In Time-Triggered (TT) or time-sensitive networks, the transmission of a...
People use mobile devices ubiquitously for computing, communication, sto...
As deep neural networks (DNNs) prove their importance and feasibility, m...
Model aggregation, the process that updates model parameters, is an impo...
Hardware flaws are permanent and potent: hardware cannot be patched once...
Memory disaggregation has received attention in recent years as a promis...
Collaborative personalization, such as through learned user representati...
We consider resource allocation (RA) in multi-carrier coordinated multi-...
Due to their sparsity, 60GHz channels are characterized by a few dominan...
Since the inception of the integrated circuit (IC), the size of the
tran...
The transistors used to construct Integrated Circuits (ICs) continue to
...
Providing seamless coverage under current cellular network technologies ...
We consider an unmanned aerial vehicle enabled (UAV-enabled) fog-radio a...
Analysis of the performance of Unmanned Aerial Vehicle (UAV)-enabled
com...
Caching the content closer to the user equipments (UEs) in heterogenous
...
Privacy policies are the primary channel through which companies inform ...
We find that the conventional belief of vehicle cyber attacks and their
...
With the development of diverse wireless communication technologies,
int...
To enable densely deployed base stations (BSs) or access points (APs) to...
Mobile devices are only as useful as their battery lasts. Unfortunately,...
As vehicle maneuver data becomes abundant for assisted or autonomous dri...
Approximate models of world state transitions are necessary when buildin...