Skip to main content

Showing 1–2 of 2 results for author: Kourouma, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.07130  [pdf, other

    cs.DC cs.AI cs.LG

    Edge-MultiAI: Multi-Tenancy of Latency-Sensitive Deep Learning Applications on Edge

    Authors: SM Zobaed, Ali Mokhtari, Jaya Prakash Champati, Mathieu Kourouma, Mohsen Amini Salehi

    Abstract: Smart IoT-based systems often desire continuous execution of multiple latency-sensitive Deep Learning (DL) applications. The edge servers serve as the cornerstone of such IoT-based systems, however, their resource limitations hamper the continuous execution of multiple (multi-tenant) DL applications. The challenge is that, DL applications function based on bulky "neural network (NN) models" that c… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

    Comments: Accepted in Utility Cloud Computing Conference 2022

  2. arXiv:1001.1993  [pdf

    cs.CR

    Seeing Beyond the Surface, Understanding and Tracking Fraudulent Cyber Activities

    Authors: O. B. Longe, V. Mbarika, M. Kourouma, F. Wada, R. Isabalija

    Abstract: The malaise of electronic spam mail that solicit illicit partnership using bogus business proposals (popularly called 419 mails) remained unabated on the internet despite concerted efforts. In addition to these are the emergence and prevalence of phishing scams that use social engineering tactics to obtain online access codes such as credit card number, ATM pin numbers, bank account details, soc… ▽ More

    Submitted 12 January, 2010; originally announced January 2010.

    Comments: 12 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS December 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Volume 6, No. 3, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 3, pp. 124-135, December 2009, USA