Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.
AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI --- n/a
Choose an application
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.
Technology: general issues --- AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI --- AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI
Choose an application
Computing and communication capabilities are increasingly embedded in diverse objects and structures in the physical environment. They will link the ‘cyberworld’ of computing and communications with the physical world. These applications are called cyber physical systems (CPS). Obviously, the increased involvement of real-world entities leads to a greater demand for trustworthy systems. Hence, we use "system trustworthiness" here, which can guarantee continuous service in the presence of internal errors or external attacks. Mobile CPS (MCPS) is a prominent subcategory of CPS in which the physical component has no permanent location. Mobile Internet devices already provide ubiquitous platforms for building novel MCPS applications. The objective of this Special Issue is to contribute to research in modern/future trustworthy MCPS, including design, modeling, simulation, dependability, and so on. It is imperative to address the issues which are critical to their mobility, report significant advances in the underlying science, and discuss the challenges of development and implementation in various applications of MCPS.
Technology: general issues --- AUTOSAR --- DAG --- runnable scheduling --- control-scheduling codesign --- lagrange multiplier --- Mobile Cyber-Physical Systems (MCPS) --- industry --- Mobile Sink Groups (MSG) --- group mobility --- real-time data delivery --- Intelligent Transportation System (ITS) --- deep neural network --- Red Light Runner (RLR) --- dynamic signal control --- intersection safety --- mixed-criticality --- power-aware --- real-time scheduling --- DVFS --- security taxonomies --- event-based systems --- mobile cyber physical systems --- security flaws --- searchable encryption --- PEKS --- forward privacy --- trusted execution environment --- SGX --- data quality --- large-scale --- high-dimensionality --- linear discriminant analysis --- random projection --- bootstrapping --- controller area network bus --- authentication --- authenticity --- resiliency --- sustainability --- formal verification --- model checking --- in-vehicle network --- model compression --- adversarial robustness --- weight pruning --- adversarial training --- distillation --- embedded system --- secure AI --- n/a
Choose an application
The emerging massive density of human-held and machine-type nodes implies larger traffic deviatiolns in the future than we are facing today. In the future, the network will be characterized by a high degree of flexibility, allowing it to adapt smoothly, autonomously, and efficiently to the quickly changing traffic demands both in time and space. This flexibility cannot be achieved when the network’s infrastructure remains static. To this end, the topic of UAVs (unmanned aerial vehicles) have enabled wireless communications, and networking has received increased attention. As mentioned above, the network must serve a massive density of nodes that can be either human-held (user devices) or machine-type nodes (sensors). If we wish to properly serve these nodes and optimize their data, a proper wireless connection is fundamental. This can be achieved by using UAV-enabled communication and networks. This Special Issue addresses the many existing issues that still exist to allow UAV-enabled wireless communications and networking to be properly rolled out.
Technology: general issues --- History of engineering & technology --- unmanned aerial vehicle --- UAV positioning --- machine learning --- wireless communications --- drones --- network --- DTN --- mobility schedule --- routing algorithms --- data delivery --- Internet of drones --- communication --- security --- privacy --- UAV base station --- MIMO --- millimeter-wave band --- blind beamforming --- signal recovery --- UAV relay networks --- resource management --- transmit time allocation --- unmanned aerial vehicles --- dynamic spectrum access --- quality of service --- reinforcement learning --- multi-armed bandit --- aerial communication --- FANET --- not-spots --- stratospheric communication platform --- UAV --- UAV-assisted network --- 5G --- global positioning system --- GPS spoofing attacks --- detection techniques --- dynamic selection --- hyperparameter tuning --- IoT --- RF radio communication --- Wi-Fi direct --- D2D --- drone-based mobile secure zone --- friendly jamming --- mobility --- internet of things --- non-orthogonal multiple access --- resource allocation --- ultra reliable low latency communication --- uplink transmission --- Deep Q-learning (DQL) --- Double Deep Q-learning (DDQL) --- dynamic spectrum sharing --- High Altitude Platform Station (HAPS) --- cellular communications --- power control --- interference management --- cognitive UAV networks --- clustered two-stage-fusion cooperative spectrum sensing --- continuous hidden Markov model --- SNR estimation --- n/a
Choose an application
The emerging massive density of human-held and machine-type nodes implies larger traffic deviatiolns in the future than we are facing today. In the future, the network will be characterized by a high degree of flexibility, allowing it to adapt smoothly, autonomously, and efficiently to the quickly changing traffic demands both in time and space. This flexibility cannot be achieved when the network’s infrastructure remains static. To this end, the topic of UAVs (unmanned aerial vehicles) have enabled wireless communications, and networking has received increased attention. As mentioned above, the network must serve a massive density of nodes that can be either human-held (user devices) or machine-type nodes (sensors). If we wish to properly serve these nodes and optimize their data, a proper wireless connection is fundamental. This can be achieved by using UAV-enabled communication and networks. This Special Issue addresses the many existing issues that still exist to allow UAV-enabled wireless communications and networking to be properly rolled out.
unmanned aerial vehicle --- UAV positioning --- machine learning --- wireless communications --- drones --- network --- DTN --- mobility schedule --- routing algorithms --- data delivery --- Internet of drones --- communication --- security --- privacy --- UAV base station --- MIMO --- millimeter-wave band --- blind beamforming --- signal recovery --- UAV relay networks --- resource management --- transmit time allocation --- unmanned aerial vehicles --- dynamic spectrum access --- quality of service --- reinforcement learning --- multi-armed bandit --- aerial communication --- FANET --- not-spots --- stratospheric communication platform --- UAV --- UAV-assisted network --- 5G --- global positioning system --- GPS spoofing attacks --- detection techniques --- dynamic selection --- hyperparameter tuning --- IoT --- RF radio communication --- Wi-Fi direct --- D2D --- drone-based mobile secure zone --- friendly jamming --- mobility --- internet of things --- non-orthogonal multiple access --- resource allocation --- ultra reliable low latency communication --- uplink transmission --- Deep Q-learning (DQL) --- Double Deep Q-learning (DDQL) --- dynamic spectrum sharing --- High Altitude Platform Station (HAPS) --- cellular communications --- power control --- interference management --- cognitive UAV networks --- clustered two-stage-fusion cooperative spectrum sensing --- continuous hidden Markov model --- SNR estimation --- n/a
Choose an application
The emerging massive density of human-held and machine-type nodes implies larger traffic deviatiolns in the future than we are facing today. In the future, the network will be characterized by a high degree of flexibility, allowing it to adapt smoothly, autonomously, and efficiently to the quickly changing traffic demands both in time and space. This flexibility cannot be achieved when the network’s infrastructure remains static. To this end, the topic of UAVs (unmanned aerial vehicles) have enabled wireless communications, and networking has received increased attention. As mentioned above, the network must serve a massive density of nodes that can be either human-held (user devices) or machine-type nodes (sensors). If we wish to properly serve these nodes and optimize their data, a proper wireless connection is fundamental. This can be achieved by using UAV-enabled communication and networks. This Special Issue addresses the many existing issues that still exist to allow UAV-enabled wireless communications and networking to be properly rolled out.
Technology: general issues --- History of engineering & technology --- unmanned aerial vehicle --- UAV positioning --- machine learning --- wireless communications --- drones --- network --- DTN --- mobility schedule --- routing algorithms --- data delivery --- Internet of drones --- communication --- security --- privacy --- UAV base station --- MIMO --- millimeter-wave band --- blind beamforming --- signal recovery --- UAV relay networks --- resource management --- transmit time allocation --- unmanned aerial vehicles --- dynamic spectrum access --- quality of service --- reinforcement learning --- multi-armed bandit --- aerial communication --- FANET --- not-spots --- stratospheric communication platform --- UAV --- UAV-assisted network --- 5G --- global positioning system --- GPS spoofing attacks --- detection techniques --- dynamic selection --- hyperparameter tuning --- IoT --- RF radio communication --- Wi-Fi direct --- D2D --- drone-based mobile secure zone --- friendly jamming --- mobility --- internet of things --- non-orthogonal multiple access --- resource allocation --- ultra reliable low latency communication --- uplink transmission --- Deep Q-learning (DQL) --- Double Deep Q-learning (DDQL) --- dynamic spectrum sharing --- High Altitude Platform Station (HAPS) --- cellular communications --- power control --- interference management --- cognitive UAV networks --- clustered two-stage-fusion cooperative spectrum sensing --- continuous hidden Markov model --- SNR estimation --- unmanned aerial vehicle --- UAV positioning --- machine learning --- wireless communications --- drones --- network --- DTN --- mobility schedule --- routing algorithms --- data delivery --- Internet of drones --- communication --- security --- privacy --- UAV base station --- MIMO --- millimeter-wave band --- blind beamforming --- signal recovery --- UAV relay networks --- resource management --- transmit time allocation --- unmanned aerial vehicles --- dynamic spectrum access --- quality of service --- reinforcement learning --- multi-armed bandit --- aerial communication --- FANET --- not-spots --- stratospheric communication platform --- UAV --- UAV-assisted network --- 5G --- global positioning system --- GPS spoofing attacks --- detection techniques --- dynamic selection --- hyperparameter tuning --- IoT --- RF radio communication --- Wi-Fi direct --- D2D --- drone-based mobile secure zone --- friendly jamming --- mobility --- internet of things --- non-orthogonal multiple access --- resource allocation --- ultra reliable low latency communication --- uplink transmission --- Deep Q-learning (DQL) --- Double Deep Q-learning (DDQL) --- dynamic spectrum sharing --- High Altitude Platform Station (HAPS) --- cellular communications --- power control --- interference management --- cognitive UAV networks --- clustered two-stage-fusion cooperative spectrum sensing --- continuous hidden Markov model --- SNR estimation
Listing 1 - 6 of 6 |
Sort by
|