Vai al contenuto principale della pagina

Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part VI



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Tari Zahir Visualizza persona
Titolo: Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part VI Visualizza cluster
Pubblicazione: Singapore : , : Springer, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (512 pages)
Altri autori: LiKeqiu  
WuHongyi  
Nota di contenuto: Intro -- Preface -- Organization -- Contents - Part VI -- An Uncertainty-Aware Auction Mechanism for Federated Learning -- 1 Introduction -- 2 Related Work -- 3 System Model and Problem Definition -- 3.1 Federated Learning -- 3.2 Auction Framework -- 3.3 Problem Definition -- 4 The VCG-Based Auction Mechanism -- 4.1 Problem Transformation -- 4.2 Expected Social Welfare Maximization Algorithm -- 4.3 Payment -- 4.4 Properties -- 5 Greedy Algorithm Based Auction Mechanism -- 5.1 Choice of Clients' Training Data -- 5.2 Payment -- 5.3 Properties -- 5.4 Further Option for Reducing Time Complexity -- 6 Simulation Results -- 6.1 Experiment Settings -- 6.2 Experiment Analysis -- 7 Conclusion -- References -- Persistent Sketch: A Memory-Efficient and Robust Algorithm for Finding Top-k Persistent Flows -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 The PE-Sketch Design -- 4.1 Approach Overview -- 4.2 Event Sampling Based on Flip Filter -- 4.3 Candidate Tracking -- 5 Performance Analysis -- 5.1 Parameters of Flip Filter -- 5.2 Estimation Error Bound of Candidate Matrix -- 6 Experimental Evaluation -- 6.1 Experiment Setup -- 6.2 Evaluation on Event Sampling -- 6.3 Finding Top-k Persistent Flows -- 6.4 Parameter Setting -- 7 Conclusion -- References -- FaCa: Fast Aware and Competition-Avoided Balancing for Data Center Network -- 1 Introduction -- 2 Related Work -- 2.1 Centralized Load Balancing -- 2.2 Distributed Load Balancing -- 3 Background -- 4 Motivation -- 4.1 Why Not ECMP? -- 4.2 A Motivation Example -- 5 Design -- 5.1 Overview -- 5.2 Network Model -- 5.3 Partly Global Vision with INT -- 5.4 Load Estimate -- 5.5 Flowing& -- Jumping -- 6 Implementation -- 6.1 Productive Experiment Setting -- 6.2 Implementation Challenges -- 7 Evaluation -- 7.1 Throughput Performance -- 7.2 Concurrent Competition -- 7.3 Micro-benchmark -- 8 Conclusion.
References -- Optimizing GNN Inference Processing on Very Long Vector Processor -- 1 Introduction -- 2 Background -- 2.1 GNN -- 2.2 Brief Introduction to the Long Vector Architecture Processor -- 3 Related Works -- 4 Efficient GNNs Inference on Long Vector Architecture -- 4.1 Efficient GNN Operator Library -- 4.2 GNN Operator Fusion Strategy -- 4.3 Heterogeneous Multi-threaded Cooperative Strategy for Long Vector Architecture -- 5 Experiment -- 5.1 Experimental Setup -- 5.2 Overall Performance -- 5.3 Operator Fusion Strategy -- 5.4 Heterogeneous Multi-threaded Cooperative Strategy -- 6 Conclusion -- References -- GDTM: Gaussian Differential Trust Mechanism for Optimal Recommender System -- 1 Introduction -- 2 Related Work -- 2.1 Trust-Based Recommendation -- 2.2 Recommended Protection Mechanism -- 3 Trade-Off Mechanism -- 3.1 Trust-Related Definition -- 3.2 Trust Recommendation -- 3.3 Gaussian Differential Trust Mechanism -- 4 Theoretical Analysis -- 5 Experiment Summary -- 5.1 Research Questions -- 5.2 Benchmark Model -- 5.3 Evaluation Metrics -- 5.4 Performance Analysis -- 6 Conclusion -- References -- Privacy-Enhanced Dynamic Symmetric Searchable Encryption with Efficient Searches Under Sparse Keywords -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations -- 2.2 Dynamic Searchable Symmetric Encryption -- 3 Forward Privacy DSSE: SGsse-F -- 3.1 Construction of SGsse-F -- 3.2 An Example of SGsse-F -- 3.3 Correctness -- 3.4 Security Analysis -- 4 Forward and Backward Privacy DSSE: SGsse-FB -- 4.1 Correctness -- 4.2 Security Analysis -- 5 Related Works -- 6 Benefits and Drawbacks of DSSE Schemes Analysis -- 7 Evaluation -- 7.1 Experimental Setup -- 7.2 Experimental Analysis -- 8 Conclusion -- References -- CBA Sketch: A Sketching Algorithm Mining Persistent Batches in Data Streams -- 1 Introduction -- 1.1 Background and Motivation -- 1.2 Our Solution.
1.3 Key Contributions -- 2 Problem Formulation and Related Work -- 2.1 Problem Formulation -- 2.2 Related Work -- 3 The CBA Sketch -- 3.1 Circular-Time Sketch -- 3.2 Bloom Filter-Based Existence Recorder -- 3.3 Approximate Size Recorder -- 3.4 Query -- 4 Evaluation -- 4.1 Strawman Approach -- 4.2 Experimental Setup -- 4.3 Sensitivity Analysis -- 4.4 Experiments on ARE -- 4.5 Experiments on Throughput -- 5 Conclusion -- References -- Joint Optimization of System Bandwidth and Transmitting Power in Space-Air-Ground Integrated Mobile Edge Computing -- 1 Introduction -- 2 Related Works -- 2.1 Research on Air-Ground Communication -- 2.2 Research on Space-Ground Communication -- 2.3 Research on SAGIN Communication -- 3 System Model and Problem Formulation -- 3.1 Network Architecture -- 3.2 Satellite Coverage Time -- 3.3 IoRT Devices-Satellite/UAV Channel -- 3.4 Traffic Offloading Delay -- 3.5 Problem Formulation -- 4 Algorithm Design -- 4.1 DRL-Oriented Problem Transformation -- 4.2 SAC-Based Offloading Algorithm -- 5 Performance Evaluation -- 5.1 Parameter Setting -- 5.2 Performance Evaluation -- 6 Conclusion -- References -- A Novel Sensor Method for Dietary Detection -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Coupling Effect -- 3.2 Hardware Design -- 3.3 Event Detection Method Based on SVM -- 3.4 Chewing Counting Algorithm -- 4 Evaluation and Discussion -- 4.1 Experimental Methodology -- 4.2 The Evaluation of Chewing Event Detection -- 4.3 The Evaluation of Chewing Counting -- 5 Conclusion -- References -- Accelerated Optimization for Simulation of Brain Spiking Neural Network on GPGPUs -- 1 Introduction -- 2 Related Work -- 2.1 Spiking Neural Networks -- 2.2 SNN Simulation Tools -- 2.3 CUDA Programming on Multiple GPUs -- 3 Method -- 3.1 Workload-Oriented Partitioning -- 3.2 Memory Access Optimization.
3.3 Branch-Matched Thread Organization -- 3.4 Spike Synchronization Optimization -- 4 Experiments -- 4.1 Setup -- 4.2 Simulation Results -- 5 Conclusion -- References -- An Improved GPU Acceleration Framework for Smoothed Particle Hydrodynamics -- 1 Introduction -- 2 SPH Method -- 3 GPU Computation Using CUDA -- 3.1 Data Layout -- 3.2 CUDA Implementation -- 3.3 CUDA Acceleration -- 4 Results -- 4.1 GPU Simulation -- 4.2 Performance Evaluation -- 5 Conclusion and Future Work -- References -- MDCF: Multiple Dynamic Cuckoo Filters for LSM-Tree -- 1 Introduction -- 2 Background and Motivation -- 2.1 LSM-Tree Based KV Store -- 2.2 Serious Read Amplification of LSM-Tree -- 2.3 Motivation -- 3 Proposed Approach -- 3.1 The Design of MDCF -- 3.2 Maintenance of MDCF -- 3.3 The Flow of Read Operations -- 4 Evaluation -- 4.1 Experiment Setup -- 4.2 Workloads -- 4.3 Performance Evaluation -- 5 Related Work -- 6 Conclusion -- References -- A Game Theory Based Task Offloading Scheme for Maximizing Social Welfare in Edge Computing -- 1 Introduction -- 2 Motivation and Related Works -- 2.1 Motivation -- 2.2 Related Works -- 3 System Model -- 3.1 User Energy Consumption Model -- 3.2 User Utility Model -- 4 Stackelberg Game Based Offloading Algorithm -- 5 Evaluation -- 5.1 Evaluation Settings -- 5.2 Results -- 6 Conclusion -- References -- Research on Dos Attack Simulation and Detection in Low-Orbit Satellite Network -- 1 Introduction -- 1.1 A Subsection Sample -- 2 Related Work -- 3 Simulating DoS Attacks in Low Earth Orbit Satellite Networks -- 3.1 Satellite Physical Link Simulation Based on STK -- 3.2 Network Simulation Platform Based on OVS -- 3.3 SDN Control Platform Based on RYU -- 3.4 Network Attack Deployment Based on Docker Containers -- 4 Building and Detecting Datasets for Satellite Network Attacks -- 4.1 Overall Framework -- 4.2 Dataset Construction.
4.3 Stacking-Based Attack Detection -- 5 Experimental Results -- 6 Conclusion -- References -- Malware Detection Method Based on Visualization -- 1 Introduction -- 2 Related Work -- 2.1 Malware and Detection Methods -- 2.2 Visualization -- 2.3 Ensemble Machine Learning -- 3 Visualization-Based Malware Detection -- 3.1 Method Framework -- 3.2 Specific Implementation -- 4 Experiments and Evaluations -- 4.1 Data Set and Experimental Environment -- 4.2 Experimentation -- 5 Conclusion -- References -- TOC: Joint Task Offloading and Computation Reuse in Vehicular Edge Computing -- 1 Introduction -- 2 Related Work -- 3 System Model and Problem Formulation -- 3.1 System Model -- 3.2 Problem Formulation -- 4 TOC Framework -- 4.1 Computational Reuse -- 4.2 Minimum Weighted Vertex Search Algorithm -- 5 Experiment and Evaluation -- 5.1 Effects of Different Numbers of Tasks on Completion Time and Computational Execution Time on RSUs -- 5.2 Effects of Different Computation Capabilities on Completion Time and Computational Execution Time on RSUs -- 5.3 Lookup Rate Performance -- 6 Conclusion -- References -- Distributed Task Offloading for IoAV Using DDP-DQN -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 System Overview -- 3.2 Transmission Model -- 3.3 Task Delay -- 3.4 Energy Consumption Model -- 3.5 Formulation of Task Offloading Problem -- 4 DDP-DQN Algorithm in IoAV Offloading -- 4.1 IoAV Environment Model -- 4.2 DDP-DQN Based Task Offloading Algorithm -- 5 Performance Evaluation -- 5.1 Experimental Settings -- 5.2 Results and Analysis -- 6 Conclusion -- References -- A Task Offloading and Resource Allocation Optimization Method in End-Edge-Cloud Orchestrated Computing -- 1 Introduction -- 2 Related Work -- 3 System Model and Problem Formulation -- 3.1 Network Model -- 3.2 Communication Model -- 3.3 Computation Model -- 3.4 Problem Formulation.
4 DRL-Based Task Offloading and Resource Allocation in EECOC.
Titolo autorizzato: Algorithms and Architectures for Parallel Processing  Visualizza cluster
ISBN: 981-9708-11-7
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910841862403321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Computer Science Series