Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Augmented Reality Book Design for Teaching and Learning Architectural Heritage: Educational Heritage in Hong Kong Central and Western District
Journal on Computing and Cultural Heritage (JOCCH), Volume 17, Issue 4Article No.: 65, Pages 1–15https://doi.org/10.1145/3655628The teaching and learning of architectural heritage can play a vital role in engaging students in envisioning the past and nurturing their cultural identity. However, this endeavour often faces challenges stemming from limited access to heritage sites and ...
- research-articleNovember 2024JUST ACCEPTED
exZNS: Extending Zoned Namespace to Support Byte-loggable Zones
ACM Transactions on Architecture and Code Optimization (TACO), Just Accepted https://doi.org/10.1145/3705318Emerging Zoned Namespace (ZNS) provides hosts with fine-grained, performance-predictable storage management. ZNS organizes the address space into zones composed of fixed-size, sequentially written, non-overwritable blocks, making it suitable for log-...
- surveyNovember 2024
Advancements in Federated Learning: Models, Methods, and Privacy
ACM Computing Surveys (CSUR), Volume 57, Issue 2Article No.: 46, Pages 1–39https://doi.org/10.1145/3664650Federated learning (FL) is a promising technique for resolving the rising privacy and security concerns. Its main ingredient is to cooperatively learn the model among the distributed clients without uploading any sensitive data. In this article, we ...
- research-articleOctober 2024JUST ACCEPTED
ConsortiumSec: Blockchain-based Distributed Security Framework for Consortium Applications
Distributed Ledger Technologies: Research and Practice (DLT), Just Accepted https://doi.org/10.1145/3699965In consortium applications, multiple organizations collaborate on a common goal. The complex consortium structure makes it a significant challenge to achieve the goals of both secure collaboration and preserving each organization's data confidentiality. ...
- research-articleDecember 2024
A Generic Architecture for the Digitization of Government Procurement Processes
- Irapuan Noce,
- João Álvaro Carvalho,
- Luís Amaral,
- João Cerejeira,
- Pedro J. Camões,
- Isabel Ferreira,
- Sandra Cunha
ICEGOV '24: Proceedings of the 17th International Conference on Theory and Practice of Electronic GovernancePages 190–200https://doi.org/10.1145/3680127.3680211The implementation of government information systems has been a means to improve social, political, and economic conditions and the quality of life of its citizens. However, the systems of the governments are very different and even within a country ...
-
- research-articleOctober 2024
Automation Support for System Simulation and Architecture Layout Design in Cyber-Physical Systems Engineering
MODELS Companion '24: Proceedings of the ACM/IEEE 27th International Conference on Model Driven Engineering Languages and SystemsPages 299–310https://doi.org/10.1145/3652620.3686250Simulations have long been part of hardware-centric system domains. Similarly, architecture design is a common practice for complex industrial systems, which comprise many components that can be arranged in different layouts according to given ...
- research-articleNovember 2024
Cross-regional Teaching Resource Sharing Solution Based on HADOOP Architecture
ISAIE '24: Proceedings of the 2024 International Symposium on Artificial Intelligence for EducationPages 613–620https://doi.org/10.1145/3700297.3700403This study explores a cross-regional teaching resource sharing solution based on Hadoop architecture, aiming to solve the current problem of uneven distribution of educational resources. First, the challenges of existing resource sharing solutions in ...
- research-articleSeptember 2024
A Calculus for the Specification, Design, and Verification of Distributed Concurrent Systems
Formal Aspects of Computing (FAC), Volume 36, Issue 3Article No.: 16, Pages 1–54https://doi.org/10.1145/3672085A calculus for the specification and verification of distributed concurrent interactive real-time systems is introduced. Systems are specified by their interface behavior formalized by interface predicates and interface assertions. System designs in terms ...
- ArticleSeptember 2024
Logical and Technological Representations of Architectural Space: A Comparative Analysys of Kundmanngasse Haus and Casa Batlló
AbstractThis contribution stems from research on the enhancement of museum houses through the use of augmented reality, specifically expanding the modes of viewing a space. This study involves an interdisciplinary relationship between architecture and ...
- research-articleDecember 2024
An In-Depth Analysis on Mitigating Data Breaches in Healthcare Systems through Big Data Structure
ICCCM '24: Proceedings of the 2024 12th International Conference on Computer and Communications ManagementPages 139–147https://doi.org/10.1145/3688268.3688289Data breaches and cyberattacks in healthcare pose substantial risks to patient information privacy, financial integrity, and institutional reputation. During rapid digitalization, the healthcare infrastructure in the Philippines faces similar ...
- research-articleJuly 2024
Space Renovation in Virtual Reality
DIS '24 Companion: Companion Publication of the 2024 ACM Designing Interactive Systems ConferencePages 130–134https://doi.org/10.1145/3656156.3663711Virtual reality (VR) space renovation considers designing co-located virtual spaces while accounting for constraints imposed by the physical space. Such design presents distinctive challenges and differs from designing for a physical space, as physical ...
- research-articleJune 2024
CAD Techniques for NoC-Connected Multi-CGRA Systems
HEART '24: Proceedings of the 14th International Symposium on Highly Efficient Accelerators and Reconfigurable TechnologiesPages 109–118https://doi.org/10.1145/3665283.3665297Coarse-grained reconfigurable arrays (CGRAs) are programmable hardware platforms that are a means of realizing application accelerators. A CGRA is a 2D array of configurable processing elements (PEs), that connect to one another through programmable ...
- research-articleMay 2024
A Digital Companion Architecture for Ambient Intelligence
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 2Article No.: 66, Pages 1–26https://doi.org/10.1145/3659610Ambient Intelligence (AmI) focuses on creating environments capable of proactively and transparently adapting to users and their activities. Traditionally, AmI focused on the availability of computational devices, the pervasiveness of networked ...
RoomDreaming: Generative-AI Approach to Facilitating Iterative, Preliminary Interior Design Exploration
- Shun-Yu Wang,
- Wei-Chung Su,
- Serena Chen,
- Ching-Yi Tsai,
- Marta Misztal,
- Katherine M. Cheng,
- Alwena Lin,
- Yu Chen,
- Mike Y. Chen
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 379, Pages 1–20https://doi.org/10.1145/3613904.3642901Interior design aims to create aesthetically pleasing and functional environments within an architectural space. For a simple room, the preliminary design exploration currently takes multiple meetings and days of work for interior designers to ...
- posterMay 2024
Fine-Grained Authorization in Microservice Architecture: A Decentralized Approach
SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied ComputingPages 1219–1222https://doi.org/10.1145/3605098.3636121Authorization mechanisms are essential for securing microservice-based applications, with Attribute Based Access Control (ABAC) being a prominent choice for fine-grained authorization. A decentralized authorization mechanism allows the transfer of ...
- research-articleFebruary 2024
Perceiving and creating atmospheres: how ecological-enactive cognition can explain and inform architectural practice
Adaptive Behavior - Animals, Animats, Software Agents, Robots, Adaptive Systems (SAGE-ADAP), Volume 32, Issue 2Pages 103–115https://doi.org/10.1177/10597123231179487The notion of atmosphere has taken prominence in contemporary architecture discourse, in which it is used mainly to denote the affective characteristic of inhabitable spaces. In this paper, we employ the ecological-enactive approach to cognition to ...
- research-articleJanuary 2024
A References Architecture for Human Cyber Physical Systems, Part II: Fundamental Design Principles for Human-CPS Interaction
- Klaus Bengler,
- Werner Damm,
- Andreas Luedtke,
- Reiger Jochem,
- Benedikt Austel,
- Bianca Biebl,
- Martin Fränzle,
- Willem Hagemann,
- Moritz Held,
- David Hess,
- Klas Ihme,
- Severin Kacianka,
- Alyssa J. Kerscher,
- Laine Forrest,
- Sebastian Lehnhoff,
- Alexander Pretschner,
- Astrid Rakow,
- Daniel Sonntag,
- Janos Sztipanovits,
- Maike Schwammberger,
- Mark Schweda,
- Anirudh Unni,
- Eric Veith
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 1Article No.: 3, Pages 1–27https://doi.org/10.1145/3622880As automation increases qualitatively and quantitatively in safety-critical human cyber-physical systems, it is becoming more and more challenging to increase the probability or ensure that human operators still perceive key artifacts and comprehend their ...
- research-articleJanuary 2024
A Reference Architecture of Human Cyber-Physical Systems – Part I: Fundamental Concepts
- Werner Damm,
- David Hess,
- Mark Schweda,
- Janos Sztipanovits,
- Klaus Bengler,
- Bianca Biebl,
- Martin Fränzle,
- Willem Hagemann,
- Moritz Held,
- Klas Ihme,
- Severin Kacianka,
- Alyssa J. Kerscher,
- Sebastian Lehnhoff,
- Andreas Luedtke,
- Alexander Pretschner,
- Astrid Rakow,
- Jochem Rieger,
- Daniel Sonntag,
- Maike Schwammberger,
- Benedikt Austel,
- Anirudh Unni,
- Eric Veith
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 8, Issue 1Article No.: 2, Pages 1–32https://doi.org/10.1145/3622879We propose a reference architecture of safety-critical or industry-critical human cyber-physical systems (CPSs) capable of expressing essential classes of system-level interactions between CPS and humans relevant for the societal acceptance of such ...
- surveyJanuary 2024
A Survey on Approximate Multiplier Designs for Energy Efficiency: From Algorithms to Circuits
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 29, Issue 1Article No.: 23, Pages 1–37https://doi.org/10.1145/3610291Given the stringent requirements of energy efficiency for Internet-of-Things edge devices, approximate multipliers, as a basic component of many processors and accelerators, have been constantly proposed and studied for decades, especially in error-...
- research-articleJanuary 2024
Clean, performance‐robust, and performance‐sensitive historical information based adversarial self‐distillation
IET Computer Vision (CVI2), Volume 18, Issue 5Pages 591–612https://doi.org/10.1049/cvi2.12265AbstractAdversarial training suffers from poor effectiveness due to the challenging optimisation of loss with hard labels. To address this issue, adversarial distillation has emerged as a potential solution, encouraging target models to mimic the output ...
The authors’ method allows the target model to distill the most instant robust and non‐robust knowledge from the previous iteration. To avoid storing model parameters to generate AEs, an existing self‐distillation algorithm was extended, making each “...