top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2007 IFIP International Conference on Network and Parallel Computing Workshops : proceedings : NPC 2007, 18-21 September, 2007, Dalian, China
2007 IFIP International Conference on Network and Parallel Computing Workshops : proceedings : NPC 2007, 18-21 September, 2007, Dalian, China
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2007
Disciplina 004/.36
Soggetto topico Parallel processing (Electronic computers)
Computer networks
Parallel programming (Computer science)
Computational grids (Computer systems)
Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996211347303316
[Place of publication not identified], : IEEE Computer Society, 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part VII
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part VII
Autore Tari Zahir
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (375 pages)
Altri autori (Persone) LiKeqiu
WuHongyi
Collana Lecture Notes in Computer Science Series
ISBN 981-9708-62-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part VII -- An Efficient Scheduling Algorithm for Multi-mode Tasks on Near-Data Processing SSDs -- 1 Introduction -- 2 Background and Motivation -- 2.1 Task Processing of NDP-Based SSDs -- 2.2 Motivation Example -- 3 Problem Definition -- 4 Multi-mode Task Scheduling -- 4.1 Problem Analysis -- 4.2 MMTS Algorithm -- 5 Evaluation -- 5.1 Experimental Setups -- 5.2 Effect on Performance -- 5.3 Resource Utilization -- 6 Conclusion -- References -- HR-kESP: A Heuristic Algorithm for Robustness-Oriented k Edge Server Placement -- 1 Introduction -- 2 Problem and Model Formulation -- 2.1 Problem Statement -- 2.2 User Coverage -- 2.3 Network Robustness -- 2.4 Robustness-Oriented kESP Optimization Model -- 3 The Heuristic Algorithm for kESP -- 3.1 Selection of Initial Base Station -- 3.2 Gradual Generation of Server Deployment Scheme -- 3.3 HR-kESP Algorithm -- 4 Experimental Evaluation -- 4.1 Experimental Settings -- 4.2 Comparison on Different Numbers of Base Stations -- 4.3 Comparison on Different Server Budgets -- 4.4 Comparison on Different Numbers of Users -- 5 Related Work -- 6 Conclusion and Future Work -- References -- A Hybrid Kernel Pruning Approach for Efficient and Accurate CNNs -- 1 Introduction -- 2 Functional-Similarity-Based Kernel Pruning Algorithm -- 2.1 Distance-Based Kernel Pruning Algorithm -- 2.2 Hybrid Kernel Pruning Algorithm -- 3 Experimental Method -- 4 Experimental Results -- 4.1 Experimental Results for the Distance-Based Pruning Algorithm -- 4.2 Experimental Results for the Hybrid Pruning Algorithm -- 5 Analysis -- 6 Related Work -- 7 Conclusion -- References -- A Collaborative Migration Algorithm for Edge Services Based on Evolutionary Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 3 Service Migration Model -- 3.1 Scene Description.
3.2 Service Migration Model Construction -- 3.3 Problem Formulation -- 4 Service Migration Algorithm Based on Evolutionary Reinforcement Learning -- 4.1 MDP Model -- 4.2 DEDRL-Based Service Migration Process -- 5 Experiment and Results -- 5.1 Experimental Environment and Parameter Settings -- 5.2 Analysis of Results -- 6 Conclusion -- References -- A Graph Generation Network with Privacy Preserving Capabilities -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Generative Adversarial Networks -- 3.2 Differential Privacy -- 4 RDPGGAN -- 5 Experimental Evaluations -- 6 Conclusion -- References -- Clustered Federated Learning Framework with Acceleration Based on Data Similarity -- 1 Introduction -- 2 Preliminaries -- 2.1 Federated Learning -- 2.2 Locality-Sensitive Hashing -- 3 Design of Our FedCSA Framework -- 3.1 Intra-group Acceleration -- 3.2 Group Aggregation -- 3.3 Privacy Analysis -- 4 Experiment and Result -- 4.1 Experiment Settings -- 4.2 Result and Analysis -- 5 Conclusion -- References -- An Anonymous Authentication Scheme with Low Overhead for Cross-Domain IoT -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 MHT and MHG -- 3.2 Zero-Knowledge Proof -- 4 Proposed Scheme -- 4.1 System Overview -- 4.2 Threat Model -- 5 Design Detail -- 5.1 Initialization Phase -- 5.2 Device Registration -- 5.3 Intra-domain Authentication -- 5.4 Cross-Domain Authentication -- 5.5 Key Agreement -- 5.6 Data Correctness Verification -- 6 Theoretical Analysis of CALA -- 7 Experiment and Evaluation -- 7.1 Experimental Settings -- 7.2 Performance Analysis -- 8 Conclusion -- References -- UAV-Assisted Data Collection and Transmission Using Petal Algorithm in Wireless Sensor Networks -- 1 Introduction -- 2 Mathematical Model for the UAV-Assisted Data Collection in WSNs -- 2.1 WSN Model and Fundamental Concepts.
2.2 Mathematical Model of the UAV-Assisted Data Collection -- 3 Petal Algorithm for the UAV-Assisted Data Collection -- 3.1 Analysis of the UAV-Assisted Data Collection in WSNs -- 3.2 Petal Algorithm for the UAV-Assisted Data Collection in WSNs -- 4 Experimental Simulation -- 4.1 Test Problem and Parameter Description -- 4.2 Comparative Analysis of Experimental Results -- 5 Conclusion -- References -- DeletePop: A DLT Execution Time Predictor Based on Comprehensive Modeling -- 1 Introduction -- 2 Background and Current Challenges -- 2.1 Distributed Strategy for Deep Learning Training -- 2.2 Job Scheduling Simulator -- 2.3 Major Challenges of Modeling and Simulation of Deep Learning Training Job -- 3 Cost Model Design -- 3.1 Modeling of the DLT Process -- 3.2 The Predicting Algorithm of the Cost Model -- 4 Simulator Design and Implementation -- 5 Evaluation -- 5.1 Prediction of Step Time (The Atomic Unit) -- 5.2 Prediction of Epoch Time -- 5.3 Performance Simulation Experiment -- 6 Related Work -- 7 Conclusion -- References -- CFChain: A Crowdfunding Platform that Supports Identity Authentication, Privacy Protection, and Efficient Audit -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Bilinear Groups -- 3.2 BLS Aggregate Signature ch10BLS -- 3.3 Commitment and Non-interactive Zero-Knowledge Proofs -- 3.4 Distributed Identities -- 4 CFChain Overview -- 4.1 System Model -- 4.2 Threat Model and Design Goals -- 4.3 System Operations -- 5 Security Definitions -- 6 The CFChain Scheme -- 7 Security Analyse -- 8 Performance Evaluation -- 8.1 Functionality Comparison -- 8.2 Implementation -- 8.3 Performance -- 9 Conclusion -- References -- TBAF: A Two-Stage Biometric-Assisted Authentication Framework in Edge-Integrated UAV Delivery System -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Physical Unclonable Function.
3.2 Blakley Secret Sharing -- 3.3 Zero Knowledge Proofs -- 3.4 Cancelable Biometric Template Protection -- 4 The Proposed Scheme -- 4.1 System Overview -- 4.2 Three-Dimensional Space-Based Secret Sharing -- 4.3 Registration -- 4.4 Authentication and Key Negotiation -- 5 Evaluation -- 5.1 Formal Security Analysis Using BAN Logic -- 5.2 Informal Security Analysis -- 5.3 Efficiency Analysis -- 6 Conclusion and Future Work -- References -- Attention Enhanced Package Pick-Up Time Prediction via Heterogeneous Behavior Modeling -- 1 Introduction -- 2 Overview -- 2.1 Preliminaries -- 2.2 Problem Formulation -- 3 Model Design -- 3.1 Overview -- 3.2 Pre-trained Stay Time Prediction -- 3.3 Attention Enhanced Route Estimation -- 3.4 Training and Prediction -- 4 Evaluation -- 4.1 Dataset Description -- 4.2 Experimental Settings -- 4.3 Metrics -- 4.4 Baselines -- 4.5 Main Performance -- 4.6 Ablation Studies of the Pre-trained Module -- 4.7 Real-World Deployment -- 5 Discussion -- 5.1 Lessons Learned -- 5.2 Limitations and Future Works -- 6 Related Works -- 6.1 Estimate Time of Arrival Applications -- 6.2 Route Prediction in Transportation and Logistics Systems -- 6.3 Uniqueness of Our Work -- 7 Conclusion -- References -- Optimizing Pointwise Convolutions on Multi-core DSPs -- 1 Introduction and Related Work -- 2 Backgound -- 2.1 Pointwise Convolution -- 2.2 Architecture of FT-M7032 Heterogeneous Processors -- 3 Parallel Direct Implementation -- 3.1 Overview of Our Implementation -- 3.2 Multi-level Parallel Forward Propagation Algorithm -- 3.3 Multi-level Parallel Algorithms for Backward Propagation and Weight Gradient Update Propagation -- 4 Performance Evaluation -- 4.1 Experiment Setup -- 4.2 Performance -- 5 Conclusions and Future Work -- References -- Detecting SDCs in GPGPUs Through Efficient Partial Thread Redundancy -- 1 Introduction -- 2 Background.
2.1 GPGPUs Architecture and Programming Model -- 2.2 Fault Model -- 3 Thread-Level SDC Proneness Analysis -- 3.1 Vulnerability Identification -- 3.2 Intra-thread Error Propagation Analysis -- 3.3 Inter-thread Error Propagation Analysis -- 4 Partial Thread Protection Framework -- 4.1 Thread SDC Vulnerability Profiling -- 4.2 Partial Thread Redundancy -- 5 Experiment Methodology -- 6 Evaluation -- 6.1 SDC Probability Prediction Accuracy -- 6.2 Overhead -- 7 Related Work -- 8 Conclusion -- References -- FDRShare: A Fully Decentralized and Redactable EHRs Sharing Scheme with Constant-Size Ciphertexts -- 1 Introduction -- 1.1 Our Results and Contributions -- 2 Related Work -- 3 Preliminaries -- 3.1 Bilinear Pairing -- 3.2 DDH Assumption -- 3.3 Pseudo-Random Function -- 4 System Definition -- 4.1 Threat Model -- 4.2 System Model -- 5 Building Block -- 6 Detail Construction of FDRShare -- 7 Conclusion -- References -- An Efficient Fault Tolerance Strategy for Multi-task MapReduce Models Using Coded Distributed Computing -- 1 Introduction -- 2 Related Work -- 3 Preliminaries and Problem Formulation -- 3.1 The MapReduce Framework -- 3.2 Coded Distributed Computing -- 3.3 Problem Formulation -- 4 Fault Tolerance for Multiple Reduce Tasks Using Coded Distributed Computing -- 4.1 Preparation Stage -- 4.2 Map Stage -- 4.3 Shuffle Stage -- 4.4 Reduce Stage -- 5 Experiments -- 5.1 Experiment Setups -- 5.2 Experimental Results -- 6 Summary -- References -- Key-Based Transaction Reordering: An Optimized Approach for Concurrency Control in Hyperledger Fabric -- 1 Introduction -- 2 Related Work -- 2.1 Endorsement Phase Optimization -- 2.2 Ordering Phase Optimization -- 2.3 Validation Phase Optimization -- 3 Problem Definition -- 3.1 Types of Transaction Conflicts -- 3.2 Problem Formulation -- 4 System Design -- 4.1 System Model -- 4.2 Algorithm Design.
5 Experimental Evaluation.
Record Nr. UNISA-996587859703316
Tari Zahir  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part IV
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part IV
Autore Tari Zahir
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (508 pages)
Altri autori (Persone) LiKeqiu
WuHongyi
Collana Lecture Notes in Computer Science Series
ISBN 981-9708-59-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part IV -- CSDSE: Apply Cooperative Search to Solve the Exploration-Exploitation Dilemma of Design Space Exploration -- 1 Introduction -- 2 Background and Motivation -- 2.1 Design Space of Deep Neural Network Accelerator -- 2.2 Design Space Exploration Methods -- 2.3 Challenge of Exploration-Exploitation Dilemma -- 3 CSDSE Method -- 3.1 Profile of CSDSE -- 3.2 Definition of RL Framework -- 3.3 Cooperative Search and Heterogeneous Agents -- 3.4 Weighted Compact Buffer -- 4 Experiments and Analyses -- 4.1 Experiment Setup -- 4.2 Experiment Result and Analysis -- 5 Related Works -- 6 Conclusion -- References -- Differential Privacy in Federated Dynamic Gradient Clipping Based on Gradient Norm -- 1 Introduction -- 2 Related Work -- 3 Preliminary -- 3.1 Threat Model -- 3.2 Gradient Cropping -- 4 Differential Privacy in Federated Dynamic Gradient Clipping Based on Gradient Norm -- 4.1 Overall Framework -- 4.2 Relationship Between Gradient Variation and Clipped Threshold -- 4.3 Gradient Attenuation Clipped Threshold Based on Gradient Norm -- 4.4 Convergence Analysis -- 4.5 Algorithm -- 5 Performance Evaluation -- 5.1 Experimental Setup -- 5.2 Performance of Privacy Protection -- 5.3 Global Model Availability -- 5.4 Universality of Clipped Thresholds -- 6 Conclusions -- References -- SolGPT: A GPT-Based Static Vulnerability Detection Model for Enhancing Smart Contract Security -- 1 Introduction -- 2 Problem Formulation -- 3 Related Work -- 3.1 Deep Learning-Based Approaches for Smart Contract Vulnerability Detection -- 3.2 GPT Models -- 4 SolGPT: Solidity Adapative GPT -- 4.1 SolTokenizer -- 4.2 Solidity Adaptive Pre-training -- 4.3 Vulnerability Detection Fine-Tunning -- 5 Experiment and Analysis -- 5.1 Comparisons with Traditional Approaches -- 5.2 Comparisons with Deep Learning Approaches.
5.3 Ablation Studies -- 6 Conclusion -- References -- Neuron Pruning-Based Federated Learning for Communication-Efficient Distributed Training -- 1 Introduction -- 2 Related Work -- 2.1 FL with Edge Computing -- 2.2 Communication Overhead Reduction in FL -- 3 Algorithm Description -- 3.1 Basic Model Selection -- 3.2 Model Pruning -- 4 Simulation Results and Analysis -- 4.1 Experimental Setting -- 4.2 Performance Analysis -- 4.3 Network Traffic Classification -- 5 Conclusion and Future Work -- References -- A Novel Network Topology Sensing Method for Network Security Situation Awareness -- 1 Introduction -- 2 Preliminaries and Related Works -- 2.1 Network Security Situation Awareness (NSSA) -- 2.2 Group Decision Making (GDM) -- 3 Network Topology Sensing Method for NSSA -- 3.1 Overview -- 3.2 Agent Model -- 3.3 Group Decision Making Based on Trusted Agents -- 4 Experimental Studies and Analysis -- 4.1 Prerequisites and Problem Descriptions -- 4.2 Experimental Process and Numerical Example -- 4.3 Comparisons and Discussions -- 5 Conclusions -- References -- Distributed Task Offloading Method Based on Federated Reinforcement Learning in Vehicular Networks with Incomplete Information -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Local Computing -- 3.2 Edge Computing -- 4 Problem Formulation -- 5 Algorithm Design -- 5.1 Deep Q-Network -- 5.2 State Space -- 5.3 Action Space -- 5.4 Reward Function -- 5.5 Communication Mask -- 5.6 FDQN Algorithm -- 6 Performance Evaluation -- 6.1 Simulation Setup -- 6.2 Evaluation Results -- 7 Conclusion -- References -- Carbon Trading Based on Consortium Chain: Building, Modeling, and Analysis -- 1 Introduction -- 2 DC-Chain for Carbon Trading -- 2.1 Role Assignment -- 2.2 DC-Chain Construction and Smart Contract Design -- 3 Modeling Blockchain Performance -- 4 Analytical and Experimental Results.
4.1 Transaction Confirmation Time -- 4.2 Block Size -- 5 Conclusion -- References -- CAST: An Intricate-Scene Aware Adaptive Bitrate Approach for Video Streaming via Parallel Training -- 1 Introduction -- 2 Background and Motivation -- 2.1 ABR Algorithms -- 2.2 Scene Complexity -- 3 Design -- 3.1 CAST Overview -- 3.2 Neural Network Structure -- 3.3 Implementation -- 4 Evaluation -- 4.1 Methodology -- 4.2 Comparison with Existing ABR Algorithms -- 4.3 CAST vs. Existing ABR Approaches -- 4.4 Performance Under Different Network Environments -- 4.5 Performance Under Different Player Settings -- 4.6 Subjective Tests from Real Users -- 5 Conclusions -- References -- A Hybrid Active and Passive Cache Method Based on Deep Learning in Edge Computing -- 1 Introduction -- 2 Related Work -- 3 System Model -- 4 Proposed Methodology -- 4.1 Feature Extraction from Four Modalities -- 4.2 Multimodal Prediction Model -- 5 Experiment Setup -- 5.1 Dataset Setup -- 5.2 Evaluating Indicator -- 5.3 Baselines -- 6 Cached Updates -- 7 Evaluation Results -- 7.1 Simulation Setup -- 7.2 Evaluation Results -- 8 Conclusion -- References -- We Will Find You: An Edge-Based Multi-UAV Multi-Recipient Identification Method in Smart Delivery Services -- 1 Introduction -- 2 Related Work -- 3 Framework and Algorithms -- 3.1 Framework -- 3.2 Algorithms -- 4 Evaluation -- 4.1 Case Study -- 4.2 Experiments -- 5 Conclusions and Future Work -- References -- Multi-objective Optimization for Joint Handover Decision and Computation Offloading in Integrated Communications and Computing 6G Networks -- 1 Introduction -- 2 Related Work -- 3 System Model and Problem Formulations -- 3.1 System Model -- 3.2 Communication Model -- 3.3 Computation Model -- 3.4 Problem Formulation -- 4 Joint Handover Decision and Computation Offloading Method Based on MOO -- 4.1 The Flowchart of Mobility Management in CCN.
4.2 Trigger Mechanisms of Handover and Offloading -- 4.3 Joint Decision Method Based on MOO -- 4.4 The Convergence Analysis of JD-MOO Method -- 5 Performance Evaluation -- 5.1 Experiments Setting -- 5.2 Performance of Handover Decision -- 5.3 Performance of Computation Offloading -- 5.4 Analysis of Services Satisfaction Degree -- 5.5 Analysis of Running Time and Convergence -- 6 Conclusion -- References -- A Joint Optimization Scheme in Heterogeneous UAV-Assisted MEC -- 1 Introduction -- 2 Related Work -- 2.1 MEC -- 2.2 UAV Scheduling -- 2.3 Task Allocation -- 3 System Model -- 3.1 Problem Statement -- 3.2 System Overview -- 3.3 UAV Scheduling Model -- 3.4 Task Execution Model -- 3.5 UAV Hovering Model -- 3.6 Problem Formulation -- 4 Proposed Approach -- 4.1 UAV Scheduling Algorithm -- 4.2 Task Allocation Algorithm -- 5 Performance Evaluation -- 5.1 Experimental Settings -- 5.2 Experimental Results -- 6 Conclusion -- References -- Multi-UAV Collaborative Face Recognition for Goods Receiver in Edge-Based Smart Delivery Services -- 1 Introduction -- 2 Framework Design and Workflow -- 2.1 Framework Overview -- 2.2 Framework Execution Process -- 3 Related Technologies and Algorithms -- 3.1 Face Detection -- 3.2 Face Fusion -- 3.3 Face Recognition -- 4 Experiments and Evaluation -- 4.1 Case Studies -- 4.2 Evaluation -- 5 Conclusions -- References -- Distributed Generative Adversarial Networks for Fuzzy Portfolio Optimization -- 1 Introduction -- 2 Generative Adversarial Networks Architecture -- 2.1 Theoretical Background -- 2.2 Architecture -- 2.3 Generator -- 2.4 Discriminator -- 2.5 Adversarial Training -- 3 Generative Adversarial Networks Architecture -- 4 Experimental Results -- 4.1 Experimental Setting -- 4.2 Experimental Results -- 4.3 Experimental Evaluation -- 5 Parallel Fuzzy Portfolio Optimization -- 5.1 Fuzzy Mean-CVaR Portfolio Model.
5.2 Optimization Algorithms -- 5.3 Parallelization and Results -- 6 Conclusion -- References -- A Novel Transaction Processing Model for Sharded Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Blockchain Sharding Protocols -- 2.2 Transaction Processing -- 3 Proposed Model -- 3.1 Overview of Model -- 3.2 Threat Model -- 4 Transaction Admission Control Algorithm -- 4.1 Problem Formulation -- 4.2 Algorithm Design -- 5 Transaction Verification Design -- 5.1 Verification Based on TSS -- 5.2 Verification Peers Selection -- 5.3 Transaction Dependency Handling -- 6 Experiment and Evaluation -- 6.1 Implementation -- 6.2 Performance Evaluation -- 7 Conclusion -- References -- Computation Offloading Based on Deep Reinforcement Learning for UAV-MEC Network -- 1 Introduction -- 2 System Model and Problem Description -- 2.1 System Model -- 2.2 Communication Model -- 2.3 Task Calculation Model -- 2.4 Problem Formulation -- 3 Proposed Scheme -- 3.1 SDQN Algorithm -- 3.2 Reinforcement Learning Modeling -- 3.3 Training and Testing -- 4 Simulation Results -- 4.1 Simulation Setting -- 4.2 Simulation Results and Discussions -- 5 Conclusion -- References -- Privacy-Aware Scheduling Heuristic Based on Priority in Edge Environment -- 1 Introduction -- 2 Related Work -- 3 Problem Modeling -- 3.1 Application Model -- 3.2 Resource and Processing Time Model -- 4 Method -- 4.1 Task Selection Phase -- 4.2 Processor Selection Phase -- 5 Evaluation -- 5.1 Settings -- 5.2 The Performance Comparison Experiment for Privacy Application -- 5.3 The Performance Comparison Experiment for General Application -- 6 Conclusion -- References -- A Novel Multi-objective Evolutionary Algorithm Hybrid Simulated Annealing Concept for Recommendation Systems -- 1 Introduction -- 2 Related Work -- 3 Problem Definition -- 3.1 Multi-objective Evolutionary Algorithm -- 4 The Proposed Model.
4.1 Objective Functions.
Record Nr. UNISA-996587859603316
Tari Zahir  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part III
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part III
Autore Tari Zahir
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (524 pages)
Altri autori (Persone) LiKeqiu
WuHongyi
Collana Lecture Notes in Computer Science Series
ISBN 981-9707-98-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part III -- Addressing Coupled Constrained Reinforcement Learning via Interative Iteration Design -- 1 Introduction -- 2 Preliminaries -- 2.1 Coupled Constrained Markov Decision Process -- 2.2 Policy Gradient -- 3 InIt for Decoupling High-Dimensional Coupled Action Space -- 3.1 InIt Design -- 3.2 InIt-Based Solution -- 3.3 Extension to High-Dimensional Action Space -- 4 Experiments -- 4.1 Experiment Setups -- 4.2 Baselines -- 4.3 Performance Evaluation -- 5 Conclusion and Future Work -- References -- A Path Planning and Obstacle Avoidance Method for USV Based on Dynamic-Target APF Algorithm in Edge -- 1 Introduction -- 2 Related Works -- 3 System Design and Environment Modeling -- 3.1 System Overview -- 3.2 Environment Modeling -- 4 Algorithm Design -- 4.1 Improved A* Algorithm -- 4.2 Improved APF Algorithm -- 4.3 DTAPF Method -- 4.4 Offset Guidance -- 5 Evaluation -- 5.1 Simulation Environment Configurations -- 5.2 Performance of Algorithms -- 5.3 Verification of System Architecture -- 6 Conclusion -- References -- Node-Disjoint Paths in Balanced Hypercubes with Application to Fault-Tolerant Routing -- 1 Introduction -- 2 Preliminaries -- 3 Node-Disjoint Paths -- 3.1 The Mixed Sequence -- 3.2 Construction of Node-Disjoint Paths -- 4 Simulations and Performance Evaluation -- 5 Conclusion -- References -- Performance Evaluation of Spark, Ray and MPI: A Case Study on Long Read Alignment Algorithm -- 1 Introduction -- 2 Methods -- 2.1 Parallel Algorithm Design -- 2.2 Index Sharing -- 2.3 Sequence Segmentation -- 2.4 Parallel Alignment -- 2.5 Asynchronous Output -- 3 Results -- 3.1 Experimental Setup -- 3.2 Input Data -- 3.3 Results Consistency -- 3.4 Strong Scalability -- 3.5 Weak Scalability and Peak RAM Memory -- 3.6 Efficiency -- 3.7 Throughput -- 3.8 Latency -- 3.9 Load Balance -- 4 Related Work.
5 Discussion -- 6 Conclusion -- References -- Fairness Analysis and Optimization of BBR Congestion Control Algorithm -- 1 Introduction -- 2 Related Work -- 3 Problem Analysis -- 3.1 RTT Fairness in BBR Algorithm -- 4 Algorithm Optimization -- 5 Experiment -- 5.1 Experimental Setup -- 5.2 Results on RTT Fairness -- 6 Conclusion -- References -- Accelerating QUIC with AF_XDP -- 1 Introduction -- 2 Background -- 2.1 QUIC Acceleration -- 2.2 Network Stack Optimization -- 2.3 eBPF and AF_XDP -- 2.4 AF_XDP Datapath -- 3 Design and Implementation -- 3.1 Overview -- 3.2 Architecture -- 3.3 Implementation -- 4 Evaluation -- 4.1 Experiment Setup -- 4.2 QUIC Performance -- 4.3 CPU Usage -- 4.4 Network Policy -- 5 Discussion -- 6 Conclusion -- References -- Segmenta: Pipelined BFT Consensus with Slicing Broadcast -- 1 Introduction -- 2 Related Work -- 3 Analysis and Design -- 3.1 Directly Apply RBC Module in Hotstuff -- 3.2 Design to Reduce the Additional Communication Round -- 4 System Model -- 5 The Segmenta Protocol -- 5.1 Segmenta-Specific Data Structures -- 5.2 Segmenta Phases -- 5.3 Safety, Liveness, and Communication Complexity -- 5.4 Echoing Shards Optimistically -- 6 Chained Segmenta Protocol -- 7 Evaluation -- 7.1 Experimental Setup -- 7.2 Prediction Model -- 7.3 Throughput and Latency -- 8 Conclusion -- References -- Synthetic Data Generation for Differential Privacy Using Maximum Weight Matching -- 1 Introduction -- 2 Related Work -- 3 Preliminary -- 3.1 Problem Statement -- 3.2 Differential Privacy -- 4 Our Solution -- 4.1 Construction of Attribute Graph -- 4.2 Marginal Selection -- 4.3 PostProcess -- 4.4 Data Synthesis -- 5 Experiments -- 5.1 Experimental Settings -- 5.2 Experimental Results -- 6 Conclusion -- A Proof of Lemma -- References -- Approximate Multicast Coflow Scheduling in Reconfigurable Data Center Networks -- 1 Introduction.
2 Problem Formulation -- 2.1 System Model -- 2.2 Circuit Scheduling Model -- 2.3 Problem Formulation -- 3 The Delay-Efficient Multicast Coflow Scheduling Algorithm -- 3.1 Multicast Coflow Scheduling -- 3.2 Circuit Scheduling -- 3.3 Approximation Ratio Analysis -- 4 Numerical Evaluation -- 4.1 Simulation Settings -- 4.2 Performance Evaluation -- 5 Related Work -- 6 Conclusion -- References -- DAS: A DRAM-Based Annealing System for Solving Large-Scale Combinatorial Optimization Problems -- 1 Introduction -- 2 Background -- 2.1 Ising Model -- 2.2 The Overview of DRAM -- 2.3 In-DRAM Bulk Bitwise Operations -- 3 DAS: Detailed Design -- 3.1 An Overview of DAS -- 3.2 Spin Propagation Between Spin Nodes -- 3.3 Calculation of Local Search Term -- 3.4 Design of Probability Flipping -- 4 Evaluation and Applications -- 4.1 Area Overhead -- 4.2 Application and Analysis -- 5 Conclusion -- References -- Graph Neural Network for Critical Class Identification in Software System -- 1 Summary -- 2 Related Works -- 2.1 Research on the Importance of Nodes in Complex Networks -- 2.2 Research on Key Node Identification in Software Network -- 3 Basic Theory -- 3.1 Node Feature Extraction Based on Direct Extrapolation Graph Neural Network -- 3.2 Node Feature Extraction Based on Inductive Graph Neural Network -- 4 Research methods -- 4.1 Modeling Class dependency network -- 4.2 Network Embedding Learning -- 4.3 Key Class Identification -- 5 Experimental Analysis -- 5.1 Experiment Data -- 5.2 Experiment Setup -- 5.3 Analysis of Experimental Results -- 6 Conclusion -- References -- Spatio-Temporal Fusion Based Low-Loss Video Compression Algorithm for UAVs with Limited Processing Capability -- 1 Introduction -- 2 System Overview -- 3 Algorithm Design -- 3.1 Feature Clustering Based Temporal Video Sampling -- 3.2 Dynamic Encoding Based Spatial Video Sampling -- 4 Evaluation.
4.1 Experimental Setup -- 4.2 Experimental Results -- 5 Implementation -- 6 Related Work -- 7 Conclusion -- References -- CRAFT: Common Router Architecture for Throughput Optimization -- 1 Introduction -- 2 Related Work -- 3 The Proposed Viaduct Theory in Throughput Optimization -- 3.1 Viaduct Theory in Throughput Optimization -- 3.2 Comparison of Ring Decouple Theory and Viaduct Theory in Low-Cost Router -- 4 A Common Router Architecture for Throughput Optimization Based on Viaduct Theory -- 4.1 Flow Control Optimization with Viaduct Theory -- 4.2 Pipeline Stage and Latency Optimization -- 4.3 High Throughput Optimization with Viaduct Theory -- 4.4 Low Hardware Cost with Viaduct Theory -- 4.5 Bypass Strategy for Low Workload -- 5 Experiment Results -- 5.1 For Low-Cost Program -- 5.2 For High-Performance Program -- 5.3 Hardware Overhead -- 6 Conclusion -- References -- A Cross-Chain System Supports Verifiable Complete Data Provenance Queries -- 1 Introduction -- 2 Related Work -- 2.1 Query Function -- 2.2 Verifiable Query -- 2.3 Cross-Chain Technology -- 3 Preliminaries -- 3.1 Preliminary Knowledge -- 3.2 System Components -- 4 Solution -- 4.1 Verifiable Complete Data Provenance Query -- 4.2 Efficient Query -- 5 Experiment -- 5.1 Experimental Setup -- 5.2 Results and Discussion -- 6 Conclusion -- References -- Enabling Traffic-Differentiated Load Balancing for Datacenter Networks -- 1 Introduction -- 2 Motivation -- 3 TDLB Design -- 3.1 Design Overview -- 3.2 Design Rationale -- 3.3 Design Detail -- 4 Evaluation -- 4.1 Performce Under Symmetric Topology -- 4.2 Performance Under Asymmetric Topology -- 5 Related Work -- 6 Conclusion -- References -- Deep Reinforcement Learning Based Load Balancing for Heterogeneous Traffic in Datacenter Networks -- 1 Introduction -- 2 Background and Motivation -- 2.1 Background -- 2.2 Motivation -- 3 DRLB Design.
3.1 Design Overview -- 3.2 Design Detail -- 4 Experimental Results and Evaluation -- 4.1 Experimental Setup -- 4.2 Evaluation of Experimental Results -- 5 Related Works -- 6 Conclusion -- References -- Adaptive Routing for Datacenter Networks Using Ant Colony Optimization -- 1 Inroduction -- 2 Background and Motivation -- 2.1 Background -- 2.2 Motivation -- 2.3 Summary -- 3 RACO Design -- 3.1 RACO Overview -- 3.2 Statistics Module -- 3.3 Calculation Module -- 3.4 Algorithm Pseudocode -- 4 Performance Evaluation -- 4.1 Experimental Setup -- 4.2 Performance Under Symmetrical Topology -- 4.3 Performance Under Asymmetric Topology -- 5 Related Work -- 6 Conclusion -- References -- MPC: A Novel Internal Clustering Validity Index Based on Midpoint-Involved Distance -- 1 Introduction -- 2 MPdist: A Midpoint-Involved Distance -- 3 MPC: An Internal CVI Based on MPdist -- 3.1 The Definition of MPC -- 3.2 The Analysis of Time Complexity -- 4 Experimental Results -- 4.1 Description of the Test Datasets -- 4.2 Performances of CVIs on Evaluating the Results of the AHC -- 4.3 Performances of CVIs on Evaluating the Results of the K-Means -- 4.4 Performance Evaluation by Real Large-Scale Datasets -- 5 Conclusion and Future Works -- References -- HAECN: Hierarchical Automatic ECN Tuning with Ultra-Low Overhead in Datacenter Networks -- 1 Introduction -- 2 Motivation -- 3 HAECN Design -- 3.1 HAECN Overview -- 3.2 Design Details of HAECN -- 3.3 Reinforcement Learning Agent in HAECN -- 3.4 Learning Algorithm in HAECN -- 4 Implementation -- 5 Evaluation -- 5.1 Performance Under Bursty Networks -- 5.2 Performance Under Gradual Stabilization Network Environments -- 6 Related Work -- 7 Conclusion -- References -- An Android Malware Detection Method Based on Metapath Aggregated Graph Neural Network -- 1 Introduction -- 2 Related Work -- 3 Our Approach.
3.1 Feature Engineering.
Record Nr. UNISA-996587860503316
Tari Zahir  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part VI
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part VI
Autore Tari Zahir
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (512 pages)
Altri autori (Persone) LiKeqiu
WuHongyi
Collana Lecture Notes in Computer Science Series
ISBN 981-9708-11-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part VI -- An Uncertainty-Aware Auction Mechanism for Federated Learning -- 1 Introduction -- 2 Related Work -- 3 System Model and Problem Definition -- 3.1 Federated Learning -- 3.2 Auction Framework -- 3.3 Problem Definition -- 4 The VCG-Based Auction Mechanism -- 4.1 Problem Transformation -- 4.2 Expected Social Welfare Maximization Algorithm -- 4.3 Payment -- 4.4 Properties -- 5 Greedy Algorithm Based Auction Mechanism -- 5.1 Choice of Clients' Training Data -- 5.2 Payment -- 5.3 Properties -- 5.4 Further Option for Reducing Time Complexity -- 6 Simulation Results -- 6.1 Experiment Settings -- 6.2 Experiment Analysis -- 7 Conclusion -- References -- Persistent Sketch: A Memory-Efficient and Robust Algorithm for Finding Top-k Persistent Flows -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 The PE-Sketch Design -- 4.1 Approach Overview -- 4.2 Event Sampling Based on Flip Filter -- 4.3 Candidate Tracking -- 5 Performance Analysis -- 5.1 Parameters of Flip Filter -- 5.2 Estimation Error Bound of Candidate Matrix -- 6 Experimental Evaluation -- 6.1 Experiment Setup -- 6.2 Evaluation on Event Sampling -- 6.3 Finding Top-k Persistent Flows -- 6.4 Parameter Setting -- 7 Conclusion -- References -- FaCa: Fast Aware and Competition-Avoided Balancing for Data Center Network -- 1 Introduction -- 2 Related Work -- 2.1 Centralized Load Balancing -- 2.2 Distributed Load Balancing -- 3 Background -- 4 Motivation -- 4.1 Why Not ECMP? -- 4.2 A Motivation Example -- 5 Design -- 5.1 Overview -- 5.2 Network Model -- 5.3 Partly Global Vision with INT -- 5.4 Load Estimate -- 5.5 Flowing& -- Jumping -- 6 Implementation -- 6.1 Productive Experiment Setting -- 6.2 Implementation Challenges -- 7 Evaluation -- 7.1 Throughput Performance -- 7.2 Concurrent Competition -- 7.3 Micro-benchmark -- 8 Conclusion.
References -- Optimizing GNN Inference Processing on Very Long Vector Processor -- 1 Introduction -- 2 Background -- 2.1 GNN -- 2.2 Brief Introduction to the Long Vector Architecture Processor -- 3 Related Works -- 4 Efficient GNNs Inference on Long Vector Architecture -- 4.1 Efficient GNN Operator Library -- 4.2 GNN Operator Fusion Strategy -- 4.3 Heterogeneous Multi-threaded Cooperative Strategy for Long Vector Architecture -- 5 Experiment -- 5.1 Experimental Setup -- 5.2 Overall Performance -- 5.3 Operator Fusion Strategy -- 5.4 Heterogeneous Multi-threaded Cooperative Strategy -- 6 Conclusion -- References -- GDTM: Gaussian Differential Trust Mechanism for Optimal Recommender System -- 1 Introduction -- 2 Related Work -- 2.1 Trust-Based Recommendation -- 2.2 Recommended Protection Mechanism -- 3 Trade-Off Mechanism -- 3.1 Trust-Related Definition -- 3.2 Trust Recommendation -- 3.3 Gaussian Differential Trust Mechanism -- 4 Theoretical Analysis -- 5 Experiment Summary -- 5.1 Research Questions -- 5.2 Benchmark Model -- 5.3 Evaluation Metrics -- 5.4 Performance Analysis -- 6 Conclusion -- References -- Privacy-Enhanced Dynamic Symmetric Searchable Encryption with Efficient Searches Under Sparse Keywords -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations -- 2.2 Dynamic Searchable Symmetric Encryption -- 3 Forward Privacy DSSE: SGsse-F -- 3.1 Construction of SGsse-F -- 3.2 An Example of SGsse-F -- 3.3 Correctness -- 3.4 Security Analysis -- 4 Forward and Backward Privacy DSSE: SGsse-FB -- 4.1 Correctness -- 4.2 Security Analysis -- 5 Related Works -- 6 Benefits and Drawbacks of DSSE Schemes Analysis -- 7 Evaluation -- 7.1 Experimental Setup -- 7.2 Experimental Analysis -- 8 Conclusion -- References -- CBA Sketch: A Sketching Algorithm Mining Persistent Batches in Data Streams -- 1 Introduction -- 1.1 Background and Motivation -- 1.2 Our Solution.
1.3 Key Contributions -- 2 Problem Formulation and Related Work -- 2.1 Problem Formulation -- 2.2 Related Work -- 3 The CBA Sketch -- 3.1 Circular-Time Sketch -- 3.2 Bloom Filter-Based Existence Recorder -- 3.3 Approximate Size Recorder -- 3.4 Query -- 4 Evaluation -- 4.1 Strawman Approach -- 4.2 Experimental Setup -- 4.3 Sensitivity Analysis -- 4.4 Experiments on ARE -- 4.5 Experiments on Throughput -- 5 Conclusion -- References -- Joint Optimization of System Bandwidth and Transmitting Power in Space-Air-Ground Integrated Mobile Edge Computing -- 1 Introduction -- 2 Related Works -- 2.1 Research on Air-Ground Communication -- 2.2 Research on Space-Ground Communication -- 2.3 Research on SAGIN Communication -- 3 System Model and Problem Formulation -- 3.1 Network Architecture -- 3.2 Satellite Coverage Time -- 3.3 IoRT Devices-Satellite/UAV Channel -- 3.4 Traffic Offloading Delay -- 3.5 Problem Formulation -- 4 Algorithm Design -- 4.1 DRL-Oriented Problem Transformation -- 4.2 SAC-Based Offloading Algorithm -- 5 Performance Evaluation -- 5.1 Parameter Setting -- 5.2 Performance Evaluation -- 6 Conclusion -- References -- A Novel Sensor Method for Dietary Detection -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Coupling Effect -- 3.2 Hardware Design -- 3.3 Event Detection Method Based on SVM -- 3.4 Chewing Counting Algorithm -- 4 Evaluation and Discussion -- 4.1 Experimental Methodology -- 4.2 The Evaluation of Chewing Event Detection -- 4.3 The Evaluation of Chewing Counting -- 5 Conclusion -- References -- Accelerated Optimization for Simulation of Brain Spiking Neural Network on GPGPUs -- 1 Introduction -- 2 Related Work -- 2.1 Spiking Neural Networks -- 2.2 SNN Simulation Tools -- 2.3 CUDA Programming on Multiple GPUs -- 3 Method -- 3.1 Workload-Oriented Partitioning -- 3.2 Memory Access Optimization.
3.3 Branch-Matched Thread Organization -- 3.4 Spike Synchronization Optimization -- 4 Experiments -- 4.1 Setup -- 4.2 Simulation Results -- 5 Conclusion -- References -- An Improved GPU Acceleration Framework for Smoothed Particle Hydrodynamics -- 1 Introduction -- 2 SPH Method -- 3 GPU Computation Using CUDA -- 3.1 Data Layout -- 3.2 CUDA Implementation -- 3.3 CUDA Acceleration -- 4 Results -- 4.1 GPU Simulation -- 4.2 Performance Evaluation -- 5 Conclusion and Future Work -- References -- MDCF: Multiple Dynamic Cuckoo Filters for LSM-Tree -- 1 Introduction -- 2 Background and Motivation -- 2.1 LSM-Tree Based KV Store -- 2.2 Serious Read Amplification of LSM-Tree -- 2.3 Motivation -- 3 Proposed Approach -- 3.1 The Design of MDCF -- 3.2 Maintenance of MDCF -- 3.3 The Flow of Read Operations -- 4 Evaluation -- 4.1 Experiment Setup -- 4.2 Workloads -- 4.3 Performance Evaluation -- 5 Related Work -- 6 Conclusion -- References -- A Game Theory Based Task Offloading Scheme for Maximizing Social Welfare in Edge Computing -- 1 Introduction -- 2 Motivation and Related Works -- 2.1 Motivation -- 2.2 Related Works -- 3 System Model -- 3.1 User Energy Consumption Model -- 3.2 User Utility Model -- 4 Stackelberg Game Based Offloading Algorithm -- 5 Evaluation -- 5.1 Evaluation Settings -- 5.2 Results -- 6 Conclusion -- References -- Research on Dos Attack Simulation and Detection in Low-Orbit Satellite Network -- 1 Introduction -- 1.1 A Subsection Sample -- 2 Related Work -- 3 Simulating DoS Attacks in Low Earth Orbit Satellite Networks -- 3.1 Satellite Physical Link Simulation Based on STK -- 3.2 Network Simulation Platform Based on OVS -- 3.3 SDN Control Platform Based on RYU -- 3.4 Network Attack Deployment Based on Docker Containers -- 4 Building and Detecting Datasets for Satellite Network Attacks -- 4.1 Overall Framework -- 4.2 Dataset Construction.
4.3 Stacking-Based Attack Detection -- 5 Experimental Results -- 6 Conclusion -- References -- Malware Detection Method Based on Visualization -- 1 Introduction -- 2 Related Work -- 2.1 Malware and Detection Methods -- 2.2 Visualization -- 2.3 Ensemble Machine Learning -- 3 Visualization-Based Malware Detection -- 3.1 Method Framework -- 3.2 Specific Implementation -- 4 Experiments and Evaluations -- 4.1 Data Set and Experimental Environment -- 4.2 Experimentation -- 5 Conclusion -- References -- TOC: Joint Task Offloading and Computation Reuse in Vehicular Edge Computing -- 1 Introduction -- 2 Related Work -- 3 System Model and Problem Formulation -- 3.1 System Model -- 3.2 Problem Formulation -- 4 TOC Framework -- 4.1 Computational Reuse -- 4.2 Minimum Weighted Vertex Search Algorithm -- 5 Experiment and Evaluation -- 5.1 Effects of Different Numbers of Tasks on Completion Time and Computational Execution Time on RSUs -- 5.2 Effects of Different Computation Capabilities on Completion Time and Computational Execution Time on RSUs -- 5.3 Lookup Rate Performance -- 6 Conclusion -- References -- Distributed Task Offloading for IoAV Using DDP-DQN -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 System Overview -- 3.2 Transmission Model -- 3.3 Task Delay -- 3.4 Energy Consumption Model -- 3.5 Formulation of Task Offloading Problem -- 4 DDP-DQN Algorithm in IoAV Offloading -- 4.1 IoAV Environment Model -- 4.2 DDP-DQN Based Task Offloading Algorithm -- 5 Performance Evaluation -- 5.1 Experimental Settings -- 5.2 Results and Analysis -- 6 Conclusion -- References -- A Task Offloading and Resource Allocation Optimization Method in End-Edge-Cloud Orchestrated Computing -- 1 Introduction -- 2 Related Work -- 3 System Model and Problem Formulation -- 3.1 Network Model -- 3.2 Communication Model -- 3.3 Computation Model -- 3.4 Problem Formulation.
4 DRL-Based Task Offloading and Resource Allocation in EECOC.
Record Nr. UNISA-996587861003316
Tari Zahir  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part II
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part II
Autore Tari Zahir
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (524 pages)
Altri autori (Persone) LiKeqiu
WuHongyi
Collana Lecture Notes in Computer Science Series
ISBN 981-9708-01-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- LearnedSync: A Learning-Based Sync Optimization for Cloud Storage -- 1 Introduction -- 2 Background and Motivation -- 2.1 Cloud Sync -- 2.2 Workload Characteristics and Environmental Conditions -- 2.3 Motivation -- 3 The Design of LearnedSync -- 3.1 System Overview -- 3.2 State Monitor -- 3.3 Sync Method Selector -- 3.4 Sync Record Directory -- 3.5 The Training Process for LearnedSync -- 4 Performance Evaluations -- 4.1 Prototype Implementation -- 4.2 Experimental Setup and Methodology -- 4.3 Performance Results and Analysis -- 5 Related Work -- 6 Conclusion -- References -- Optimizing CSR-Based SpMV on a New MIMD Architecture Pezy-SC3s -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Row Granularity Matrix Partition -- 3.2 Workload Balance Within Matrix Chunks -- 3.3 Vectorization -- 4 Experimental Results and Evaluation -- 4.1 Preprocessing Overhead -- 4.2 Floating-Point Performance -- 4.3 Bandwidth Utilization -- 4.4 SpeedUp -- 5 Conclusion -- References -- Intrusion Detection Method for Networked Vehicles Based on Data-Enhanced DBN -- 1 Introduction -- 2 Intrusion Detection Model Based on Data Augmentation -- 2.1 Data Processing and Augmentation -- 2.2 Improved DBN Model -- 3 Experimental Design and Result Analysis -- 3.1 Dataset Labels -- 3.2 Experiments and Analysis -- 4 Conclusion -- References -- A Multi-source Domain Adaption Approach to Minority Disk Failure Prediction -- 1 Introduction -- 2 Related Work -- 3 Motivation -- 3.1 Problem Statement -- 3.2 Generalization Error Bound Analysis -- 4 Method -- 4.1 Overview of DiskDA -- 4.2 Domain Invariant Representation Learning -- 4.3 Confidence-Based Sample Selection -- 5 Experiment -- 5.1 Methodology -- 5.2 Experimental Results -- 5.3 Sensitivity Study -- 6 Conclusion -- 7 Appendix -- References.
Sequenced Quantization RNN Offloading for Dependency Task in Mobile Edge Computing -- 1 Introduction -- 2 Related Work -- 3 System Model and Problem Formula -- 3.1 System Model -- 3.2 Problem Formula -- 4 Sequenced Quantization Based on RNN Offloading Algorithm -- 4.1 Generation of Unload Actions -- 4.2 Sequenced Quantization Offloading Actions -- 4.3 Experience Pool Recycling -- 5 Simulation Experiments and Result Analysis -- 5.1 Experimental Setup -- 5.2 Algorithm Parameter Selection -- 5.3 Result Analysis -- 5.4 The Impact of the Number of Subtasks on the SQ-RNN Algorithm -- 6 Conclusion -- References -- KylinArm: An Arm Gesture Recognition System for Mobile Devices -- 1 Introduction -- 2 Related Work -- 2.1 IMU-Based Gesture Recognition -- 2.2 Algorithms for Sensor-Based Gesture Recognition -- 3 Design and Implementation of KylinArm -- 3.1 Framework Design of KylinArm -- 3.2 Gesture-Controlled Command Set -- 3.3 Classification Module: Dual-Branch 1D-CNN Classifier -- 3.4 Arm Gesture Recognition -- 3.5 CORAL-Based Generalization Optimization -- 4 Evaluation -- 4.1 DataSet Description -- 4.2 Performance of Dual-Branch 1D-CNN Model -- 4.3 Performance of Inference Modules -- 4.4 Performance of CORALREVERSE -- 4.5 Real-World Evaluation of KylinArm -- 5 Summary -- References -- FCSO: Source Code Summarization by Fusing Multiple Code Features and Ensuring Self-consistency Output -- 1 Introduction -- 2 Related Work -- 3 The Architecture of Approach -- 3.1 Data Preprocessing -- 3.2 Feature Extraction -- 3.3 Feature Fusion -- 3.4 Self-consistency Output -- 4 Experiment -- 4.1 Experiment Settings -- 4.2 Comparison Experiment and Ablation Experiment -- 4.3 Code Summarization Examples -- 5 Conclusion -- References -- Graph Structure Learning-Based Compression Method for Convolutional Neural Networks -- 1 Introduction -- 2 Related Work.
2.1 Compression of CNNs -- 2.2 Graph Structure Learning -- 3 The Proposed Method -- 3.1 Overview -- 3.2 Graph Construction -- 3.3 Graph Structure Learner with Dual-Branch -- 3.4 Pruning Filters -- 4 Experiments -- 4.1 Pruned VGG-16 -- 4.2 Pruned ResNet-101 -- 5 Conclusions and Future Works -- References -- Reliability-Aware VNF Provisioning in Homogeneous and Heterogeneous Multi-access Edge Computing -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Network Model -- 3.2 Task Model -- 3.3 Cost Model -- 4 Homogeneous MEC Scenario -- 4.1 Reliability Model -- 4.2 Problem Formulation -- 4.3 Local Ratio Based Algorithm -- 4.4 Algorithm Analysis -- 5 Heterogeneous MEC Scenario -- 5.1 Reliability Model -- 5.2 Problem Formulation -- 5.3 Benefit-Cost Ratio Preference Algorithm -- 5.4 Algorithm Analysis -- 6 Simulation Evaluation -- 6.1 Experimental Parameters -- 6.2 Impact of Number of Tasks -- 6.3 Impact of Number of Servers -- 7 Conclusion -- References -- Approximate Query Processing Based on Approximate Materialized View -- 1 Introduction -- 2 Overview -- 2.1 Problem Definition -- 2.2 Data Aggregation -- 3 Reuse of Approximate Materialized View -- 3.1 Aggregation and Precomputing -- 3.2 Approximate Interval Recognition -- 3.3 Analysis for Twice Approximations -- 4 Experimental Results -- 4.1 Experimental Setup -- 4.2 Accuracy -- 4.3 The Summary of Experimental Results -- 5 Influence of Parameters -- 5.1 Sample Size -- 5.2 Number of Partition Points -- 5.3 The Summary of Parameter Setting -- 6 Related Work -- 7 Conclusion -- References -- Schema Integration on Massive Data Sources -- 1 Introduction -- 2 Preliminary -- 2.1 Knowledge Base -- 2.2 Distance Function -- 2.3 Edit Distance and Q-Gram -- 2.4 Problem Definition -- 3 Overview -- 3.1 Initialization -- 3.2 Batch Integration -- 3.3 Incremental Integration -- 3.4 Verification.
4 Join Schema Integration -- 4.1 ED Join -- 4.2 Semantic Join -- 5 Batch Integration -- 5.1 Flow of Batch Integration -- 5.2 Resolving -- 6 Experiments -- 6.1 Experimental Settings -- 6.2 Accuracy -- 6.3 Efficiency -- 7 Related Work -- 8 Conclusions and Future Work -- References -- A Hybrid Few-Shot Learning Based Intrusion Detection Method for Internet of Vehicles -- 1 Introduction -- 2 Design of Intrusion Detection Model for IoV -- 2.1 Data Pre-processing -- 2.2 Feature Extraction -- 3 Meta-learning Training Network Process -- 4 Simulation and Results Evaluation -- 4.1 Metrics -- 4.2 Experimental Results and Comparative Analysis -- 5 Conclusion -- References -- Noise-Robust Gaussian Distribution Based Imbalanced Oversampling -- 1 Introduction -- 2 Related Work -- 2.1 Resampling Methods -- 2.2 Gaussian Distribution Based Oversampling (GDO) -- 3 Proposed Method -- 3.1 Analysis of the GDO Algorithm -- 3.2 Local Information of Samples -- 3.3 Estimation of Weight for Minority Class Sample Selection -- 3.4 Probabilistic Seed Sample Selection and Time Complexity -- 4 Experiments and Analysis -- 4.1 Experimental Settings -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- LAST: An Efficient In-place Static Binary Translator for RISC Architectures -- 1 Introduction -- 2 Background -- 2.1 Static Binary Translation -- 2.2 Address Relocation Problem in SBT -- 2.3 Performance Overhead in SBT -- 3 Design -- 3.1 Overview -- 3.2 In-place Instruction Translation Design -- 3.3 System Call Design -- 3.4 ISA-Level Support -- 4 Implementation -- 4.1 Register Mapping -- 4.2 In-place Instruction Translation -- 4.3 System Call Handling -- 4.4 Delay Slot -- 5 Evaluation -- 5.1 Evaluation Setup -- 5.2 Performance -- 5.3 Translation vs. Compilation -- 6 Conclusion -- References.
Personalized Privacy Risk Assessment Based on Deep Neural Network for Image Sharing on Social Networks -- 1 Introduction -- 2 Related Work -- 3 The Framework of PPRAS -- 3.1 Problem Description and Definition -- 3.2 The Framework of PPRAS -- 4 Experimental Results and Evaluation -- 4.1 Dataset -- 4.2 Evaluation Metrics and Baseline Methods -- 4.3 Train the Neural Network -- 4.4 Comparison of PPRAS and Two Variants in Three Performance Metrics -- 4.5 Comparison of PPRAS and Two Variants in Time Utility -- 4.6 Utility Analysis -- 4.7 Parametric Analysis -- 5 Conclusions -- References -- A Pipelined AES and SM4 Hardware Implementation for Multi-tasking Virtualized Environments -- 1 Introduction -- 2 Background -- 2.1 Overview of AES and SM4 -- 2.2 Related Works and Discussion -- 3 Proposed AES and SM4 Architecture -- 3.1 AES Encryption and Decryption Architecture -- 3.2 SM4 Encryption/Decryption Architecture -- 4 A Prototype Cryptosystem for Virtualization -- 4.1 Prototype Cryptosystem Architecture -- 4.2 Programming Sequence of the Prototype Cryptosystem -- 5 Experimental Results -- 5.1 Circuit Performance Comparison -- 5.2 Multi-guest Efficiency Improvement -- 6 Discussion -- 7 Conclusion -- References -- Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems -- 1 Introduction -- 2 Related Work -- 3 Technical Preliminaries -- 3.1 Bilinear Pairing and Hardness Problem -- 3.2 Homomorphic Hash Function -- 3.3 System Model -- 3.4 Adversary Model and Design Goals -- 4 Our Protocol -- 5 Evaluation of the Proposed Mechanism -- 5.1 Correctness -- 5.2 Security Analysis -- 6 Comprehensive Performance Evaluation -- 6.1 Comparison of the Computation Costs -- 6.2 Comparison of the Communication Overhead -- 6.3 On-Chain Consumption Evaluation -- 7 Conclusions and Future Work -- References.
MANet: An Architecture Adaptive Method for Sparse Matrix Format Selection.
Record Nr. UNISA-996587861103316
Tari Zahir  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part V
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part V
Autore Tari Zahir
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (525 pages)
Altri autori (Persone) LiKeqiu
WuHongyi
Collana Lecture Notes in Computer Science Series
ISBN 981-9708-08-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part V -- EQFF: An Efficient Query Method Using Feature Fingerprints -- 1 Introduction -- 2 Related Work -- 2.1 Privacy of Bloom Filters -- 2.2 Fuzzy Query -- 3 System Overview -- 4 Construction of Data Feature Fingerprints -- 4.1 Construction and Chunking of Data Feature Fingerprints -- 4.2 Fingerprint Compression Storage Algorithm -- 5 Precise Query Library and Rapid Query -- 5.1 Acceleration Algorithm Based on Inverted Index Library -- 5.2 Precise Query Algorithm Based on Bloom Filter -- 6 Fuzzy Query and Similarity Measurement -- 6.1 Similarity Measurement Based on Counting Bloom Filters -- 6.2 Search Algorithm Acceleration Using Parallel Computing -- 7 Evaluation -- 7.1 Experimental Settings and Dataset -- 7.2 Storage Overhead and Parameter Selection for Feature Fingerprints -- 7.3 Performance for Precise Query -- 7.4 Performance for Fuzzy Query -- 8 Conclusion -- References -- Joint Controller Placement and Flow Assignment in Software-Defined Edge Networks -- 1 Introduction -- 2 Related Work -- 2.1 Assignment Schemes -- 2.2 Placement and Assignment Schemes -- 2.3 Placement and Assignment Schemes in SDN-Enabled Edge Network -- 3 System Model and Problem Formulation -- 3.1 System Model -- 3.2 Flow-Setup Delay Model -- 3.3 Problem Formulation -- 4 Controller Placement and Flow Assignment -- 4.1 Controller Placement -- 4.2 Flow Assignment -- 5 Experiment and Performance Evaluation -- 5.1 Controller Response Time -- 5.2 High Queuing Delay Flows -- 5.3 Folw-Setup Delay Constraint Violated Flows -- 5.4 Algorithm Execution Time -- 6 Conclusion -- References -- Distributed Latency-Efficient Beaconing for Multi-channel Asynchronous Duty-Cycled IoT Networks -- 1 Introduction -- 2 Related Works -- 3 Problem Definition -- 4 Distributed Latency-Efficient Scheduling Algorithm.
4.1 Special Structures for Collision Avoidance -- 4.2 Computing Candidate Node Transmission Schedule -- 4.3 The Distributed Beaconing Schedule Algorithm -- 5 Performance Analysis -- 6 Simulation Results -- 6.1 Performance Comparison in Single-channel Duty-Cycled Scenarios -- 6.2 Performance Analysis in Multi-channel Duty-Cycled Scenarios -- 7 Conclusions -- References -- Improved Task Allocation in Mobile Crowd Sensing Based on Mobility Prediction and Multi-objective Optimization -- 1 Introduction -- 2 Related Work -- 3 System Overview and Problem Formulation -- 3.1 System Overview -- 3.2 Problem Formulation -- 3.3 Hardness Analysis of M3P Problem -- 4 Fuzzy Control System -- 4.1 Fuzzy Set and Membership Function -- 4.2 Fuzzy Inference Engine -- 4.3 COG Defuzzification -- 5 Task Allocation Algorithm -- 5.1 Most Possible First Algorithm -- 5.2 Improved NSGA-II Algorithm -- 6 Evaluation -- 6.1 Dataset -- 6.2 Baselines -- 6.3 Performance of Mobility Prediction -- 6.4 Performance of Task Allocation -- 7 Conclusion -- References -- SMCoEdge: Simultaneous Multi-server Offloading for Collaborative Mobile Edge Computing -- 1 Introduction -- 2 Related Work -- 2.1 Edge-Cloud Collaboration -- 2.2 Edge-Edge Collaboration -- 3 System Model and Problem Formulation -- 3.1 System Model -- 3.2 Problem Formulation -- 4 Proposed Approach -- 4.1 SMCoEdge Framework -- 4.2 Improved DQN for Multi-ES Selection -- 4.3 Closed-Form Solution for Task Allocation -- 4.4 DRL-SMO Algorithm -- 5 Performance Evaluation -- 5.1 Setting -- 5.2 Baselines -- 5.3 Results -- 6 Conclusions -- References -- Image Inpainting Forensics Algorithm Based on Dual-Domain Encoder-Decoder Network -- 1 Introduction -- 2 Related Works -- 2.1 Image Inpainting Forensics -- 2.2 Attention Mechanism -- 3 Proposed Method -- 3.1 S-Encoder -- 3.2 F-Encoder -- 3.3 CMAF -- 3.4 Attention-Gated Decoder Network.
3.5 Loss Function -- 4 Experiment -- 4.1 Experimental Setup -- 4.2 Comparing with Previous Methods -- 4.3 Abation Study -- 4.4 Robustness Evaluation -- 5 Conclusions -- References -- Robust Medical Data Sharing System Based on Blockchain and Threshold Rroxy Re-encryption -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Blockchain -- 3.2 Threshold Proxy Re-encryption -- 4 BMDSS Model -- 4.1 System Model -- 4.2 Application -- 5 System Evaluation -- 5.1 Environment -- 5.2 Data Storage Performance -- 5.3 Data Sharing Performance -- 5.4 Security Analysis -- 6 Conclusion -- References -- FRAIM: A Feature Importance-Aware Incentive Mechanism for Vertical Federated Learning -- 1 Introduction -- 2 Related Work -- 2.1 Federated Learning -- 2.2 Incentive Mechanism of Federated Learning -- 3 System Model and Problem Definition -- 3.1 Vertical Federated Learning -- 3.2 System Model -- 3.3 Problem Definition -- 4 Incentive Mechanism Design of Vertical Federated Learning -- 4.1 Data Synthesis and Feature Importance Estimation -- 4.2 Design of FRAIM -- 4.3 Theoretical Analysis -- 5 Experimental Evaluation -- 5.1 Experiment Setup -- 5.2 Performance on Three Datasets -- 5.3 Performance with Different Budgets -- 6 Conclusion -- References -- A Multi-objective Method for Energy-Efficient UAV Data Collection Communications -- 1 Introduction -- 2 Models and Preliminaries -- 2.1 System Model -- 2.2 Network Model -- 2.3 Energy Consumption Model of the UAV -- 3 Problem Formulation and Analysis -- 3.1 Problem Statement -- 3.2 Optimization Objectives -- 4 Algorithm -- 4.1 Conventional MOGOA -- 4.2 EMOGOA -- 5 Simulation Results and Analysis -- 5.1 Simulation Setups -- 5.2 Simulation Results -- 6 Conclusion -- References -- Black-Box Graph Backdoor Defense -- 1 Introduction -- 2 Related Work -- 2.1 Graph Neural Network Backdoor -- 2.2 Black Box Backdoor Defenses.
3 Methodology -- 3.1 Defense Assumptions and Goals -- 3.2 Key Intuition -- 3.3 BloGBaD -- 4 Experiment -- 4.1 Experiment Settings -- 4.2 Evaluation Metrics -- 4.3 GTA Defense -- 4.4 GBA Defense -- 5 Conclusion -- References -- DRL-Based Optimization Algorithm for Wireless Powered IoT Network -- 1 Introduction -- 2 Related Work -- 2.1 Binary Offloading -- 2.2 Partial Offloading -- 3 System Model and Problem Formulation -- 3.1 System Model -- 3.2 Local Computing Mode -- 3.3 Edge Computing Mode -- 3.4 Problem Formulation -- 4 Deep-Reinforcement-Learning-Based Offloading Algorithm -- 4.1 Deep-Reinforcement-Learning-Based Method for Solving Top-Problem -- 4.2 Mixed Optimization Method for Solving Sub-problem -- 5 Numerical Results -- 5.1 Convergence Performance -- 5.2 Influence of Different Parameters on Result -- 5.3 Numerical Evaluation -- 6 Conclusion -- References -- Efficiently Running SpMV on Multi-core DSPs for Banded Matrix -- 1 Introduction -- 2 Background -- 2.1 FT-M7032 Heterogeneous Processor -- 2.2 Sparse Matrix Storage Format -- 2.3 Banded Matrix -- 3 Our Approach -- 3.1 Architecture Analysis -- 3.2 SpMV_Band Design and Implementation -- 4 Performance Results -- 4.1 Experimental Setup -- 4.2 Performance Evaluation -- 5 Related Work -- 6 Conclusion -- References -- SR-KGELS: Social Recommendation Based on Knowledge Graph Embedding Method and Long-Short-Term Representation -- 1 Introduction -- 2 Related Work -- 3 Problem Definition -- 4 The Proposed Model -- 4.1 Embedding Layer and Input Data Pre-processing -- 4.2 User Modeling -- 4.3 Item Modeling -- 4.4 Relative Location Difference Modeling -- 4.5 Model Training -- 5 Experiments -- 5.1 Experimental Settings -- 5.2 Comparative Results -- 5.3 Ablation Study -- 5.4 Analysis of Parameters -- 6 Conclusion -- References.
CMMR: A Composite Multidimensional Models Robustness Evaluation Framework for Deep Learning -- 1 Introduction -- 2 Attacks, Defense, and Metrics -- 2.1 Attack Methods -- 2.2 Defense Methods -- 2.3 Comparison Metrics -- 3 Composite Multidimensional Model Robust Evaluation Method -- 3.1 Motivation -- 3.2 CMMR Framework -- 4 Experimental Analysis for CMMR -- 4.1 3-Dimension Models Robustness Evaluation. -- 4.2 Evaluating the Robustness of Two Sets of Models by CMMR -- 5 Conclusion -- References -- Efficient Black-Box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems -- 1 Introduction -- 2 Related Work -- 2.1 White-Box and Gray-Box Attacks -- 2.2 Black-Box Attacks -- 3 Methodology -- 3.1 Problem Description -- 3.2 The Proposed Framework -- 3.3 Surrogate Models -- 3.4 The Training of Surrogate Model -- 3.5 Adversarial Examples Generation -- 4 Experiments -- 4.1 Experimental Settings -- 4.2 Transferability Analysis -- 4.3 Frequency Analysis -- 4.4 Performance Comparison -- 5 Discussion of Potential Defenses -- 6 Conclusions and Future Work -- References -- SW-LeNet: Implementation and Optimization of LeNet-1 Algorithm on Sunway Bluelight II Supercomputer -- 1 Introduction -- 2 Related Work -- 2.1 Convolutional Neural Network -- 2.2 The Works Based on the Sunway Supercomputers -- 3 The Sunway Bluelight II Supercomputer and LeNet-1 -- 3.1 The Architecture of the Sunway Bluelight II Supercomputer -- 3.2 The Architecture of LeNet-1 -- 3.3 Serial Execution Mode of LeNet-1 -- 4 SW-LeNet - Parallel Optimization of LeNet-1 on the Sunway Bluelight II Supercomputer -- 4.1 Thread-Level Optimization -- 4.2 Process-Level Optimization -- 5 Evaluation -- 5.1 The Performance of Thread-Level Optimization -- 5.2 The Performance of Process-Level Optimization -- 5.3 The Performance of SW-LeNet -- 5.4 Scaling -- 6 Conclusion -- References.
Multi-label Detection Method for Smart Contract Vulnerabilities Based on Expert Knowledge and Pre-training Technology.
Record Nr. UNISA-996587859503316
Tari Zahir  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20–22, 2023, Proceedings, Part I / / edited by Zahir Tari, Keqiu Li, Hongyi Wu
Algorithms and Architectures for Parallel Processing [[electronic resource] ] : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20–22, 2023, Proceedings, Part I / / edited by Zahir Tari, Keqiu Li, Hongyi Wu
Autore Tari Zahir
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (523 pages)
Disciplina 005.13
Altri autori (Persone) LiKeqiu
WuHongyi
Collana Lecture Notes in Computer Science
Soggetto topico Algorithms
Machine learning
Computer networks
Computer vision
Computer engineering
Design and Analysis of Algorithms
Machine Learning
Computer Communication Networks
Computer Vision
Computer Engineering and Networks
ISBN 981-9708-34-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Short Video Account Influence Evaluation Model Based on Improved SF-UIR Algorithm -- Deep Hash Learning of Feature-Invariant Representation for Single-label and Multi-label Retrieval -- Generative Adversarial Network Based Asymmetric Deep Cross-modal Unsupervised Hashing -- CFDM-IME A Collaborative Fault Diagnosis Method For Intelligent Manufacturing Equipment -- DFECTS A Deep Fuzzy Ensemble Clusterer for Time Series -- Energy-aware Smart Task Scheduling in Edge Computing Networks with A3C -- BACTDS Blockchain-based Fined-grained Access Control Scheme with Traceablity for IoT Data Sharing -- DeepLat Achieving Minimum Worst Case Latency for DNN Inference with Batch-Aware Dispatching -- Privacy-Preserving and Reliable Distributed Federated Learning -- Joint Optimization of Request Scheduling and Container Prewarming in Serverless Computing -- Multi-Stage Optimization of Incentive Mechanisms for Mobile Crowd Sensing based on Top-Trading Cycles -- A Chained Forwarding Mechanism for Large Messages -- TDC Pool-level object cache replacement algorithm based on temperature density -- Smart DAG Task Scheduling based on MCTS Method of Multi-Strategy Learning -- CT-Mixer Exploiting Multiscale Design for Local-global Representations Learning -- FedQL Q-learning Guided Aggregation for Federated Learning -- An Adaptive Instruction Set Encoding Automatic Generation Method for VLIW -- FastDet Detecting Encrypted Malicious Traffic Faster via Early Exit -- Real-EVE Real-time Edge-assist Video Enhancement for Joint Denoising and Super-resolution -- Optimizing the Parallelism of Communication and Computation in Distributed Training Platform -- FedSC Compatible Gradient Compression for Communication-Efficient Federated Learning -- Joint Video Transcoding and Representation Selection for Edge-Assisted Multi-Party Video Conferencing -- Performance Comparison of Distributed DNN Training on Opticalversus Electrical Interconnect Systems -- Dynamic Path Planning Based on Traffic Flow Prediction and Traffic Light Status -- A Time Series Data Compression Co-processor Based on RISC-V Custom Instructions -- MSIN An Efficient Multi-head Self-Attention Framework for Inertial Navigation -- AbsorbDeadlock Resolution for 2.5D Modular Chiplet Based Systems -- A Multi-Server Authentication Scheme based on Fuzzy Extractor.
Record Nr. UNISA-996589546803316
Tari Zahir  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20–22, 2023, Proceedings, Part I / / edited by Zahir Tari, Keqiu Li, Hongyi Wu
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20–22, 2023, Proceedings, Part I / / edited by Zahir Tari, Keqiu Li, Hongyi Wu
Autore Tari Zahir
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (523 pages)
Disciplina 005.13
Altri autori (Persone) LiKeqiu
WuHongyi
Collana Lecture Notes in Computer Science
Soggetto topico Algorithms
Machine learning
Computer networks
Computer vision
Computer engineering
Design and Analysis of Algorithms
Machine Learning
Computer Communication Networks
Computer Vision
Computer Engineering and Networks
ISBN 981-9708-34-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Short Video Account Influence Evaluation Model Based on Improved SF-UIR Algorithm -- Deep Hash Learning of Feature-Invariant Representation for Single-label and Multi-label Retrieval -- Generative Adversarial Network Based Asymmetric Deep Cross-modal Unsupervised Hashing -- CFDM-IME A Collaborative Fault Diagnosis Method For Intelligent Manufacturing Equipment -- DFECTS A Deep Fuzzy Ensemble Clusterer for Time Series -- Energy-aware Smart Task Scheduling in Edge Computing Networks with A3C -- BACTDS Blockchain-based Fined-grained Access Control Scheme with Traceablity for IoT Data Sharing -- DeepLat Achieving Minimum Worst Case Latency for DNN Inference with Batch-Aware Dispatching -- Privacy-Preserving and Reliable Distributed Federated Learning -- Joint Optimization of Request Scheduling and Container Prewarming in Serverless Computing -- Multi-Stage Optimization of Incentive Mechanisms for Mobile Crowd Sensing based on Top-Trading Cycles -- A Chained Forwarding Mechanism for Large Messages -- TDC Pool-level object cache replacement algorithm based on temperature density -- Smart DAG Task Scheduling based on MCTS Method of Multi-Strategy Learning -- CT-Mixer Exploiting Multiscale Design for Local-global Representations Learning -- FedQL Q-learning Guided Aggregation for Federated Learning -- An Adaptive Instruction Set Encoding Automatic Generation Method for VLIW -- FastDet Detecting Encrypted Malicious Traffic Faster via Early Exit -- Real-EVE Real-time Edge-assist Video Enhancement for Joint Denoising and Super-resolution -- Optimizing the Parallelism of Communication and Computation in Distributed Training Platform -- FedSC Compatible Gradient Compression for Communication-Efficient Federated Learning -- Joint Video Transcoding and Representation Selection for Edge-Assisted Multi-Party Video Conferencing -- Performance Comparison of Distributed DNN Training on Opticalversus Electrical Interconnect Systems -- Dynamic Path Planning Based on Traffic Flow Prediction and Traffic Light Status -- A Time Series Data Compression Co-processor Based on RISC-V Custom Instructions -- MSIN An Efficient Multi-head Self-Attention Framework for Inertial Navigation -- AbsorbDeadlock Resolution for 2.5D Modular Chiplet Based Systems -- A Multi-Server Authentication Scheme based on Fuzzy Extractor.
Record Nr. UNINA-9910842487703321
Tari Zahir  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20–22, 2023, Proceedings, Part VI / / edited by Zahir Tari, Keqiu Li, Hongyi Wu
Algorithms and Architectures for Parallel Processing : 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20–22, 2023, Proceedings, Part VI / / edited by Zahir Tari, Keqiu Li, Hongyi Wu
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (512 pages)
Disciplina 518.1
Collana Lecture Notes in Computer Science
Soggetto topico Algorithms
Machine learning
Computer engineering
Computer networks
Computer vision
Design and Analysis of Algorithms
Machine Learning
Computer Engineering and Networks
Computer Vision
ISBN 981-9708-11-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto An Uncertainty-aware Auction Mechanism for Federated Learning -- Persistent Sketch A Memory-efficient and Robust Algorithm for Finding Top-k Persistent Flows -- FaCa Fast Aware and Competition-Avoided Balancing for Data Center Network -- Optimizing GNN Inference Processing on Very Long Vector Processor -- GDTM Gaussian Differential Trust Mechanism for Optimal Recommender System -- Privacy-enhanced Dynamic Symmetric Searchable Encryption with Efficient Searches Under Sparse Keywords -- CBA Sketch A Sketching Algorithm Mining Persistent Batches in Data Streams -- Joint optimization of system bandwidth and transmitting power in space-air-ground integrated mobile edge computing -- A Novel Sensor Method for Dietary Detection -- Accelerated Optimization for Simulation of Brian Spiking Neural Network on GPGPUs -- An improved GPU acceleration framework for smoothed particle hydrodynamics -- MDCF Multiple Dynamic Cuckoo Filters for LSM-Tree -- A game theory based task offloading scheme for maximizing social welfare in edge computing -- DoS Attack Simulation and Detection in Low-Orbit Satellite Networks -- Malware Detection Method Based On Visualization -- TOC Joint Task Offloading and Computation -- Distributed Task Offloading for IoAV Using DDP-DQN -- A Task Offloading and Resource Allocation Optimization Method in End-Edge-Cloud Orchestrated Computing -- Multi-agent Cooperative Intrusion Detection based on Generative Data Augmentation -- Long Short-Term Deterministic Policy Gradient for Joint Optimization of Computational Offloading and Resource Allocation in MEC -- Query Optimization Mechanism for Blockchain-Based Efficient Data Traceability -- Research on the Evolution Path of Network Hotspot Events Based on the Event Evolutionary Graph -- Task Offloading in UAV-Assisted Vehicular Edge Computing Networks -- Path Planning of Coastal Ships Based on Improved Hybrid A-star -- Data Augmentation Method Based on Partial Noise Diffusion Strategy for One-Class Defect Detection Task -- K Asynchronous Federated Learning with Cosine Similarity Based Aggregation on Non-IID Data -- MPQUIC Transmission Control Strategy for SDN-based Satellite Network -- An energy prediction method for energy harvesting wireless sensor with dynamically adjusting weight factor -- Bayesian optimization for Auto-tuning Convolution Neural Network on GPU.
Record Nr. UNINA-9910841862403321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui