LEADER 07748nam 22007575 450 001 996418319203316 005 20230330065615.0 010 $a3-030-60248-6 024 7 $a10.1007/978-3-030-60248-2 035 $a(CKB)5590000000002293 035 $a(MiAaPQ)EBC6360772 035 $a(DE-He213)978-3-030-60248-2 035 $a(PPN)255176066 035 $a(EXLCZ)995590000000002293 100 $a20200929d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAlgorithms and Architectures for Parallel Processing$b[electronic resource] $e20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2?4, 2020, Proceedings, Part III /$fedited by Meikang Qiu 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XV, 712 p. 250 illus.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v12454 311 $a3-030-60247-8 327 $aUnderstanding Privacy-preserving Techniques in Digital Cryptocurrencies -- LNBFSM: A Food Safety Management System Using Blockchain and Lightning Network -- Reputation-based Trustworthy Supply Chain Management Using Smart Contract -- Content-aware Anomaly Detection with Network Representation Learning -- Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree -- IM-ACS? An Access Control Scheme Supporting Informal non-Malleable Security in Mobile Media Sharing System -- Blockchain-Based Secure and Privacy-Preserving Clinical Data Sharing and Integration -- Blockchain Meets DAG: A BlockDAG Consensus Mechanism -- Dynamic Co-located VM Detection and Membership Update for Residency Aware Inter-VM Communication in Virtualized Clouds -- An attack-immune trusted architecture for supervisory intelligent terminal -- A simulation study on block generation algorithm based on TPS model -- Improving iForest for Hydrological Time Series Anomaly Detection -- Machine Learning-based Attack Detection Method in Hadoop -- Profiling-based Big Data Workflow Optimization in a Cross-Layer Coupled Design Framework -- Detection of Loose Tracking Behavior over Trajectory Data -- Behavioral fault modeling and analysis with BIP: A Wheel Brake System Case Study -- H2P: A Novel Model to Study the Propagation of Modern Hybrid Worm in Hierarchical Networks -- Design of six-rotor drone based on target detection for intelligent agriculture -- Consensus in Lens of Consortium Blockchain: An Empirical Study -- Collaborative design service system based on ceramic cloud service platform -- Towards NoC protection of HT-Greyhole attack -- Cross-Shard Transaction Processing in Sharding Blockchains -- Lexicon-Enhanced Transformer With Pointing For Domains Specific Generative Question Answering -- Design of Smart Home System Based on Collaborative Edge Computing and Cloud Computing -- Classification of Depression Based on Local Binary Pattern and Singular Spectrum Analysis -- Cloud Allocation and Consolidation Based on a Scalability Metric -- Adversarial Attacks on Deep Learning Models of Computer Vision: A Survey -- PLRS: Personalized literature hybrid recommendation system with paper influence- FleetChain: A Secure Scalable and Responsive Blockchain Achieving Optimal Sharding -- DSBFT: A Delegation based Scalable Byzantine False Tolerance Consensus Mechanism -- A Privacy-Preserving Approach for Continuous Data Publication -- Web Attack Detection based on User Behaviour Semantics -- A Supervised Anonymous Issuance scheme of Central Bank Digital Currency based on Blockchain -- IncreAIBMF: Incremental Learning for Encrypted Mobile Application Identification -- A Multi-Level Features Fusion Network for Detecting Obstructive Sleep Apnea Hypopnea Syndrome -- BIMP: Blockchain-Based Incentive Mechanism With Privacy Preserving in Location Proof -- Indoor Positioning and Prediction in Smart Elderly Care: Model, System and Applications -- Research on Stylization Algorithm of Ceramic Decorative Pattern Based on Ceramic Cloud Design Service Platform- Blockchain Consensus Mechanisms and Their Applications in IoT: A Literature Survey -- Towards A secure Communication of Data in IoT Networks: A Technical Research Report -- B Efficient Thermography Guided Learning for Breast Cancer Detection -- PTangle: A Parallel Detector for Unverified Blockchain Transactions -- DOS-GAN: A Distributed Over-Sampling Method Based on Generative Adversarial Networks For Distributed Class-Imbalance Learning -- Effective Sentiment Analysis for Multimodal Review Data on the Web -- Digital Currency Investment Strategy Framework Based on Ranking- Authentication Study for Brain-based Computer Interfaces using Music Stimulations -- An Ensemble Learning Approach to Detect Malwares Based on Static Information -- Automatic Medical Image Report Generation With Multi-View and Multi-Modal Attention Mechanism. 330 $aThis three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020. The total of 142 full papers and 5 short papers included in this proceedings volumes was carefully reviewed and selected from 495 submissions. ICA3PP is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspects of daily life, the power of computing system has become increasingly critical. This conference provides a forum for academics and practitioners from countries around the world to exchange ideas for improving the efficiency, performance, reliability, security and interoperability of computing systems and applications. ICA3PP 2020 focus on two broad areas of parallel and distributed computing, i.e. architectures, algorithms and networks, and systems and applications. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v12454 606 $aMathematics?Data processing 606 $aApplication software 606 $aComputer engineering 606 $aComputer networks 606 $aSoftware engineering 606 $aData structures (Computer science) 606 $aInformation theory 606 $aData protection 606 $aComputational Mathematics and Numerical Analysis 606 $aComputer and Information Systems Applications 606 $aComputer Engineering and Networks 606 $aSoftware Engineering 606 $aData Structures and Information Theory 606 $aData and Information Security 615 0$aMathematics?Data processing. 615 0$aApplication software. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aSoftware engineering. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aData protection. 615 14$aComputational Mathematics and Numerical Analysis. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Engineering and Networks. 615 24$aSoftware Engineering. 615 24$aData Structures and Information Theory. 615 24$aData and Information Security. 676 $a004.0151 702 $aQiu$b Meikang 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996418319203316 996 $aAlgorithms and Architectures for Parallel Processing$9773147 997 $aUNISA