A full dive into realizing the edge-enabled metaverse: Visions, enabling technologies, and challenges

M Xu, WC Ng, WYB Lim, J Kang, Z Xiong… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Dubbed “the successor to the mobile Internet,” the concept of the Metaverse has grown in
popularity. While there exist lite versions of the Metaverse today, they are still far from …

Edge computing for autonomous driving: Opportunities and challenges

S Liu, L Liu, J Tang, B Yu, Y Wang… - Proceedings of the …, 2019 - ieeexplore.ieee.org
Safety is the most important requirement for autonomous vehicles; hence, the ultimate
challenge of designing an edge computing ecosystem for autonomous vehicles is to deliver …

Security and Trust in the 6G Era

V Ziegler, P Schneider, H Viswanathan, M Montag… - Ieee …, 2021 - ieeexplore.ieee.org
A comprehensive set of security technology enablers will be critically required for
communication systems for the 6G era of the 2030s. Trustworthiness must be assured …

A blockchain platform for user data sharing ensuring user control and incentives

AK Shrestha, J Vassileva, R Deters - Frontiers in Blockchain, 2020 - frontiersin.org
We propose a new platform for user modeling with blockchains that allows users to share
data without losing control and ownership of it and applied it to the domain of travel booking …

Nimbus: Towards latency-energy efficient task offloading for ar services

V Cozzolino, L Tonetto, N Mohan… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Widespread adoption of mobile augmented reality (AR) and virtual reality (VR) applications
depends on their smoothness and immersiveness. Modern AR applications applying …

Hardware-based solutions for trusted cloud computing

O Demigha, R Larguet - Computers & Security, 2021 - Elsevier
The increasing number of threats targeting cloud computing and the exploitation of
specifically privileged software vulnerabilities have pushed the security managers of cloud …

[图书][B] Engineering autonomous vehicles and robots: the dragonfly modular-based approach

S Liu - 2020 - books.google.com
Offers a step-by-step guide to building autonomous vehicles and robots, with source code
and accompanying videos The first book of its kind on the detailed steps for creating an …

Confidential computing across edge-to-cloud for machine learning: A survey study

SM Zobaed, MA Salehi - arXiv preprint arXiv:2307.16447, 2023 - arxiv.org
Confidential computing has gained prominence due to the escalating volume of data-driven
applications (eg, machine learning and big data) and the acute desire for secure processing …

User data sharing frameworks: a blockchain-based incentive solution

AK Shrestha, J Vassileva - 2019 IEEE 10th Annual Information …, 2019 - ieeexplore.ieee.org
Currently, there is no universal method to track who shared what, with whom, when and for
what purposes in a verifiable way to create an individual incentive for data owners. A …

Omega: a secure event ordering service for the edge

C Correia, M Correia… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The edge computing paradigm extends cloud computing with storage and processing
capacity close to the edge of the network, which can be materialized by using many fog …