LEADER 10759nam 22004693 450 001 996587859503316 005 20240308080228.0 010 $a981-9708-08-7 035 $a(CKB)30597566200041 035 $a(MiAaPQ)EBC31200944 035 $a(Au-PeEL)EBL31200944 035 $a(EXLCZ)9930597566200041 100 $a20240308d2024 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAlgorithms and Architectures for Parallel Processing $e23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part V 205 $a1st ed. 210 1$aSingapore :$cSpringer,$d2024. 210 4$dİ2024. 215 $a1 online resource (525 pages) 225 1 $aLecture Notes in Computer Science Series ;$vv.14491 311 $a981-9708-07-9 327 $aIntro -- Preface -- Organization -- Contents - Part V -- EQFF: An Efficient Query Method Using Feature Fingerprints -- 1 Introduction -- 2 Related Work -- 2.1 Privacy of Bloom Filters -- 2.2 Fuzzy Query -- 3 System Overview -- 4 Construction of Data Feature Fingerprints -- 4.1 Construction and Chunking of Data Feature Fingerprints -- 4.2 Fingerprint Compression Storage Algorithm -- 5 Precise Query Library and Rapid Query -- 5.1 Acceleration Algorithm Based on Inverted Index Library -- 5.2 Precise Query Algorithm Based on Bloom Filter -- 6 Fuzzy Query and Similarity Measurement -- 6.1 Similarity Measurement Based on Counting Bloom Filters -- 6.2 Search Algorithm Acceleration Using Parallel Computing -- 7 Evaluation -- 7.1 Experimental Settings and Dataset -- 7.2 Storage Overhead and Parameter Selection for Feature Fingerprints -- 7.3 Performance for Precise Query -- 7.4 Performance for Fuzzy Query -- 8 Conclusion -- References -- Joint Controller Placement and Flow Assignment in Software-Defined Edge Networks -- 1 Introduction -- 2 Related Work -- 2.1 Assignment Schemes -- 2.2 Placement and Assignment Schemes -- 2.3 Placement and Assignment Schemes in SDN-Enabled Edge Network -- 3 System Model and Problem Formulation -- 3.1 System Model -- 3.2 Flow-Setup Delay Model -- 3.3 Problem Formulation -- 4 Controller Placement and Flow Assignment -- 4.1 Controller Placement -- 4.2 Flow Assignment -- 5 Experiment and Performance Evaluation -- 5.1 Controller Response Time -- 5.2 High Queuing Delay Flows -- 5.3 Folw-Setup Delay Constraint Violated Flows -- 5.4 Algorithm Execution Time -- 6 Conclusion -- References -- Distributed Latency-Efficient Beaconing for Multi-channel Asynchronous Duty-Cycled IoT Networks -- 1 Introduction -- 2 Related Works -- 3 Problem Definition -- 4 Distributed Latency-Efficient Scheduling Algorithm. 327 $a4.1 Special Structures for Collision Avoidance -- 4.2 Computing Candidate Node Transmission Schedule -- 4.3 The Distributed Beaconing Schedule Algorithm -- 5 Performance Analysis -- 6 Simulation Results -- 6.1 Performance Comparison in Single-channel Duty-Cycled Scenarios -- 6.2 Performance Analysis in Multi-channel Duty-Cycled Scenarios -- 7 Conclusions -- References -- Improved Task Allocation in Mobile Crowd Sensing Based on Mobility Prediction and Multi-objective Optimization -- 1 Introduction -- 2 Related Work -- 3 System Overview and Problem Formulation -- 3.1 System Overview -- 3.2 Problem Formulation -- 3.3 Hardness Analysis of M3P Problem -- 4 Fuzzy Control System -- 4.1 Fuzzy Set and Membership Function -- 4.2 Fuzzy Inference Engine -- 4.3 COG Defuzzification -- 5 Task Allocation Algorithm -- 5.1 Most Possible First Algorithm -- 5.2 Improved NSGA-II Algorithm -- 6 Evaluation -- 6.1 Dataset -- 6.2 Baselines -- 6.3 Performance of Mobility Prediction -- 6.4 Performance of Task Allocation -- 7 Conclusion -- References -- SMCoEdge: Simultaneous Multi-server Offloading for Collaborative Mobile Edge Computing -- 1 Introduction -- 2 Related Work -- 2.1 Edge-Cloud Collaboration -- 2.2 Edge-Edge Collaboration -- 3 System Model and Problem Formulation -- 3.1 System Model -- 3.2 Problem Formulation -- 4 Proposed Approach -- 4.1 SMCoEdge Framework -- 4.2 Improved DQN for Multi-ES Selection -- 4.3 Closed-Form Solution for Task Allocation -- 4.4 DRL-SMO Algorithm -- 5 Performance Evaluation -- 5.1 Setting -- 5.2 Baselines -- 5.3 Results -- 6 Conclusions -- References -- Image Inpainting Forensics Algorithm Based on Dual-Domain Encoder-Decoder Network -- 1 Introduction -- 2 Related Works -- 2.1 Image Inpainting Forensics -- 2.2 Attention Mechanism -- 3 Proposed Method -- 3.1 S-Encoder -- 3.2 F-Encoder -- 3.3 CMAF -- 3.4 Attention-Gated Decoder Network. 327 $a3.5 Loss Function -- 4 Experiment -- 4.1 Experimental Setup -- 4.2 Comparing with Previous Methods -- 4.3 Abation Study -- 4.4 Robustness Evaluation -- 5 Conclusions -- References -- Robust Medical Data Sharing System Based on Blockchain and Threshold Rroxy Re-encryption -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Blockchain -- 3.2 Threshold Proxy Re-encryption -- 4 BMDSS Model -- 4.1 System Model -- 4.2 Application -- 5 System Evaluation -- 5.1 Environment -- 5.2 Data Storage Performance -- 5.3 Data Sharing Performance -- 5.4 Security Analysis -- 6 Conclusion -- References -- FRAIM: A Feature Importance-Aware Incentive Mechanism for Vertical Federated Learning -- 1 Introduction -- 2 Related Work -- 2.1 Federated Learning -- 2.2 Incentive Mechanism of Federated Learning -- 3 System Model and Problem Definition -- 3.1 Vertical Federated Learning -- 3.2 System Model -- 3.3 Problem Definition -- 4 Incentive Mechanism Design of Vertical Federated Learning -- 4.1 Data Synthesis and Feature Importance Estimation -- 4.2 Design of FRAIM -- 4.3 Theoretical Analysis -- 5 Experimental Evaluation -- 5.1 Experiment Setup -- 5.2 Performance on Three Datasets -- 5.3 Performance with Different Budgets -- 6 Conclusion -- References -- A Multi-objective Method for Energy-Efficient UAV Data Collection Communications -- 1 Introduction -- 2 Models and Preliminaries -- 2.1 System Model -- 2.2 Network Model -- 2.3 Energy Consumption Model of the UAV -- 3 Problem Formulation and Analysis -- 3.1 Problem Statement -- 3.2 Optimization Objectives -- 4 Algorithm -- 4.1 Conventional MOGOA -- 4.2 EMOGOA -- 5 Simulation Results and Analysis -- 5.1 Simulation Setups -- 5.2 Simulation Results -- 6 Conclusion -- References -- Black-Box Graph Backdoor Defense -- 1 Introduction -- 2 Related Work -- 2.1 Graph Neural Network Backdoor -- 2.2 Black Box Backdoor Defenses. 327 $a3 Methodology -- 3.1 Defense Assumptions and Goals -- 3.2 Key Intuition -- 3.3 BloGBaD -- 4 Experiment -- 4.1 Experiment Settings -- 4.2 Evaluation Metrics -- 4.3 GTA Defense -- 4.4 GBA Defense -- 5 Conclusion -- References -- DRL-Based Optimization Algorithm for Wireless Powered IoT Network -- 1 Introduction -- 2 Related Work -- 2.1 Binary Offloading -- 2.2 Partial Offloading -- 3 System Model and Problem Formulation -- 3.1 System Model -- 3.2 Local Computing Mode -- 3.3 Edge Computing Mode -- 3.4 Problem Formulation -- 4 Deep-Reinforcement-Learning-Based Offloading Algorithm -- 4.1 Deep-Reinforcement-Learning-Based Method for Solving Top-Problem -- 4.2 Mixed Optimization Method for Solving Sub-problem -- 5 Numerical Results -- 5.1 Convergence Performance -- 5.2 Influence of Different Parameters on Result -- 5.3 Numerical Evaluation -- 6 Conclusion -- References -- Efficiently Running SpMV on Multi-core DSPs for Banded Matrix -- 1 Introduction -- 2 Background -- 2.1 FT-M7032 Heterogeneous Processor -- 2.2 Sparse Matrix Storage Format -- 2.3 Banded Matrix -- 3 Our Approach -- 3.1 Architecture Analysis -- 3.2 SpMV_Band Design and Implementation -- 4 Performance Results -- 4.1 Experimental Setup -- 4.2 Performance Evaluation -- 5 Related Work -- 6 Conclusion -- References -- SR-KGELS: Social Recommendation Based on Knowledge Graph Embedding Method and Long-Short-Term Representation -- 1 Introduction -- 2 Related Work -- 3 Problem Definition -- 4 The Proposed Model -- 4.1 Embedding Layer and Input Data Pre-processing -- 4.2 User Modeling -- 4.3 Item Modeling -- 4.4 Relative Location Difference Modeling -- 4.5 Model Training -- 5 Experiments -- 5.1 Experimental Settings -- 5.2 Comparative Results -- 5.3 Ablation Study -- 5.4 Analysis of Parameters -- 6 Conclusion -- References. 327 $aCMMR: A Composite Multidimensional Models Robustness Evaluation Framework for Deep Learning -- 1 Introduction -- 2 Attacks, Defense, and Metrics -- 2.1 Attack Methods -- 2.2 Defense Methods -- 2.3 Comparison Metrics -- 3 Composite Multidimensional Model Robust Evaluation Method -- 3.1 Motivation -- 3.2 CMMR Framework -- 4 Experimental Analysis for CMMR -- 4.1 3-Dimension Models Robustness Evaluation. -- 4.2 Evaluating the Robustness of Two Sets of Models by CMMR -- 5 Conclusion -- References -- Efficient Black-Box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems -- 1 Introduction -- 2 Related Work -- 2.1 White-Box and Gray-Box Attacks -- 2.2 Black-Box Attacks -- 3 Methodology -- 3.1 Problem Description -- 3.2 The Proposed Framework -- 3.3 Surrogate Models -- 3.4 The Training of Surrogate Model -- 3.5 Adversarial Examples Generation -- 4 Experiments -- 4.1 Experimental Settings -- 4.2 Transferability Analysis -- 4.3 Frequency Analysis -- 4.4 Performance Comparison -- 5 Discussion of Potential Defenses -- 6 Conclusions and Future Work -- References -- SW-LeNet: Implementation and Optimization of LeNet-1 Algorithm on Sunway Bluelight II Supercomputer -- 1 Introduction -- 2 Related Work -- 2.1 Convolutional Neural Network -- 2.2 The Works Based on the Sunway Supercomputers -- 3 The Sunway Bluelight II Supercomputer and LeNet-1 -- 3.1 The Architecture of the Sunway Bluelight II Supercomputer -- 3.2 The Architecture of LeNet-1 -- 3.3 Serial Execution Mode of LeNet-1 -- 4 SW-LeNet - Parallel Optimization of LeNet-1 on the Sunway Bluelight II Supercomputer -- 4.1 Thread-Level Optimization -- 4.2 Process-Level Optimization -- 5 Evaluation -- 5.1 The Performance of Thread-Level Optimization -- 5.2 The Performance of Process-Level Optimization -- 5.3 The Performance of SW-LeNet -- 5.4 Scaling -- 6 Conclusion -- References. 327 $aMulti-label Detection Method for Smart Contract Vulnerabilities Based on Expert Knowledge and Pre-training Technology. 410 0$aLecture Notes in Computer Science Series 700 $aTari$b Zahir$0845849 701 $aLi$b Keqiu$0763560 701 $aWu$b Hongyi$01730694 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996587859503316 996 $aAlgorithms and Architectures for Parallel Processing$94142072 997 $aUNISA LEADER 02629nam 22007692 450 001 9910962422203321 005 20240912174201.0 010 $a0-19-028735-7 010 $a0-19-773930-X 010 $a1-282-36713-7 010 $a9786612367137 010 $a0-19-534897-4 024 7 $a10.1093/oso/9780195148008.001.0001 035 $a(CKB)1000000000554997 035 $a(SSID)ssj0000360650 035 $a(PQKBManifestationID)12117047 035 $a(PQKBTitleCode)TC0000360650 035 $a(PQKBWorkID)10347173 035 $a(PQKB)10964901 035 $a(Au-PeEL)EBL281218 035 $a(CaPaEBR)ebr10273265 035 $a(CaONFJC)MIL236713 035 $a(OCoLC)476025841 035 $a(Au-PeEL)EBL2012719 035 $a(OCoLC)1406787002 035 $a(StDuBDS)9780197739303 035 $a(MiAaPQ)EBC281218 035 $a(MiAaPQ)EBC2012719 035 $a(EXLCZ)991000000000554997 100 $a20010908e20232001 fy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aGod and mammon $eprotestants, money, and the market, 1790-1860 /$fedited by Mark A. Noll 205 $a1st ed. 210 1$aNew York ;$cOxford University Press,$d2023. 215 $axii, 313 p 225 1 $aOxford scholarship online 300 $aPreviously issued in print: 2001. 311 08$a0-19-514800-2 311 08$a0-19-514801-0 320 $aIncludes bibliographical references and index. 330 8 $aThis collection of essays offers a close look at the connections between American Protestants and money in the Antebellum period. They provide essential background to an issue that continues to generate controversy in the Protestant community today. 410 0$aOxford scholarship online. 606 $aProtestant churches$zUnited States$xHistory$y19th century 606 $aChristianity$xEconomic aspects$zUnited States 606 $aEconomics$xReligious aspects$xChristianity 606 $aChurch finance$zUnited States$xHistory$y19th century 606 $aReligion$2ukslc 607 $aUnited States$xEconomic conditions$yTo 1865 615 0$aProtestant churches$xHistory 615 0$aChristianity$xEconomic aspects 615 0$aEconomics$xReligious aspects$xChristianity. 615 0$aChurch finance$xHistory 615 7$aReligion. 676 $a261.8/5/0973 702 $aNoll$b Mark A.$f1946- 801 0$bStDuBDS 801 1$bStDuBDS 801 2$bStDuBDSZ 801 2$bStDuBDSZ 906 $aBOOK 912 $a9910962422203321 996 $aGod and mammon$94410670 997 $aUNINA