723 research outputs found

    Undergraduate Catalog of Studies, 2023-2024

    Get PDF

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Undergraduate Catalog of Studies, 2023-2024

    Get PDF

    Southern Adventist University Undergraduate Catalog 2023-2024

    Get PDF
    Southern Adventist University\u27s undergraduate catalog for the academic year 2023-2024.https://knowledge.e.southern.edu/undergrad_catalog/1123/thumbnail.jp

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    LIPIcs, Volume 251, ITCS 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 251, ITCS 2023, Complete Volum

    Undergraduate Catalog of Studies, 2022-2023

    Get PDF

    Southern Adventist University Undergraduate Catalog 2022-2023

    Get PDF
    Southern Adventist University\u27s undergraduate catalog for the academic year 2022-2023.https://knowledge.e.southern.edu/undergrad_catalog/1121/thumbnail.jp

    Compute-proximal Energy Harvesting for Mobile Environments: Fundamentals, Applications, and Tools

    Get PDF
    Over the past two decades, we have witnessed remarkable achievements in computing, sensing, actuating, and communications capabilities of ubiquitous computing applications. However, due to the limitations in stable energy supply, it is difficult to make the applications ubiquitous. Batteries have been considered a promising technology for this problem, but their low energy density and sluggish innovation have constrained the utility and expansion of ubiquitous computing. Two key techniques—energy harvesting and power management—have been studied as alternatives to overcome the battery limitations. Compared to static environments such as homes or buildings, there are more energy harvesting opportunities in mobile environments since ubiquitous systems can generate various forms of energy as they move. Most of the previous studies in this regard have been focused on human movements for wearable computing, while other mobile environments (e.g., cars, motorcycles, and bikes) have received limited attention. In this thesis, I present a class of energy harvesting approaches called compute-proximal energy harvesting, which allows us to develop energy harvesting technology where computing, sensing, and actuating are needed in vehicles. Computing includes sensing phenomena, executing instructions, actuating components, storing information, and communication. Proximal considers the harvesting of energy available around the specific location where computation is needed, reducing the need for excessive wiring. A primary goal of this new approach is to mitigate the effort associated with the installation and field deployment of self-sustained computing and lower the entry barriers to developing self-sustainable systems for vehicles. In this thesis, I first select an automobile as a promising case study and discuss the opportunities, challenges, and design guidelines of compute-proximal energy harvesting with practical yet advanced examples in the automotive domain. Second, I present research in the design of small-scale wind energy harvesters and the implementation and evaluation of two advanced safety sensing systems—a blind spot monitoring system and a lane detection system—with the harvested power from wind. Finally, I conduct a study to democratize the lessons learned from the automotive case studies for makers and people with no prior experience in energy harvesting technology. In this study, I seek to understand what problems they have encountered and what possible solutions they have considered while dealing with energy harvesting technology. Based on the findings, I develop a comprehensive energy harvesting toolkit and examine its utility, usability, and creativity through a series of workshops.Ph.D

    Towards trustworthy computing on untrustworthy hardware

    Get PDF
    Historically, hardware was thought to be inherently secure and trusted due to its obscurity and the isolated nature of its design and manufacturing. In the last two decades, however, hardware trust and security have emerged as pressing issues. Modern day hardware is surrounded by threats manifested mainly in undesired modifications by untrusted parties in its supply chain, unauthorized and pirated selling, injected faults, and system and microarchitectural level attacks. These threats, if realized, are expected to push hardware to abnormal and unexpected behaviour causing real-life damage and significantly undermining our trust in the electronic and computing systems we use in our daily lives and in safety critical applications. A large number of detective and preventive countermeasures have been proposed in literature. It is a fact, however, that our knowledge of potential consequences to real-life threats to hardware trust is lacking given the limited number of real-life reports and the plethora of ways in which hardware trust could be undermined. With this in mind, run-time monitoring of hardware combined with active mitigation of attacks, referred to as trustworthy computing on untrustworthy hardware, is proposed as the last line of defence. This last line of defence allows us to face the issue of live hardware mistrust rather than turning a blind eye to it or being helpless once it occurs. This thesis proposes three different frameworks towards trustworthy computing on untrustworthy hardware. The presented frameworks are adaptable to different applications, independent of the design of the monitored elements, based on autonomous security elements, and are computationally lightweight. The first framework is concerned with explicit violations and breaches of trust at run-time, with an untrustworthy on-chip communication interconnect presented as a potential offender. The framework is based on the guiding principles of component guarding, data tagging, and event verification. The second framework targets hardware elements with inherently variable and unpredictable operational latency and proposes a machine-learning based characterization of these latencies to infer undesired latency extensions or denial of service attacks. The framework is implemented on a DDR3 DRAM after showing its vulnerability to obscured latency extension attacks. The third framework studies the possibility of the deployment of untrustworthy hardware elements in the analog front end, and the consequent integrity issues that might arise at the analog-digital boundary of system on chips. The framework uses machine learning methods and the unique temporal and arithmetic features of signals at this boundary to monitor their integrity and assess their trust level
    • …
    corecore