LEADER 01090nas a2200289 i 4500 001 991003727109707536 005 20231109125155.0 008 080616c19849999enktr p 0 0eng d 035 $ab13742632-39ule_inst 040 $aDi.S.Te.B.A.$beng 110 2 $aLinnean Society $0623442 229 4$aThe Linnean :$bnewsletter and proceedings of the Linnean Society of London 245 14$aThe Linnean :$bnewsletter and proceedings of the Linnean Society of London. - 1984- 260 $aLondon :$bThe Society,$c1984- 300 $a v. :$bill. ;$c26 cm 310 $aThree times a year 500 $aTitle from cover 592 $aLE003 1997;2000-2005; lac.: 2000-2001;2003-2005; 650 0$aBiology$vPeriodicals 780 07$tBiological journal of the Linnean Society 780 00$aLinnean newsletter 907 $a.b13742632$b28-01-14$c17-06-08 912 $a991003727109707536 945 $aLE003 $g1$lle003$og$pE0.00$q-$rn$s- $t18$u0$v0$w0$x0$y.i14778361$z17-06-08 996 $aLinnean$91227438 997 $aUNISALENTO 998 $ale003$b17-06-08$cs$da $e-$feng$genk$h4$i0 LEADER 05354nam 22006975 450 001 9910841857303321 005 20251225194955.0 010 $a981-9708-59-1 024 7 $a10.1007/978-981-97-0859-8 035 $a(CKB)30597560700041 035 $a(MiAaPQ)EBC31200959 035 $a(Au-PeEL)EBL31200959 035 $a(DE-He213)978-981-97-0859-8 035 $a(EXLCZ)9930597560700041 100 $a20240226d2024 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAlgorithms and Architectures for Parallel Processing $e23rd International Conference, ICA3PP 2023, Tianjin, China, October 20?22, 2023, Proceedings, Part IV /$fedited by Zahir Tari, Keqiu Li, Hongyi Wu 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (508 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14490 300 $aIncludes index. 311 08$a981-9708-58-3 327 $aCSDSE: Apply Cooperative Search to Solve the Exploration-Exploitation Dilemma of Design Space Exploration -- Differential Privacy in Federated Dynamic Gradient Clipping Based on Gradient Norm -- SolGPT a GPT-Based Static Vulnerability Detection model for enhancing Smart Contract Security -- Neuron Pruning-Based Federated Learning For Communication-Efficient distributed Training -- A Novel Network Topology Sensing Method for NetwoArk Security Situation Awareness -- Distributed Task Offloading Method Based on Federated Reinforcement Learning in Vehicular Networks with Incomplete Information -- Carbon Trading Based on Consortium Chain Building, Modeling, and Analysis -- CAST An Intricate-Scene Aware Adaptive Bitrate Approach for Video Streaming via Parallel Training -- A Hybrid Active and Passive Cache Method Based on Deep Learning in Edge Computing -- We Will Find You An Edge-based Multi-UAV Multi-Recipient Identification Method in Smart Delivery Services -- Multi-objective Optimization for Joint Handover Decision and Computation Offloading in Integrated Communications and Computing 6G Networks -- A Joint Optimization Scheme in Heterogeneous UAV-Assisted MEC -- Multi-UAV Collaborative Face Recognition for Goods Receiver in Edge-based Smart Delivery Services -- Distributed Generative Adversarial Networks for Fuzzy Portfolio Optimization -- A Novel Transaction Processing Model for Sharded Blockchain -- Computation Offloading Based on Deep Reinforcement Learning for UAV-MEC Network -- Privacy-aware Scheduling Heuristic Based on Priority in Edge Environment -- A Novel Multi-objective Evolutionary Algorithm Hybrid Simulated Annealing Concept for Recommendation Systems -- Eco-SLAM Resource-Efficient Edge-Assisted Collaborative Visual SLAM System -- PowerDis Fine-grained Power Monitoring Through Power Disaggregation Model -- WBGT Index Forecast Using Time Series Models in Smart Cities -- Intelligent Collaborative Control of Multi-Source Heterogeneous Data Streams for Low-Power IoT A Flow Machine Learning Approach -- Test-and-Decode A Partial Recovery Scheme for Verifiable Coded Computing -- RecAGT Shard Testable Codes with Adaptive Group Testing for Malicious Nodes Identification in Sharding Permissioned Blockchain -- GLAM-SERP Building a Graph Learning-Assisted Model for Soft Error Resilience Prediction in GPGPUs -- THRCache DRAM-NVM Multi-level Cache with Thresholded Heterogeneous Random Choices -- Efficient Multi-tunnel Flow Scheduling for Traffic Engineering -- An Updatable Key Management Scheme for Underwater Wireless Sensor Networks. 330 $aThe 7-volume set LNCS 14487-14493 constitutes the proceedings of the 23rd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2023, which took place in Tianjin, China, during October, 2023. The 145 full papers included in this book were carefully reviewed and selected from 439 submissions. ICA3PP covers the many dimensions of parallel algorithms and architectures; encompassing fundamental theoretical approaches; practical experimental projects; and commercial components and systems. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14490 606 $aAlgorithms 606 $aMachine learning 606 $aComputer networks 606 $aComputer vision 606 $aComputer engineering 606 $aDesign and Analysis of Algorithms 606 $aMachine Learning 606 $aComputer Communication Networks 606 $aComputer Vision 606 $aComputer Engineering and Networks 615 0$aAlgorithms. 615 0$aMachine learning. 615 0$aComputer networks. 615 0$aComputer vision. 615 0$aComputer engineering. 615 14$aDesign and Analysis of Algorithms. 615 24$aMachine Learning. 615 24$aComputer Communication Networks. 615 24$aComputer Vision. 615 24$aComputer Engineering and Networks. 676 $a005.1 702 $aTari$b Zahir$f1961- 702 $aLi$b Keqiu 702 $aWu$b Hongyi 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910841857303321 996 $aAlgorithms and Architectures for Parallel Processing$9773147 997 $aUNINA