Hardening the Security of Multi-Access Edge Computing through Bio-Inspired VM Introspection [PDF]
The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual ...
Huseyn Huseynov +2 more
doaj +2 more sources
Computed Tomography Beam Hardening Correction Based on Non-linear Segmentation [PDF]
This paper aims to eliminate the hardening artifacts in computed tomography (CT) images caused by the polychromatic X-ray spectrum. To this end, a polynomial fitting correction method using non-liner segmentation method was developed through projection ...
Xiaoke Zhang +4 more
doaj +2 more sources
Computed tomographic beam-hardening artefacts: mathematical characterization and analysis [PDF]
This paper presents a mathematical characterization and analysis of beam-hardening artefacts in X-ray computed tomography (CT). In the field of dental and medical radiography, metal artefact reduction in CT is becoming increasingly important as artificial prostheses and metallic implants become more widespread in ageing populations. Metal artefacts are
Hyoung Suk, Park +2 more
openaire +5 more sources
Security Assessment and Hardening of Fog Computing Systems [PDF]
In recent years, there has been a shift in computing architectures, moving away from centralized cloud computing towards decentralized edge and fog computing. This shift is driven by factors such as the increasing volume of data generated at the edge, the growing demand for real-time processing and low-latency applications, and the need for improved ...
Carmine Cesarano
openaire +3 more sources
CMOS‐Compatible HfOx‐Based Radiation Hardening Component for Neuromorphic Computing Applications [PDF]
HfOx‐based resistive random‐access‐memory (ReRAM) devices (TiN/Ti/HfOx/RuOx/TiN) are fabricated by CMOS‐compatible materials (ruthenium (Ru)) and lithography‐lite process, potentially enabling a maskless, etching‐free process that can be implemented in ...
Yao‐Feng Chang +3 more
doaj +2 more sources
Fault-Tolerant Computing with Heterogeneous Hardening Modes [PDF]
AbstractFault-tolerance using (full-scale) redundancy-based techniques has been employed to detect and correct reliability errors (i.e., soft errors), but they pose significant area and power overhead. On the other hand, due to the masking and the error tolerance properties at different system layers and of different applications, respectively ...
Florian Kriebel +4 more
openaire +2 more sources
Hardware-hardened Sandbox Enclaves for Trusted Serverless Computing [PDF]
In cloud-based serverless computing, an application consists of multiple functions provided by mutually distrusting parties. For secure serverless computing, the hardware-based trusted execution environment (TEE) can provide strong isolation among functions.
Joongun Park +6 more
openaire +2 more sources
Docker container hardening method based on trusted computing
Abstract In view of the incomplete isolation of docker, the image file is easy to be tampered with, and the problem of insecure container operation. Based on the analysis of the existing isolation mechanism and security enhancement technology of docker container, this article uses trusted computing technologies such as cryptographic ...
Yuang Shen, Xuejun Yu
openaire +2 more sources
Magnetic‐Driven Viscous Mechanisms in Ultra‐Soft Magnetorheological Elastomers Offer History‐Dependent Actuation with Reprogrammability Options [PDF]
This work elucidates an important open question in the field of mechanically soft magnetorheological elastomers (MREs): how microstructural rearrangements during magnetic actuation modulate their viscoelastic behavior. Experimental assays are provided on
Ernesto Gonzalez‐Saiz +4 more
doaj +2 more sources
LHC Computing – the First 3 Decades [PDF]
Computing for the Large Hadron Collider (LHC) at CERN arguably started shortly after the commencement of data taking at the previous machine – LEP – some would argue it was even before.
Sheirs Jamie
doaj +1 more source

