Service ManagementOctober 2022, Article No.: 43, pp 1–5Intent-based networking is increasingly used to improve network control and management. Network operators have already begun to adopt this paradigm, which leads to a simplified and automatized network operation. The operators can interact with their ...
- research-articleOctober 2022
Optimization method of edge computing terminal deployment considering node division in Electric Internet of Things
BIOTC '22: Proceedings of the 2022 4th Blockchain and Internet of Things ConferenceJuly 2022, pp 115–120https://doi.org/10.1145/3559795.3559811The massive intelligent devices emerging in the Electric Internet of Things have increased demand for computing resources, but it is difficult to configure computing devices for each data point in the actual system. When using edge computing terminal to ...
A declarative modelling framework for the deployment and management of blockchain applications
MODELS '22: Proceedings of the 25th International Conference on Model Driven Engineering Languages and SystemsOctober 2022, pp 311–321https://doi.org/10.1145/3550355.3552417The deployment and management of Blockchain applications require non-trivial efforts given the unique characteristics of their infrastructure (i.e., immutability) and the complexity of the software systems being executed. The operation of Blockchain ...
- research-articleOctober 2022
Architecture synthesis for optimized and flexible production
ICSE '22: Proceedings of the ACM/IEEE 44th International Conference on Software Engineering: Companion ProceedingsMay 2022, pp 251–255https://doi.org/10.1145/3510454.3517057The fourth industrial revolution (Industry 4.0) anticipates frequent synthesis and optimization of different architectural design decisions (ADDs) - such as deployment of software components to hardware components, service composition, production ...
- research-articleOctober 2022
RetroIoT: retrofitting internet of things deployments by hiding data in battery readings
MobiCom '22: Proceedings of the 28th Annual International Conference on Mobile Computing And NetworkingOctober 2022, pp 69–81https://doi.org/10.1145/3495243.3560536Commercial Internet of Things (IoT) deployments are mostly closed-source systems that offer little to no flexibility to modify the hardware and software of the end devices. Once deployed, retrofitting such systems to an upgraded functionality requires ...
- rfcOctober 2022
RFC 9303: Locator/ID Separation Protocol Security (LISP-SEC)
This memo specifies Locator/ID Separation Protocol Security (LISP-SEC), a set of security mechanisms that provides origin authentication, integrity, and anti-replay protection to the LISP's Endpoint-ID-to-Routing-Locator (EID-to-RLOC) mapping data ...
- extended-abstractSeptember 2022
Understanding Student Perceptions Around Mandatory Use of Smartphone Apps for COVID-19
MobileHCI '22: Adjunct Publication of the 24th International Conference on Human-Computer Interaction with Mobile Devices and ServicesSeptember 2022, Article No.: 22, pp 1–5https://doi.org/10.1145/3528575.3551439In this short paper, we present our findings from a survey (n=178) conducted on a college campus to understand student perceptions of the deployment of CoVerified app to regulate COVID-19 spread on campus by limiting access to on-campus locations and ...
- research-articleSeptember 2022
Model-driven Self-adaptive Deployment of Internet of Things Applications with Automated Modification Proposals
- Jörg Christian Kirchhof,
- Anno Kleiss,
- Bernhard Rumpe,
- David Schmalzing,
- Philipp Schneider,
- Andreas Wortmann
ACM Transactions on Internet of Things (TIOT), Volume 3, Issue 4Article No.: 30, pp 1–30https://doi.org/10.1145/3549553Today’s Internet of Things (IoT) applications are mostly developed as a bundle of hardware and associated software. Future cross-manufacturer app stores for IoT applications will require that the strong coupling of hardware and software is loosened. In ...
- rfcSeptember 2022
RFC 9308: Applicability of the QUIC Transport Protocol
This document discusses the applicability of the QUIC transport protocol, focusing on caveats impacting application protocol development and deployment over QUIC. Its intended audience is designers of application protocol mappings to QUIC and ...
- research-articleAugust 2022
LiteFlow: towards high-performance adaptive neural networks for kernel datapath
SIGCOMM '22: Proceedings of the ACM SIGCOMM 2022 ConferenceAugust 2022, pp 414–427https://doi.org/10.1145/3544216.3544229Adaptive neural networks (NN) have been used to optimize OS kernel datapath functions because they can achieve superior performance under changing environments. However, how to deploy these NNs remains a challenge. One approach is to deploy these ...
- research-articleAugust 2022
Towards digital twin-enabled DevOps for CPS providing architecture-based service adaptation & verification at runtime
SEAMS '22: Proceedings of the 17th Symposium on Software Engineering for Adaptive and Self-Managing SystemsMay 2022, pp 132–143https://doi.org/10.1145/3524844.3528057Background: Industrial Product-Service Systems (IPSS) denote a service-oriented way of providing access to cyber-physical systems' (CPS) capabilities. The design of such systems bears high risk due to uncertainty in requirements related to service ...
- invited-talkJuly 2022
From Algorithmic Audits to Actual Accountability: Overcoming Practical Roadblocks on the Path to Meaningful Audit Interventions for AI Governance
AIES '22: Proceedings of the 2022 AAAI/ACM Conference on AI, Ethics, and SocietyJuly 2022, pp 5https://doi.org/10.1145/3514094.3539566As algorithmic deployments become more and more common, policymakers and advocates are increasingly turning to audits as an approach for accountability. Some audits have already led to product updates or recalls, organizational changes and developments ...