2014 IEEE Globecom Workshops (GC Wkshps) 2014
DOI: 10.1109/glocomw.2014.7063416
|View full text |Cite
|
Sign up to set email alerts
|

AXaaS: Case for acceleration as a service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
4
3
1

Relationship

4
4

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…The top of this figure (i.e., the data transformation path) shows the transformations that the incoming data stream [ ] must go through to produce a properlyformatted ciphertext. This top part is assumed to be performed during data acquisition by a computationally capable device, such as the patient's smartphone or a cloudlet (Wang, Liu, & Soyata, 2014;Powers, Alling, Gyampoh-Vidogah, & Soyata, 2014) (see Figure 1). The bottom of Figure 8 (i.e., the functional transformation path) will be the focus of this section, which details the steps that must be taken to convert the computation ( (. ))…”
Section: Fhe Implementation Stepsmentioning
confidence: 99%
“…The top of this figure (i.e., the data transformation path) shows the transformations that the incoming data stream [ ] must go through to produce a properlyformatted ciphertext. This top part is assumed to be performed during data acquisition by a computationally capable device, such as the patient's smartphone or a cloudlet (Wang, Liu, & Soyata, 2014;Powers, Alling, Gyampoh-Vidogah, & Soyata, 2014) (see Figure 1). The bottom of Figure 8 (i.e., the functional transformation path) will be the focus of this section, which details the steps that must be taken to convert the computation ( (. ))…”
Section: Fhe Implementation Stepsmentioning
confidence: 99%
“…Therefore, the data has to be transferred to a nearby computationally capable device. We conceptualize this device to be either a smart-phone, with approximately 5 GFLOPS computational capability (iPhone5s, n.d.) or a cloudlet with close to 100 GFLOPS capability (Soyata, Ba, Heinzelman, Kwon, & Shi, 2013;Wang, Liu, & Soyata, 2014;Alling, Powers, & Soyata, 2015;Powers, Alling, Gyampoh-Vidogah, & Soyata, 2014). Encrypted signals should include two different flavors: a traditional encryption, such as PGP or AES (NIST-AES, 2001), or FHE.…”
Section: Motivating Applicationmentioning
confidence: 99%
“…"As a service" (aaS) offerings provide convenient, configurable solutions to computational problems by allocating resources over the internet (Dsouza, Kabbedjik, Seo, Jansen, & Brinkkemper, 2012;Costa, Migliavacca, Pietzuch, & Wolf, 2012;Sandikkaya & Harmanci, 2012). To run an exciting new breed of resource-intensive mobile applications such as Real-Time Face Recognition (Powers, Alling, Gyampoh-Vidogah, & Soyata, 2014), Augmented Reality, Real-time Language Translation (Google-Translate; MS-Translator), and Surveillance, it is possible for a user to rent cloud instances. However, the steps required for such a process will discourage even the most willing user.…”
Section: Background and Motivationmentioning
confidence: 99%