摘要:
Methods, apparatus, systems and machine-readable storage media of an edge computing device which is enabled to access and select the use of local or remote acceleration resources for edge computing processing is disclosed. In an example, an edge computing device obtains first telemetry information that indicates availability of local acceleration circuitry to execute a function, and obtains second telemetry that indicates availability of a remote acceleration function to execute the function. An estimated time (and cost or other identifiable or estimateable considerations) to execute the function at the respective location is identified. The use of the local acceleration circuitry or the remote acceleration resource is selected based on the estimated time and other appropriate factors in relation to a service level agreement.
摘要:
Systems and techniques for information centric network (ICN) emergency data collection are described herein. For example, an event coverage area may be measured. An interest packet may be transmitted to map nodes within the coverage area. In an example, the interest packet specifies a group prefix. A group of nodes that respond to the interest packet may be selected as event detecting nodes. Then, an event subscription interest packet may be transmitted to the event-detecting nodes.
摘要:
Systems and techniques for information centric network (ICN) approximate computation caching are described herein. For example, an interest packet that includes a feature set of input data may be received. A node may then perform a search of a local data store using the feature set to determine an approximate computation result cached in the local data store. Here, the approximate computation result may be based on input data that differs from the input data named in the interest packet. The node may then return the approximate computation result to an author of the interest packet in response to the search.
摘要:
In one embodiment, a road side unit (RSU) establishes a data offload session with a vehicle in the vicinity of the RSU based on a session establishment request sent by the vehicle, and stores data received from the vehicle during the data offload session in its memory. The RSU generates storage record information (including identifying information for the RSU) for the stored data, and transmits the storage record information to the vehicle.
摘要:
In one embodiment, an apparatus comprises a communication interface, a memory, and a processor. The communication interface is to communicate with one or more devices. The memory to store a device identity blockchain. The processor is to: receive a device identity transaction from a first device, wherein the device identity transaction comprises a device identity; compute a hash of the device identity; determine, based on the hash, whether the device identity is registered in the device identity blockchain; and upon a determination that the device identity is not registered in the device identity blockchain, add the device identity transaction to the device identity blockchain.
摘要:
In one embodiment, an apparatus comprises a memory and a processor. The memory stores visual data captured by one or more sensors. The processor detects one or more first objects in the visual data based on a machine learning model and one or more first reference templates. The processor further determines, based on an object ontology, that the visual data is expected to contain a second object, wherein the object ontology indicates that the second object is related to the one or more first objects. The processor further detects the second object in the visual data based on the machine learning model and a second reference template. The processor further determines, based on an inference rule, that the visual data is expected to contain a third object. The processor further detects the third object in the visual data based on the machine learning model and a third reference template.
摘要:
Systems and methods for exchanging digital content in an online layered hierarchical market and exchange network are disclosed. A Buyer utilizes one or more Curry functions that are relevant to content to be acquired thereby developing a Margin Future estimate for the received content. Each e-market layer in the hierarchy adds value to the content for use with one or more other e-market layers. Value is added by executing a Margin Function including a Curry function on the content, as defined in the Margin Future. An embodiment includes data, information, knowledge, and wisdom (DIKW) e-market layers. The Margin Future estimate may be recorded with an escrow agent acting as an intermediary with Investors. Once funded, the Buyer may acquire the content from the Seller and apply value added. Payment may be made when the value added content enters the e-market using electronic wallets. Other embodiments are described and claimed.
摘要:
In one embodiment, a system includes: a credential management server to provide credentials to a plurality of computing devices and a plurality of resource servers; a rights management server to grant capability rights to the plurality of computing devices; and an access management server to assign access control policies for a plurality of resources to be protected by the plurality of resource servers. A first resource server may receive a first access request for access to a first resource from a first computing device and send the first access request to the access management server for determination of whether to grant a permission for the access to the first resource. Other embodiments are described and claimed.
摘要:
In one embodiment, a processor has at least one core to execute instructions, a security engine coupled to the at least one core, a first storage to store a first immutable key associated with a vendor of the processor, and a second storage to store a second immutable key associated with an original equipment manufacturer (OEM) of the system. A first portion of firmware is to be verified based at least in part on the first immutable key and a second portion of firmware is to be verified based at least in part on the second immutable key, the first portion of firmware associated with the vendor and the second portion of firmware associated with the OEM. Other embodiments are described and claimed.
摘要:
In one embodiment, a system comprises: a processor including at least one core to execute instructions; a plurality of sensors, including a first sensor to determine location information regarding a location of the system; and a security engine to apply a security policy to the system. In this embodiment, the security engine includes a policy logic to determine one of a plurality of security policies to apply based at least in part on the location information, where the location information indicates a location different than locations associated with the plurality of security policies. Other embodiments are described and claimed.