Incentives are usually introduced by the regulator entity (third-party), to promote cooperation in a market. The implementation of incentives is always costly and thus might fail to be enforced sustainably. This work aims at exploring the effects of …
An edge data center can host applications that require low-latency access to nearby end devices. If the resource requirements of the applications exceed the capacity of the edge data center, some non-latency-critical application components may be …
In recent years, cloud computing concepts have been extended towards the network edge, leading to paradigms like edge computing and fog computing. As a result, applications can be placed on a variety of resources, including fog nodes and cloud data …
Insurgency conflicts pose significant challenges to societies globally. The increase of insurgency conflicts creates a need to understand how insurgencies arise, and to identify societal drivers of insurgencies or effective strategies to counter …
Under international law, weapon capabilities and their use are regulated by legal requirements set by International Humanitarian Law (IHL). Currently, there are strong military incentives to equip capabilities with increasingly advanced artificial …
In both hardware and software, masking can represent an effective means of hardening an implementation against side-channel attack vectors such as Differential Power Analysis (DPA). Focusing on software, however, the use of masking can present …