Algorithms and Architectures for Parallel Processing
24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024, Proceedings, Part V
Herausgegeben:Zhu, Tianqing; Li, Jin; Castiglione, Aniello
Algorithms and Architectures for Parallel Processing
24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024, Proceedings, Part V
Herausgegeben:Zhu, Tianqing; Li, Jin; Castiglione, Aniello
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 29-31, 2024.
The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.
Andere Kunden interessierten sich auch für
- Algorithms and Architectures for Parallel Processing51,99 €
- Algorithms and Architectures for Parallel Processing51,99 €
- Algorithms and Architectures for Parallel Processing51,99 €
- Algorithms and Architectures for Parallel Processing51,99 €
- Algorithms and Architectures for Parallel Processing51,99 €
- Service-Oriented and Cloud Computing45,99 €
- Algorithms and Architectures for Parallel Processing60,99 €
-
-
-
The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 29-31, 2024.
The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.
The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 15255
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-96-1547-6
- Seitenzahl: 360
- Erscheinungstermin: 17. Februar 2025
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 546g
- ISBN-13: 9789819615476
- ISBN-10: 981961547X
- Artikelnr.: 72126241
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
- Lecture Notes in Computer Science 15255
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-96-1547-6
- Seitenzahl: 360
- Erscheinungstermin: 17. Februar 2025
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 546g
- ISBN-13: 9789819615476
- ISBN-10: 981961547X
- Artikelnr.: 72126241
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
An Enhanced Intrusion Detection Method Combined with Contrastive Federated Learning.- Black-Box Adversarial Attack Against Transformer-Based Object Detection Models in Vehicular Networks.- FedADDP: Privacy-Preserving Personalized Federated Learning with Adaptive Dimensional Differential Privacy.- DP-CLMI: Differentially Private Contrastive Learning against Membership Inference Attack.- DT-UPD: User Privacy Data Protection through Distribution Transformation in Unlearning Cloud Service.- Deduplication and Approximate Analytics for Encrypted IoT Data in Fog-assisted Cloud Storage.- Encrypted Malware Traffic Detection Via Time-Frequency Domain Analysis.- Behavior-Driven Encrypted Malware Detection with Robust Traffic Representation.- Optimizing Self-Training Sample Selection for Euphemism Detection in Special Scenarios.- Modal-Centric Insights into Multimodal Federated Learning for Smart Healthcare: A Survey.- Heterogeneous Graph Modeling for Resource-Aware Prediction of DRL Training Time.- A Comprehensive Review on Deep Learning System Testing.- CIGraph: Accelerating Graph Queries Over Database with Compressed Index.- Language-based Colorization with Sparse Attention and Multi-Scale Cross-Modal Semantic Alignment.- A Power Monitoring Framework of a Post-Quantum Cryptography Web Server.- A Lightweight Detection Scheme for Black-Hole Attacks and Gray-Hole Attacks in VANETs.- Federated Meta Continual Learning for Efficient and Autonomous Edge Inference.- Progressive Multiscale Attention Network for Diabetic Retinopathy.- FPIM: Fair and Privacy-Preserving Incentive Mechanism in Mobile Crowdsensing.- DRL-Based UAV Collaborative Task Offloading for Post-Disaster Scenarios.- Who is being impersonated? Deepfake Audio Detection and Impersonated Identification via Extraction of Id-specific Features.- Review of Incentive Mechanisms of Differential Privacy based Federated Learning Protocols: From the Economics and Game Theoretical Perspectives.
An Enhanced Intrusion Detection Method Combined with Contrastive Federated Learning.- Black-Box Adversarial Attack Against Transformer-Based Object Detection Models in Vehicular Networks.- FedADDP: Privacy-Preserving Personalized Federated Learning with Adaptive Dimensional Differential Privacy.- DP-CLMI: Differentially Private Contrastive Learning against Membership Inference Attack.- DT-UPD: User Privacy Data Protection through Distribution Transformation in Unlearning Cloud Service.- Deduplication and Approximate Analytics for Encrypted IoT Data in Fog-assisted Cloud Storage.- Encrypted Malware Traffic Detection Via Time-Frequency Domain Analysis.- Behavior-Driven Encrypted Malware Detection with Robust Traffic Representation.- Optimizing Self-Training Sample Selection for Euphemism Detection in Special Scenarios.- Modal-Centric Insights into Multimodal Federated Learning for Smart Healthcare: A Survey.- Heterogeneous Graph Modeling for Resource-Aware Prediction of DRL Training Time.- A Comprehensive Review on Deep Learning System Testing.- CIGraph: Accelerating Graph Queries Over Database with Compressed Index.- Language-based Colorization with Sparse Attention and Multi-Scale Cross-Modal Semantic Alignment.- A Power Monitoring Framework of a Post-Quantum Cryptography Web Server.- A Lightweight Detection Scheme for Black-Hole Attacks and Gray-Hole Attacks in VANETs.- Federated Meta Continual Learning for Efficient and Autonomous Edge Inference.- Progressive Multiscale Attention Network for Diabetic Retinopathy.- FPIM: Fair and Privacy-Preserving Incentive Mechanism in Mobile Crowdsensing.- DRL-Based UAV Collaborative Task Offloading for Post-Disaster Scenarios.- Who is being impersonated? Deepfake Audio Detection and Impersonated Identification via Extraction of Id-specific Features.- Review of Incentive Mechanisms of Differential Privacy based Federated Learning Protocols: From the Economics and Game Theoretical Perspectives.