Mobile devices and the immense amount and variety of data they generate ...
Future AI applications require performance, reliability and privacy that...
Based on the collective input of Dagstuhl Seminar (21342), this paper
pr...
In this paper, we provide (i) a rigorous general theory to elicit condit...
Connected vehicles, whether equipped with advanced driver-assistance sys...
The combination of 5G and Multi-access Edge Computing (MEC) can signific...
A Chatbot is a popular platform to enable users to interact with a softw...
As a part of the digital transformation, we interact with more and more
...
Marine pollution is a growing worldwide concern, affecting health of mar...
In this white paper we provide a vision for 6G Edge Intelligence. Moving...
Edge intelligence refers to a set of connected systems and devices for d...
Network function (NF) developers need to provide highly available soluti...
Understanding network and application performance are essential for
debu...
Artificial intelligence shows promise for solving many practical societa...
The era of pervasive computing has resulted in countless devices that
co...
In recent years, interest in monitoring air quality has been growing.
Tr...
Differential privacy allows quantifying privacy loss from computations o...
Bloom filter is a space-efficient probabilistic data structure for check...
Bloom filter is a space-efficient probabilistic data structure for check...
The increased popularity of IoT devices have made them lucrative targets...
For seamless QoS, it is important that all the stakeholders, such as the...
Device proximity verification has a wide range of security applications ...
The number of mobile and IoT devices connected to home and enterprise
ne...
Security problems in environments hosting Internet-of-Things (IoT) devic...
Many applications of machine learning, for example in health care, would...
For better reliability and prolonged battery life, it is important that ...