476 results on '"P Sasu"'
Search Results
2. Future-Proofing Mobile Networks: A Digital Twin Approach to Multi-Signal Management
- Author
-
Morabito, Roberto, Pandey, Bivek, Daubaris, Paulius, Wanigarathna, Yasith R, and Tarkoma, Sasu
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Artificial Intelligence - Abstract
Digital Twins (DTs) are set to become a key enabling technology in future wireless networks, with their use in network management increasing significantly. We developed a DT framework that leverages the heterogeneity of network access technologies as a resource for enhanced network performance and management, enabling smart data handling in the physical network. Tested in a Campus Area Network environment, our framework integrates diverse data sources to provide real-time, holistic insights into network performance and environmental sensing. We also envision that traditional analytics will evolve to rely on emerging AI models, such as Generative AI (GenAI), while leveraging current analytics capabilities. This capacity can simplify analytics processes through advanced ML models, enabling descriptive, diagnostic, predictive, and prescriptive analytics in a unified fashion. Finally, we present specific research opportunities concerning interoperability aspects and envision aligning advancements in DT technology with evolved AI integration., Comment: A shortened version of this paper is currently under review for publication in an IEEE magazine. If accepted, the copyright will be transferred to IEEE
- Published
- 2024
3. From Pixels to Progress: Generating Road Network from Satellite Imagery for Socioeconomic Insights in Impoverished Areas
- Author
-
Xi, Yanxin, Liu, Yu, Liu, Zhicheng, Tarkoma, Sasu, Hui, Pan, and Li, Yong
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
The Sustainable Development Goals (SDGs) aim to resolve societal challenges, such as eradicating poverty and improving the lives of vulnerable populations in impoverished areas. Those areas rely on road infrastructure construction to promote accessibility and economic development. Although publicly available data like OpenStreetMap is available to monitor road status, data completeness in impoverished areas is limited. Meanwhile, the development of deep learning techniques and satellite imagery shows excellent potential for earth monitoring. To tackle the challenge of road network assessment in impoverished areas, we develop a systematic road extraction framework combining an encoder-decoder architecture and morphological operations on satellite imagery, offering an integrated workflow for interdisciplinary researchers. Extensive experiments of road network extraction on real-world data in impoverished regions achieve a 42.7% enhancement in the F1-score over the baseline methods and reconstruct about 80% of the actual roads. We also propose a comprehensive road network dataset covering approximately 794,178 km2 area and 17.048 million people in 382 impoverished counties in China. The generated dataset is further utilized to conduct socioeconomic analysis in impoverished counties, showing that road network construction positively impacts regional economic development. The technical appendix, code, and generated dataset can be found at https://github.com/tsinghua-fib-lab/Road_network_extraction_impoverished_counties., Comment: 12 pages, 13 figures, IJCAI2024 (AI and Social Good)
- Published
- 2024
4. Effect of ambient room and cold temperature on seed longevity of five soybean (Glycine max L.) accessions
- Author
-
Tetteh, Rashied, Kotey, Daniel Ashie, Yeboah, Abraham, Aboagye, Lawrence Misa, Adams, Fuleratu Karim, Nketiah, Victor, and Sasu, Elizabeth Owiredua
- Published
- 2024
- Full Text
- View/download PDF
5. A Survey on Generative AI and LLM for Video Generation, Understanding, and Streaming
- Author
-
Zhou, Pengyuan, Wang, Lin, Liu, Zhi, Hao, Yanbin, Hui, Pan, Tarkoma, Sasu, and Kangasharju, Jussi
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence ,Computer Science - Multimedia - Abstract
This paper offers an insightful examination of how currently top-trending AI technologies, i.e., generative artificial intelligence (Generative AI) and large language models (LLMs), are reshaping the field of video technology, including video generation, understanding, and streaming. It highlights the innovative use of these technologies in producing highly realistic videos, a significant leap in bridging the gap between real-world dynamics and digital creation. The study also delves into the advanced capabilities of LLMs in video understanding, demonstrating their effectiveness in extracting meaningful information from visual content, thereby enhancing our interaction with videos. In the realm of video streaming, the paper discusses how LLMs contribute to more efficient and user-centric streaming experiences, adapting content delivery to individual viewer preferences. This comprehensive review navigates through the current achievements, ongoing challenges, and future possibilities of applying Generative AI and LLMs to video-related tasks, underscoring the immense potential these technologies hold for advancing the field of video technology related to multimedia, networking, and AI communities., Comment: 16 pages, 10 figures, 4 tables
- Published
- 2024
6. Firms’ access to finance, export trade channels and exports in Africa
- Author
-
Abor, Joshua Yindenaba, Ofori-Sasu, Daniel, El-Shal, Amira, and Donkor, George Nana Agyekum
- Published
- 2024
- Full Text
- View/download PDF
7. Towards Message Brokers for Generative AI: Survey, Challenges, and Opportunities
- Author
-
Saleh, Alaa, Morabito, Roberto, Tarkoma, Sasu, Pirttikangas, Susanna, and Lovén, Lauri
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning ,Computer Science - Networking and Internet Architecture ,C.2.4 ,I.2.11 ,I.2.7 - Abstract
In today's digital world, Generative Artificial Intelligence (GenAI) such as Large Language Models (LLMs) is becoming increasingly prevalent, extending its reach across diverse applications. This surge in adoption has sparked a significant increase in demand for data-centric GenAI models, highlighting the necessity for robust data communication infrastructures. Central to this need are message brokers, which serve as essential channels for data transfer within various system components. This survey aims to delve into a comprehensive analysis of traditional and modern message brokers, offering a comparative study of prevalent platforms. Our study considers numerous criteria including, but not limited to, open-source availability, integrated monitoring tools, message prioritization mechanisms, capabilities for parallel processing, reliability, distribution and clustering functionalities, authentication processes, data persistence strategies, fault tolerance, and scalability. Furthermore, we explore the intrinsic constraints that the design and operation of each message broker might impose, recognizing that these limitations are crucial in understanding their real-world applicability. Finally, this study examines the enhancement of message broker mechanisms specifically for GenAI contexts, emphasizing the criticality of developing a versatile message broker framework. Such a framework would be poised for quick adaptation, catering to the dynamic and growing demands of GenAI in the foreseeable future. Through this dual-pronged approach, we intend to contribute a foundational compendium that can guide future innovations and infrastructural advancements in the realm of GenAI data communication., Comment: 20 pages, 181 references, 7 figures, 5 tables
- Published
- 2023
8. A Survey on Model-heterogeneous Federated Learning: Problems, Methods, and Prospects
- Author
-
Fan, Boyu, Jiang, Siyang, Su, Xiang, Tarkoma, Sasu, and Hui, Pan
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
As privacy concerns continue to grow, federated learning (FL) has gained significant attention as a promising privacy-preserving technology, leading to considerable advancements in recent years. Unlike traditional machine learning, which requires central data collection, FL keeps data localized on user devices. However, conventional FL assumes that all clients operate with identical model structures initialized by the server. In real-world applications, system heterogeneity is common, with clients possessing varying computational capabilities. This disparity can hinder training for resource-limited clients and result in inefficient resource use for those with greater processing power. To address this challenge, model-heterogeneous FL has been introduced, enabling clients to train models of varying complexity based on their hardware resources. This paper reviews state-of-the-art approaches in model-heterogeneous FL, analyzing their strengths and weaknesses, while identifying open challenges and future research directions. To the best of our knowledge, this is the first survey to specifically focus on model-heterogeneous FL., Comment: IEEE BigData 2024
- Published
- 2023
9. AI-native Interconnect Framework for Integration of Large Language Model Technologies in 6G Systems
- Author
-
Tarkoma, Sasu, Morabito, Roberto, and Sauvola, Jaakko
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Artificial Intelligence - Abstract
The evolution towards 6G architecture promises a transformative shift in communication networks, with artificial intelligence (AI) playing a pivotal role. This paper delves deep into the seamless integration of Large Language Models (LLMs) and Generalized Pretrained Transformers (GPT) within 6G systems. Their ability to grasp intent, strategize, and execute intricate commands will be pivotal in redefining network functionalities and interactions. Central to this is the AI Interconnect framework, intricately woven to facilitate AI-centric operations within the network. Building on the continuously evolving current state-of-the-art, we present a new architectural perspective for the upcoming generation of mobile networks. Here, LLMs and GPTs will collaboratively take center stage alongside traditional pre-generative AI and machine learning (ML) algorithms. This union promises a novel confluence of the old and new, melding tried-and-tested methods with transformative AI technologies. Along with providing a conceptual overview of this evolution, we delve into the nuances of practical applications arising from such an integration. Through this paper, we envisage a symbiotic integration where AI becomes the cornerstone of the next-generation communication paradigm, offering insights into the structural and functional facets of an AI-native 6G network.
- Published
- 2023
10. Adaptive Compression-Aware Split Learning and Inference for Enhanced Network Efficiency
- Author
-
Mudvari, Akrit, Vainio, Antero, Ofeidis, Iason, Tarkoma, Sasu, and Tassiulas, Leandros
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Machine Learning - Abstract
The growing number of AI-driven applications in mobile devices has led to solutions that integrate deep learning models with the available edge-cloud resources. Due to multiple benefits such as reduction in on-device energy consumption, improved latency, improved network usage, and certain privacy improvements, split learning, where deep learning models are split away from the mobile device and computed in a distributed manner, has become an extensively explored topic. Incorporating compression-aware methods (where learning adapts to compression level of the communicated data) has made split learning even more advantageous. This method could even offer a viable alternative to traditional methods, such as federated learning techniques. In this work, we develop an adaptive compression-aware split learning method ('deprune') to improve and train deep learning models so that they are much more network-efficient, which would make them ideal to deploy in weaker devices with the help of edge-cloud resources. This method is also extended ('prune') to very quickly train deep learning models through a transfer learning approach, which trades off little accuracy for much more network-efficient inference abilities. We show that the 'deprune' method can reduce network usage by 4x when compared with a split-learning approach (that does not use our method) without loss of accuracy, while also improving accuracy over compression-aware split-learning by 4 percent. Lastly, we show that the 'prune' method can reduce the training time for certain models by up to 6x without affecting the accuracy when compared against a compression-aware split-learning approach.
- Published
- 2023
11. Edge AI Inference in Heterogeneous Constrained Computing: Feasibility and Opportunities
- Author
-
Morabito, Roberto, Tatipamula, Mallik, Tarkoma, Sasu, and Chiang, Mung
- Subjects
Computer Science - Hardware Architecture ,Computer Science - Artificial Intelligence ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Networking and Internet Architecture - Abstract
The network edge's role in Artificial Intelligence (AI) inference processing is rapidly expanding, driven by a plethora of applications seeking computational advantages. These applications strive for data-driven efficiency, leveraging robust AI capabilities and prioritizing real-time responsiveness. However, as demand grows, so does system complexity. The proliferation of AI inference accelerators showcases innovation but also underscores challenges, particularly the varied software and hardware configurations of these devices. This diversity, while advantageous for certain tasks, introduces hurdles in device integration and coordination. In this paper, our objectives are three-fold. Firstly, we outline the requirements and components of a framework that accommodates hardware diversity. Next, we assess the impact of device heterogeneity on AI inference performance, identifying strategies to optimize outcomes without compromising service quality. Lastly, we shed light on the prevailing challenges and opportunities in this domain, offering insights for both the research community and industry stakeholders., Comment: This paper has been accepted for publication in the proceedings of the IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks 2023 (IEEE CAMAD 2023)
- Published
- 2023
12. Additive effects of Bridelia ferruginea leaf meal as a partial replacement for soybean meal on nutrients digestibility, growth performance, and carcass characteristics of weaner rabbits
- Author
-
Osman, Alhassan, Owusu, Ahmed Abdullah, Ofosu, Jeffrey, Sasu, Prince, Abdul Aziz, Yunus, Attoh-Kotoku, Victoria, and Osafo, Emmanuel Lartey Kwame
- Published
- 2024
- Full Text
- View/download PDF
13. Access control for trusted data sharing
- Author
-
Zubair, Maria, Sabzevari, Maryam, Khatri, Vikramajeet, Tarkoma, Sasu, and Hätönen, Kimmo
- Published
- 2024
- Full Text
- View/download PDF
14. Emergency remote teaching amid global distress: how did teacher educators respond, cope, and plan for recovery?
- Author
-
Gyamerah, Kenneth, Asamoah, Daniel, Baidoo-Anu, David, Quainoo, Eric Atta, Amoateng, Ernest Yaw, and Sasu, Ernest Ofori
- Published
- 2024
- Full Text
- View/download PDF
15. Multimode physics of the unimon circuit
- Author
-
Tuohino, Sasu, Vadimov, Vasilii, Teixeira, Wallace S., Malmelin, Tommi, Silveri, Matti, and Möttönen, Mikko
- Subjects
Quantum Physics - Abstract
We consider a superconducting half-wavelength resonator that is grounded at its both ends and contains a single Josephson junction. Previously this circuit was considered as a unimon qubit in the single-mode approximation where dc-phase-biasing the junction to $\pi$ leads to increased anharmonicity and 99.9% experimentally observed single-qubit gate fidelity. Inspired by the promising first experimental results, we develop here a theoretical and numerical model for the detailed understanding of the multimode physics of the unimon circuit. To this end, first, we consider the high-frequency modes of the unimon circuit and find that even though these modes are at their ground state, they imply a significant renormalization to the Josephson energy. We introduce an efficient method how the relevant modes can be fully taken into account and show that unexcited high-lying modes lead to corrections in the qubit energy and anharmonicity. Interestingly, provided that the junction is offset from the middle of the circuit, we find strong cross-Kerr coupling strengths between a few low-lying modes. This observation paves the way for the utilization of the multimode structure, for example, as several qubits embedded into a single unimon circuit.
- Published
- 2023
16. SoK: Distributed Computing in ICN
- Author
-
Geng, Wei, Zhang, Yulong, Kutscher, Dirk, Kumar, Abhishek, Tarkoma, Sasu, and Hui, Pan
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Distributed, Parallel, and Cluster Computing - Abstract
Information-Centric Networking (ICN), with its data-oriented operation and generally more powerful forwarding layer, provides an attractive platform for distributed computing. This paper provides a systematic overview and categorization of different distributed computing approaches in ICN encompassing fundamental design principles, frameworks and orchestration, protocols, enablers, and applications. We discuss current pain points in legacy distributed computing, attractive ICN features, and how different systems use them. This paper also provides a discussion of potential future work for distributed computing in ICN., Comment: 10 pages, 3 figures, 1 table. Accepted by ACM ICN 2023
- Published
- 2023
17. How Can AI be Distributed in the Computing Continuum? Introducing the Neural Pub/Sub Paradigm
- Author
-
Lovén, Lauri, Morabito, Roberto, Kumar, Abhishek, Pirttikangas, Susanna, Riekki, Jukka, and Tarkoma, Sasu
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
This paper proposes the neural publish/subscribe paradigm, a novel approach to orchestrating AI workflows in large-scale distributed AI systems in the computing continuum. Traditional centralized broker methodologies are increasingly struggling with managing the data surge resulting from the proliferation of 5G systems, connected devices, and ultra-reliable applications. Moreover, the advent of AI-powered applications, particularly those leveraging advanced neural network architectures, necessitates a new approach to orchestrate and schedule AI processes within the computing continuum. In response, the neural pub/sub paradigm aims to overcome these limitations by efficiently managing training, fine-tuning and inference workflows, improving distributed computation, facilitating dynamic resource allocation, and enhancing system resilience across the computing continuum. We explore this new paradigm through various design patterns, use cases, and discuss open research questions for further exploration.
- Published
- 2023
18. A Satellite Imagery Dataset for Long-Term Sustainable Development in United States Cities
- Author
-
Xi, Yanxin, Liu, Yu, Li, Tong, Ding, Jintao, Zhang, Yunke, Tarkoma, Sasu, Li, Yong, and Hui, Pan
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Artificial Intelligence - Abstract
Cities play an important role in achieving sustainable development goals (SDGs) to promote economic growth and meet social needs. Especially satellite imagery is a potential data source for studying sustainable urban development. However, a comprehensive dataset in the United States (U.S.) covering multiple cities, multiple years, multiple scales, and multiple indicators for SDG monitoring is lacking. To support the research on SDGs in U.S. cities, we develop a satellite imagery dataset using deep learning models for five SDGs containing 25 sustainable development indicators. The proposed dataset covers the 100 most populated U.S. cities and corresponding Census Block Groups from 2014 to 2023. Specifically, we collect satellite imagery and identify objects with state-of-the-art object detection and semantic segmentation models to observe cities' bird's-eye view. We further gather population, nighttime light, survey, and built environment data to depict SDGs regarding poverty, health, education, inequality, and living environment. We anticipate the dataset to help urban policymakers and researchers to advance SDGs-related studies, especially applying satellite imagery to monitor long-term and multi-scale SDGs in cities., Comment: 20 pages, 5 figures
- Published
- 2023
19. What drives customer loyalty in a pandemic? Semantic analysis of grocery retailers
- Author
-
Kuikka, Anna, Hallikainen, Heli, Tuominen, Sasu, and Laukkanen, Tommi
- Published
- 2024
- Full Text
- View/download PDF
20. Teaching Practicum: An Interplay between Ideal and Real in Pre-Service Teacher's Training
- Author
-
Petre, Gianina-Estera, Jalba, Carmina-Marta, Sasu, Marta-Ramona, and Vi?an, Diana
- Abstract
Teaching practicum has an essential contribution to the professional development of pre-service teachers. This study aimed to identify how the students enrolled in the Pedagogy of Preschool and Primary Education experienced the role of teaching practicum from the perspective of the theory learned during the courses and the reality in the educational institutions where they carried out the teaching practicum. Qualitative methodology was the choice to fit the purpose of the study with an embedded single case study research design, thus type 2 of a case study. The case was the teaching practicum, consisting of three groups of students in the PPPE academic program, second and third years, thus employing multiple units of analysis. The participants were 12 pre-service teachers chosen through purposive sampling from 53 students registered in the second and third academic years. Data collection methods comprised three FGDs and document analysis (16 pedagogical practice notebooks). Thematic coding was the option for data analysis after data was transcribed verbatim, conducted member checking, coded, grouped the codes into categories, and organized under themes. The themes revealed an interplay between theory and practice, ideal and real, regarding teaching practices.
- Published
- 2022
21. Federated Split GANs
- Author
-
Kortoçi, Pranvera, Liang, Yilei, Zhou, Pengyuan, Lee, Lik-Hang, Mehrabi, Abbas, Hui, Pan, Tarkoma, Sasu, and Crowcroft, Jon
- Subjects
Computer Science - Machine Learning ,Computer Science - Artificial Intelligence ,Computer Science - Cryptography and Security - Abstract
Mobile devices and the immense amount and variety of data they generate are key enablers of machine learning (ML)-based applications. Traditional ML techniques have shifted toward new paradigms such as federated (FL) and split learning (SL) to improve the protection of user's data privacy. However, these paradigms often rely on server(s) located in the edge or cloud to train computationally-heavy parts of a ML model to avoid draining the limited resource on client devices, resulting in exposing device data to such third parties. This work proposes an alternative approach to train computationally-heavy ML models in user's devices themselves, where corresponding device data resides. Specifically, we focus on GANs (generative adversarial networks) and leverage their inherent privacy-preserving attribute. We train the discriminative part of a GAN with raw data on user's devices, whereas the generative model is trained remotely (e.g., server) for which there is no need to access sensor true data. Moreover, our approach ensures that the computational load of training the discriminative model is shared among user's devices-proportional to their computation capabilities-by means of SL. We implement our proposed collaborative training scheme of a computationally-heavy GAN model in real resource-constrained devices. The results show that our system preserves data privacy, keeps a short training time, and yields same accuracy of model training in unconstrained devices (e.g., cloud). Our code can be found on https://github.com/YukariSonz/FSL-GAN
- Published
- 2022
22. Prototype Results of an Internet of Things System Using Wearables and Artificial Intelligence for the Detection of Frailty in Elderly People
- Author
-
Ciubotaru, Bogdan-Iulian, Sasu, Gabriel-Vasilică, Goga, Nicolae, Vasilățeanu, Andrei, Marin, Iuliana, Goga, Maria, Popovici, Ramona, and Datta, Gora
- Subjects
Distributed Computing and Systems Software ,Information and Computing Sciences ,Bioengineering ,frailty detection ,preventive healthcare ,personalized medicine ,e-health ,smart wearables ,IoT system ,digital health ,artificial intelligence in medicine - Abstract
As society moves towards a preventative approach to healthcare, there is growing interest in scientific research involving technology that can monitor and prevent adverse health outcomes. The primary objective of this paper is to develop an Internet of Things (IoT) wearable system based on Fried’s phenotype that is capable of detecting frailty. To determine user requirements, the system’s architecture was designed based on the findings of a questionnaire administered to individuals confirmed to be frail. A functional prototype was successfully developed and tested under real-world conditions. This paper introduces the methodology that was used to analyze the data collected from the prototype. It proposes an interdisciplinary approach to interpret wearable sensor data, providing a comprehensive overview through both visual representations and computational analyses facilitated by machine learning models. The findings of these analyses offer insights into the ways in which different types of activities can be classified and quantified as part of an overall physical activity level, which is recognized as an important indicator of frailty. The results provide the foundations for a new generation of affordable and non-intrusive systems able to detect and assess early signs of frailty.
- Published
- 2023
23. Threshold effect of bank governance on risk-taking behaviours of banks; the role of regulatory framework in Africa
- Author
-
Ofori-Sasu, Daniel, Agbloyor, Elikplimi Komla, Sarpong-Kumankoma, Emmanuel, and Abor, Joshua Yindenaba
- Published
- 2024
- Full Text
- View/download PDF
24. Future of software development with generative AI
- Author
-
Sauvola, Jaakko, Tarkoma, Sasu, Klemettinen, Mika, Riekki, Jukka, and Doermann, David
- Published
- 2024
- Full Text
- View/download PDF
25. Risk-taking and systemic banking crisis in Africa: do regulatory policy framework provide new insight in threshold models?
- Author
-
Ofori-Sasu, Daniel, Sarpong-Kumankoma, Emmanuel, Kuttu, Saint, Agbloyor, Elikplimi Komla, and Abor, Joshua Yindenaba
- Published
- 2024
- Full Text
- View/download PDF
26. Autonomy and Intelligence in the Computing Continuum: Challenges, Enablers, and Future Directions for Orchestration
- Author
-
Kokkonen, Henna, Lovén, Lauri, Motlagh, Naser Hossein, Kumar, Abhishek, Partala, Juha, Nguyen, Tri, Pujol, Víctor Casamayor, Kostakos, Panos, Leppänen, Teemu, González-Gil, Alfonso, Sola, Ester, Angulo, Iñigo, Liyanage, Madhusanka, Bennis, Mehdi, Tarkoma, Sasu, Dustdar, Schahram, Pirttikangas, Susanna, and Riekki, Jukka
- Subjects
Computer Science - Multiagent Systems ,Computer Science - Artificial Intelligence ,Computer Science - Machine Learning - Abstract
Future AI applications require performance, reliability and privacy that the existing, cloud-dependant system architectures cannot provide. In this article, we study orchestration in the device-edge-cloud continuum, and focus on edge AI for resource orchestration. We claim that to support the constantly growing requirements of intelligent applications in the device-edge-cloud computing continuum, resource orchestration needs to embrace edge AI and emphasize local autonomy and intelligence. To justify the claim, we provide a general definition for continuum orchestration, and look at how current and emerging orchestration paradigms are suitable for the computing continuum. We describe certain major emerging research themes that may affect future orchestration, and provide an early vision of an orchestration paradigm that embraces those research themes. Finally, we survey current key edge AI methods and look at how they may contribute into fulfilling the vision of future continuum orchestration., Comment: 50 pages, 8 figures, 3 tables (Minor revisions)
- Published
- 2022
27. Zabczyk Type Criteria for Asymptotic Behavior of Dynamical Systems and Applications
- Author
-
Dragičević, Davor, Sasu, Adina Luminiţa, Sasu, Bogdan, and Şirianţu, Ana
- Published
- 2023
- Full Text
- View/download PDF
28. Inclusive Competitive Business and Economic Welfare in Africa: The Role of Remittance Inflows
- Author
-
Ofori-Sasu, Daniel, Dzisi, Smile, Asiama, Kojo Agyekum, and Odoom, Franklin Dodzi
- Published
- 2023
- Full Text
- View/download PDF
29. Roadmap for Edge AI: A Dagstuhl Perspective
- Author
-
Ding, Aaron Yi, Peltonen, Ella, Meuser, Tobias, Aral, Atakan, Becker, Christian, Dustdar, Schahram, Hiessl, Thomas, Kranzlmuller, Dieter, Liyanage, Madhusanka, Magshudi, Setareh, Mohan, Nitinder, Ott, Joerg, Rellermeyer, Jan S., Schulte, Stefan, Schulzrinne, Henning, Solmaz, Gurkan, Tarkoma, Sasu, Varghese, Blesson, and Wolf, Lars
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Artificial Intelligence ,I.2.11 - Abstract
Based on the collective input of Dagstuhl Seminar (21342), this paper presents a comprehensive discussion on AI methods and capabilities in the context of edge computing, referred as Edge AI. In a nutshell, we envision Edge AI to provide adaptation for data-driven applications, enhance network and radio access, and allow the creation, optimization, and deployment of distributed AI/ML pipelines with given quality of experience, trust, security and privacy targets. The Edge AI community investigates novel ML methods for the edge computing environment, spanning multiple sub-fields of computer science, engineering and ICT. The goal is to share an envisioned roadmap that can bring together key actors and enablers to further advance the domain of Edge AI., Comment: for ACM SIGCOMM CCR
- Published
- 2021
30. Teacher candidates’ experiences of emergency remote assessment during COVID-19
- Author
-
Asamoah, Daniel, Baidoo-Anu, David, Quainoo, Eric Atta, Gyamerah, Kenneth, Amoateng, Ernest Yaw, and Sasu, Ernest Ofori
- Published
- 2024
- Full Text
- View/download PDF
31. Lessons Learned from Customizing and Applying ACTA to Design a Novel Device for Emergency Medical Care
- Author
-
Stanik, Christoph, Puhlfürß, Tim, Mahler, Anne, Sasu, Phillip Brenya, Reip, Wikhart, and Maalej, Walid
- Subjects
Computer Science - Software Engineering - Abstract
Preclinical patient care is both mentally and physically challenging and exhausting for emergency teams. The teams intensively use medical technology to help the patient on site. However, they must carry and handle multiple heavy medical devices such as a monitor for the patient's vital signs, a ventilator to support an unconscious patient, and a resuscitation device. In an industry project, we aim at developing a combined device that lowers the emergency teams' mental and physical load caused by multiple screens, devices, and their high weight. The focus of this paper is to describe our ideation and requirements elicitation process regarding the user interface design of the combined device. For one year, we applied a fully digital customized version of the Applied Cognitive Task Analysis (ACTA) method to systematically elicit the requirements. Domain and requirements engineering experts created a detailed hierarchical task diagram of an extensive emergency scenario, conducted eleven interviews with subject matter experts (SMEs), and executed two design workshops, which led to 34 sketches and three mockups of the combined device's user interface. Cross-functional teams accompanied the entire process and brought together expertise in preclinical patient care, requirements engineering, and medical product development. We report on the lessons learned for each of the four consecutive stages of our customized ACTA process., Comment: Accepted for publication at the 29th IEEE International Requirements Engineering Conference
- Published
- 2021
- Full Text
- View/download PDF
32. The Stability of Early Developing Attentional Bias for Faces and Fear from 8 to 30 and 60 Months in the FinnBrain Birth Cohort Study
- Author
-
Kataja, Eeva-Leena, Eskola, Eeva, Pelto, Juho, Korja, Riikka, Paija, Sasu-Petteri, Nolvi, Saara, Häikiö, Tuomo, Karlsson, Linnea, Karlsson, Hasse, and Leppänen, Jukka M.
- Abstract
Most infants exhibit an attentional bias for faces and fearful facial expressions. These biases reduce toward the third year of life, but little is known about the development of the biases beyond early childhood. We used the same methodology longitudinally to assess attention disengagement patterns from nonface control pictures and faces (neutral, happy, and fearful expressions) in a large sample of children at 8, 30, and 60 months (N = 389/393/492, respectively; N = 72 for data in all three assessment; girls >45.3% in each assessment). "Face bias" was measured as a difference in disengagement probability (DP) from faces (neutral/happy) versus nonface patterns. "Fear bias" was calculated as a difference in DP for fearful versus happy/neutral faces. At group level, DPs followed a nonlinear longitudinal trajectory in all face conditions, being lowest at 8 months, highest at 30 months, and intermediate at 60 months. Face bias declined between 8 and 30 months, but did not change between 30 and 60 months. Fear bias declined linearly from 8 to 60 months. Individual differences in disengagement were generally not stable across age, but weak correlations were found in face bias between 8- and 60-month, and in DPs between 30- and 60-month (rs = 0.22-0.41). The results suggest that prioritized attention to faces--that is, a hallmark of infant cognition and a key aspect of human social behavior--follows a nonlinear trajectory in early childhood and may have only weak continuity from infancy to mid childhood.
- Published
- 2022
- Full Text
- View/download PDF
33. Aggregate Cyber-Risk Management in the IoT Age: Cautionary Statistics for (Re)Insurers and Likes
- Author
-
Pal, Ranjan, Huang, Ziyuan, Yin, Xinlong, Lototsky, Sergey, De, Swades, Tarkoma, Sasu, Liu, Mingyan, Crowcroft, Jon, and Sastry, Nishanth
- Subjects
Computer Science - Performance ,Electrical Engineering and Systems Science - Systems and Control ,Quantitative Finance - Risk Management - Abstract
In this paper, we provide (i) a rigorous general theory to elicit conditions on (tail-dependent) heavy-tailed cyber-risk distributions under which a risk management firm might find it (non)sustainable to provide aggregate cyber-risk coverage services for smart societies, and (ii)a real-data driven numerical study to validate claims made in theory assuming boundedly rational cyber-risk managers, alongside providing ideas to boost markets that aggregate dependent cyber-risks with heavy-tails.To the best of our knowledge, this is the only complete general theory till date on the feasibility of aggregate cyber-risk management., Comment: incrementally updated version to version in IEEE Internet of Things Journal
- Published
- 2021
- Full Text
- View/download PDF
34. Who Needs MLOps: What Data Scientists Seek to Accomplish and How Can MLOps Help?
- Author
-
Mäkinen, Sasu, Skogström, Henrik, Laaksonen, Eero, and Mikkonen, Tommi
- Subjects
Computer Science - Software Engineering - Abstract
Following continuous software engineering practices, there has been an increasing interest in rapid deployment of machine learning (ML) features, called MLOps. In this paper, we study the importance of MLOps in the context of data scientists' daily activities, based on a survey where we collected responses from 331 professionals from 63 different countries in ML domain, indicating on what they were working on in the last three months. Based on the results, up to 40% respondents say that they work with both models and infrastructure; the majority of the work revolves around relational and time series data; and the largest categories of problems to be solved are predictive analysis, time series data, and computer vision. The biggest perceived problems revolve around data, although there is some awareness of problems related to deploying models to production and related procedures. To hypothesise, we believe that organisations represented in the survey can be divided to three categories -- (i) figuring out how to best use data; (ii) focusing on building the first models and getting them to production; and (iii) managing several models, their versions and training datasets, as well as retraining and frequent deployment of retrained models. In the results, the majority of respondents are in category (i) or (ii), focusing on data and models; however the benefits of MLOps only emerge in category (iii) when there is a need for frequent retraining and redeployment. Hence, setting up an MLOps pipeline is a natural step to take, when an organization takes the step from ML as a proof-of-concept to ML as a part of nominal activities., Comment: 2021 IEEE/ACM 1st Workshop on AI Engineering - Software Engineering for AI (WAIN) of 43rd International Conference on Software Engineering (ICSE)
- Published
- 2021
35. AICP: Augmented Informative Cooperative Perception
- Author
-
Zhou, Pengyuan, Kortoci, Pranvera, Yau, Yui-Pan, Braud, Tristan, Wang, Xiujun, Finley, Benjamin, Lee, Lik-Hang, Tarkoma, Sasu, Kangasharju, Jussi, and Hui, Pan
- Subjects
Computer Science - Multimedia ,Computer Science - Human-Computer Interaction - Abstract
Connected vehicles, whether equipped with advanced driver-assistance systems or fully autonomous, require human driver supervision and are currently constrained to visual information in their line-of-sight. A cooperative perception system among vehicles increases their situational awareness by extending their perception range. Existing solutions focus on improving perspective transformation and fast information collection. However, such solutions fail to filter out large amounts of less relevant data and thus impose significant network and computation load. Moreover, presenting all this less relevant data can overwhelm the driver and thus actually hinder them. To address such issues, we present Augmented Informative Cooperative Perception (AICP), the first fast-filtering system which optimizes the informativeness of shared data at vehicles to improve the fused presentation. To this end, an informativeness maximization problem is presented for vehicles to select a subset of data to display to their drivers. Specifically, we propose (i) a dedicated system design with custom data structure and lightweight routing protocol for convenient data encapsulation, fast interpretation and transmission, and (ii) a comprehensive problem formulation and efficient fitness-based sorting algorithm to select the most valuable data to display at the application layer. We implement a proof-of-concept prototype of AICP with a bandwidth-hungry, latency-constrained real-life augmented reality application. The prototype adds only 12.6 milliseconds of latency to a current informativeness-unaware system. Next, we test the networking performance of AICP at scale and show that ACIP effectively filters out less relevant packets and decreases the channel busy time., Comment: Accepted in IEEE Transactions on Intelligent Transportation Systems
- Published
- 2021
36. 5G MEC Computation Handoff for Mobile Augmented Reality
- Author
-
Zhou, Pengyuan, Fu, Shuhao, Finley, Benjamin, Li, Xuebing, Tarkoma, Sasu, Kangasharju, Jussi, Ammar, Mostafa, and Hui, Pan
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
The combination of 5G and Multi-access Edge Computing (MEC) can significantly reduce application delay by lowering transmission delay and bringing computational capabilities closer to the end user. Therefore, 5G MEC could enable excellent user experience in applications like Mobile Augmented Reality (MAR), which are computation-intensive, and delay and jitter-sensitive. However, existing 5G handoff algorithms often do not consider the computational load of MEC servers, are too complex for real-time execution, or do not integrate easily with the standard protocol stack. Thus they can impair the performance of 5G MEC. To address this gap, we propose Comp-HO, a handoff algorithm that finds a local solution to the joint problem of optimizing signal strength and computational load. Additionally, Comp-HO can easily be integrated into current LTE and 5G base stations thanks to its simplicity and standard-friendly deployability. Specifically, we evaluate Comp-HO through a custom NS-3 simulator which we calibrate via MAR prototype measurements from a real-world 5G testbed. We simulate both Comp-HO and several classic handoff algorithms. The results show that, even without a global optimum, the proposed algorithm still significantly reduces the number of large delays, caused by congestion at MECs, at the expense of a small increase in transmission delay.
- Published
- 2021
37. SimCost: cost-effective resource provision prediction and recommendation for spark workloads
- Author
-
Chen, Yuxing, Hoque, Mohammad A., Xu, Pengfei, Lu, Jiaheng, and Tarkoma, Sasu
- Published
- 2024
- Full Text
- View/download PDF
38. An empirical investigation of COVID-19 effects on herding behaviour in USA and UK stock markets using a quantile regression approach
- Author
-
Ampofo, Richard T., Aidoo, Eric N., Ntiamoah, Bernard O., Frimpong, Ophelia, and Sasu, Daniel
- Published
- 2023
- Full Text
- View/download PDF
39. BONIK: A Blockchain Empowered Chatbot for Financial Transactions
- Author
-
Bhuiyan, Md. Saiful Islam, Razzak, Abdur, Ferdous, Md Sadek, Chowdhury, Mohammad Jabed M., Hoque, Mohammad A., and Tarkoma, Sasu
- Subjects
Computer Science - Cryptography and Security - Abstract
A Chatbot is a popular platform to enable users to interact with a software or website to gather information or execute actions in an automated fashion. In recent years, chatbots are being used for executing financial transactions, however, there are a number of security issues, such as secure authentication, data integrity, system availability and transparency, that must be carefully handled for their wide-scale adoption. Recently, the blockchain technology, with a number of security advantages, has emerged as one of the foundational technologies with the potential to disrupt a number of application domains, particularly in the financial sector. In this paper, we forward the idea of integrating a chatbot with blockchain technology in the view to improve the security issues in financial chatbots. More specifically, we present BONIK, a blockchain empowered chatbot for financial transactions, and discuss its architecture and design choices. Furthermore, we explore the developed Proof-of-Concept (PoC), evaluate its performance, analyse how different security and privacy issues are mitigated using BONIK., Comment: Accepted at the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020)
- Published
- 2020
40. Machine Learning Optimization of Quantum Circuit Layouts
- Author
-
Paler, Alexandru, Sasu, Lucian M., Florea, Adrian, and Andonie, Razvan
- Subjects
Quantum Physics - Abstract
The quantum circuit layout (QCL) problem is to map a quantum circuit such that the constraints of the device are satisfied. We introduce a quantum circuit mapping heuristic, QXX, and its machine learning version, QXX-MLP. The latter infers automatically the optimal QXX parameter values such that the layed out circuit has a reduced depth. In order to speed up circuit compilation, before laying the circuits out, we are using a Gaussian function to estimate the depth of the compiled circuits. This Gaussian also informs the compiler about the circuit region that influences most the resulting circuit's depth. We present empiric evidence for the feasibility of learning the layout method using approximation. QXX and QXX-MLP open the path to feasible large scale QCL methods., Comment: accepted in ACM Transactions on Quantum Computing
- Published
- 2020
41. Validation Frameworks for Self-Driving Vehicles: A Survey
- Author
-
Concas, Francesco, Nurminen, Jukka K., Mikkonen, Tommi, and Tarkoma, Sasu
- Subjects
Computer Science - Software Engineering - Abstract
As a part of the digital transformation, we interact with more and more intelligent gadgets. Today, these gadgets are often mobile devices, but in the advent of smart cities, more and more infrastructure---such as traffic and buildings---in our surroundings becomes intelligent. The intelligence, however, does not emerge by itself. Instead, we need both design techniques to create intelligent systems, as well as approaches to validate their correct behavior. An example of intelligent systems that could benefit smart cities are self-driving vehicles. Self-driving vehicles are continuously becoming both commercially available and common on roads. Accidents involving self-driving vehicles, however, have raised concerns about their reliability. Due to these concerns, the safety of self-driving vehicles should be thoroughly tested before they can be released into traffic. To ensure that self-driving vehicles encounter all possible scenarios, several millions of hours of testing must be carried out; therefore, testing self-driving vehicles in the real world is impractical. There is also the issue that testing self-driving vehicles directly in the traffic poses a potential safety hazard to human drivers. To tackle this challenge, validation frameworks for testing self-driving vehicles in simulated scenarios are being developed by academia and industry. In this chapter, we briefly introduce self-driving vehicles and give an overview of validation frameworks for testing them in a simulated environment. We conclude by discussing what an ideal validation framework at the state of the art should be and what could benefit validation frameworks for self-driving vehicles in the future.
- Published
- 2020
- Full Text
- View/download PDF
42. Toward Large-Scale Autonomous Monitoring and Sensing of Underwater Pollutants
- Author
-
Flores, Huber, Motlagh, Naser Hossein, Zuniga, Agustin, Liyanage, Mohan, Passananti, Monica, Tarkoma, Sasu, Youssef, Moustafa, and Nurmi, Petteri
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Electrical Engineering and Systems Science - Signal Processing - Abstract
Marine pollution is a growing worldwide concern, affecting health of marine ecosystems, human health, climate change, and weather patterns. To reduce underwater pollution, it is critical to have access to accurate information about the extent of marine pollutants as otherwise appropriate countermeasures and cleaning measures cannot be chosen. Currently such information is difficult to acquire as existing monitoring solutions are highly laborious or costly, limited to specific pollutants, and have limited spatial and temporal resolution. In this article, we present a research vision of large-scale autonomous marine pollution monitoring that uses coordinated groups of autonomous underwater vehicles (AUV)s to monitor extent and characteristics of marine pollutants. We highlight key requirements and reference technologies to establish a research roadmap for realizing this vision. We also address the feasibility of our vision, carrying out controlled experiments that address classification of pollutants and collaborative underwater processing, two key research challenges for our vision., Comment: 10 pages, 4 figures, 15 references
- Published
- 2020
43. 6G White Paper on Edge Intelligence
- Author
-
Peltonen, Ella, Bennis, Mehdi, Capobianco, Michele, Debbah, Merouane, Ding, Aaron, Gil-Castiñeira, Felipe, Jurmu, Marko, Karvonen, Teemu, Kelanti, Markus, Kliks, Adrian, Leppänen, Teemu, Lovén, Lauri, Mikkonen, Tommi, Rao, Ashwin, Samarakoon, Sumudu, Seppänen, Kari, Sroka, Paweł, Tarkoma, Sasu, and Yang, Tingting
- Subjects
Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Artificial Intelligence ,Computer Science - Networking and Internet Architecture - Abstract
In this white paper we provide a vision for 6G Edge Intelligence. Moving towards 5G and beyond the future 6G networks, intelligent solutions utilizing data-driven machine learning and artificial intelligence become crucial for several real-world applications including but not limited to, more efficient manufacturing, novel personal smart device environments and experiences, urban computing and autonomous traffic settings. We present edge computing along with other 6G enablers as a key component to establish the future 2030 intelligent Internet technologies as shown in this series of 6G White Papers. In this white paper, we focus in the domains of edge computing infrastructure and platforms, data and edge network management, software development for edge, and real-time and distributed training of ML/AI algorithms, along with security, privacy, pricing, and end-user aspects. We discuss the key enablers and challenges and identify the key research questions for the development of the Intelligent Edge services. As a main outcome of this white paper, we envision a transition from Internet of Things to Intelligent Internet of Intelligent Things and provide a roadmap for development of 6G Intelligent Edge.
- Published
- 2020
44. Pose Manipulation with Identity Preservation
- Author
-
Ardelean, Andrei-Timotei and Sasu, Lucian Mircea
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Graphics ,Computer Science - Machine Learning - Abstract
This paper describes a new model which generates images in novel poses e.g. by altering face expression and orientation, from just a few instances of a human subject. Unlike previous approaches which require large datasets of a specific person for training, our approach may start from a scarce set of images, even from a single image. To this end, we introduce Character Adaptive Identity Normalization GAN (CainGAN) which uses spatial characteristic features extracted by an embedder and combined across source images. The identity information is propagated throughout the network by applying conditional normalization. After extensive adversarial training, CainGAN receives figures of faces from a certain individual and produces new ones while preserving the person's identity. Experimental results show that the quality of generated images scales with the size of the input set used during inference. Furthermore, quantitative measurements indicate that CainGAN performs better compared to other methods when training data is limited., Comment: 9 pages, journal article
- Published
- 2020
- Full Text
- View/download PDF
45. Edge Intelligence: Architectures, Challenges, and Applications
- Author
-
Xu, Dianlei, Li, Tong, Li, Yong, Su, Xiang, Tarkoma, Sasu, Jiang, Tao, Crowcroft, Jon, and Hui, Pan
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Artificial Intelligence - Abstract
Edge intelligence refers to a set of connected systems and devices for data collection, caching, processing, and analysis in locations close to where data is captured based on artificial intelligence. The aim of edge intelligence is to enhance the quality and speed of data processing and protect the privacy and security of the data. Although recently emerged, spanning the period from 2011 to now, this field of research has shown explosive growth over the past five years. In this paper, we present a thorough and comprehensive survey on the literature surrounding edge intelligence. We first identify four fundamental components of edge intelligence, namely edge caching, edge training, edge inference, and edge offloading, based on theoretical and practical results pertaining to proposed and deployed systems. We then aim for a systematic classification of the state of the solutions by examining research results and observations for each of the four components and present a taxonomy that includes practical problems, adopted techniques, and application goals. For each category, we elaborate, compare and analyse the literature from the perspectives of adopted techniques, objectives, performance, advantages and drawbacks, etc. This survey article provides a comprehensive introduction to edge intelligence and its application areas. In addition, we summarise the development of the emerging research field and the current state-of-the-art and discuss the important open issues and possible theoretical and technical solutions., Comment: 53 pages, 37 figures, survey
- Published
- 2020
46. FlexState: Enabling Innovation in Network Function State Management
- Author
-
Pozza, Matteo, Rao, Ashwin, Lugones, Diego, and Tarkoma, Sasu
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Network function (NF) developers need to provide highly available solutions with diverse packet processing features at line rate. A significant challenge in developing such functions is to build flexible software that can be adapted to different operating environments, vendors, and operator use-cases. Today, refactoring NF software for specific scenarios can take months. Furthermore, network operators are increasingly adopting fast-paced development practices for continuous software delivery to gain market advantage, which imposes even shorter development cycles. A key aspect in NF design is state management, which can be optimized across deployments by carefully selecting the underlying data store. However, migrating to a data store that suits a different use-case is time consuming because it requires code refactoring while revisiting its application programming interfaces, APIs. In this paper we introduce FlexState, a state management system that decouples the NF packet processing logic from the data store that maintains its state. The objective is to reduce code refactoring significantly by incorporating an abstraction layer that exposes various data stores as configuration alternatives. Experiments show that FlexState achieves significant flexibility in optimizing the NF state management across several scenarios with negligible overhead.
- Published
- 2020
47. In Situ Network and Application Performance Measurement on Android Devices and the Imperfections
- Author
-
Hoque, Mohammad A., Rao, Ashwin, and Tarkoma, Sasu
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Performance - Abstract
Understanding network and application performance are essential for debugging, improving user experience, and performance comparison. Meanwhile, modern mobile systems are optimized for energy-efficient computation and communications that may limit the performance of network and applications. In recent years, several tools have emerged that analyze network performance of mobile applications in~situ with the help of the VPN service. There is a limited understanding of how these measurement tools and system optimizations affect the network and application performance. In this study, we first demonstrate that mobile systems employ energy-aware system hardware tuning, which affects application performance and network throughput. We next show that the VPN-based application performance measurement tools, such as Lumen, PrivacyGuard, and Video Optimizer, aid in ambiguous network performance measurements and degrade the application performance. Our findings suggest that sound application and network performance measurement on Android devices requires a good understanding of the device, networks, measurement tools, and applications.
- Published
- 2020
48. Marketplace for AI Models
- Author
-
Kumar, Abhishek, Finley, Benjamin, Braud, Tristan, Tarkoma, Sasu, and Hui, Pan
- Subjects
Computer Science - Computers and Society ,Computer Science - Artificial Intelligence - Abstract
Artificial intelligence shows promise for solving many practical societal problems in areas such as healthcare and transportation. However, the current mechanisms for AI model diffusion such as Github code repositories, academic project webpages, and commercial AI marketplaces have some limitations; for example, a lack of monetization methods, model traceability, and model auditabilty. In this work, we sketch guidelines for a new AI diffusion method based on a decentralized online marketplace. We consider the technical, economic, and regulatory aspects of such a marketplace including a discussion of solutions for problems in these areas. Finally, we include a comparative analysis of several current AI marketplaces that are already available or in development. We find that most of these marketplaces are centralized commercial marketplaces with relatively few models.
- Published
- 2020
49. Trustworthy AI in the Age of Pervasive Computing and Big Data
- Author
-
Kumar, Abhishek, Braud, Tristan, Tarkoma, Sasu, and Hui, Pan
- Subjects
Computer Science - Computers and Society - Abstract
The era of pervasive computing has resulted in countless devices that continuously monitor users and their environment, generating an abundance of user behavioural data. Such data may support improving the quality of service, but may also lead to adverse usages such as surveillance and advertisement. In parallel, Artificial Intelligence (AI) systems are being applied to sensitive fields such as healthcare, justice, or human resources, raising multiple concerns on the trustworthiness of such systems. Trust in AI systems is thus intrinsically linked to ethics, including the ethics of algorithms, the ethics of data, or the ethics of practice. In this paper, we formalise the requirements of trustworthy AI systems through an ethics perspective. We specifically focus on the aspects that can be integrated into the design and development of AI systems. After discussing the state of research and the remaining challenges, we show how a concrete use-case in smart cities can benefit from these methods., Comment: To be published in Percrowd 2020 (PerCom Adjunct). Please cite as: Abhishek Kumar, Tristan Braud, Sasu Tarkoma, Pan Hui. Trustworthy AI in the Age of Pervasive Computing and Big Data. In Proceedings of the 3rd International Workshop on Context-awareness for Multi-device Pervasive and Mobile Computing (Percrowd), Austin USA, March 2020 (Percom 2020 Workshop)
- Published
- 2020
50. Author Correction: A Satellite Imagery Dataset for Long-Term Sustainable Development in United States Cities
- Author
-
Xi, Yanxin, Liu, Yu, Li, Tong, Ding, Jingtao, Zhang, Yunke, Tarkoma, Sasu, Li, Yong, and Hui, Pan
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.