Algorithms and Architectures for Parallel Processing
24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024, Proceedings, Part VI Herausgegeben:Zhu, Tianqing; Li, Jin; Castiglione, Aniello
Algorithms and Architectures for Parallel Processing
24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024, Proceedings, Part VI Herausgegeben:Zhu, Tianqing; Li, Jin; Castiglione, Aniello
The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 29-31, 2024. The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.
The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 29-31, 2024.
The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
SteDM: Efficient Image Steganography With Diffusion Models.- BDFC:A New Flow Control Mechanism for Torus Networks.- A Hybrid Vectorized Merge Sort on ARM NEON.- An Encoder-based Framework for Privacy-preserving Machine Learning.- Load Balancing Optimizations for Distributed GMRES Algorithm.- ZKCross: An Efficient and Reliable Cross-chain Authentication Scheme Based on Lightweight Attribute-based Zero-knowledge Proof.- LSSM-SpMM: A Long-Row Splitting and Short-Row Merging Approach for Parallel SpMM on PEZY-SC3s.- A Model Inference Attack based on Random Sampling in DLaaS.- Defense Against Textual Backdoors via Elastic Weighted Consolidation-based Machine Unlearning.- Cross-Chain Transaction Auditing with Truth Discovery.- Exploring the Vulnerability of ECG-based Authentication Systems through A Dictionary Attack Approach.-LBVP: Lightweight Blockchain-based Vehicle Platooning Scheme for Secure and Efficient Platoon Management.- Low-Carbon Geographically Distributed Cloud-Edge Task Scheduling.- Integrating Blockchain, Smart Contracts, NFTs, and IPFS for Enhanced Transparency and Ethical Sourcing in Coffee and Cocoa Supply Chains.- The Role of Artificial Intelligence Technologies in Sustainable Urban Development: A Systematic Survey.- Enhancing Privacy in Machine Unlearning: Posterior Perturbation against Membership Inference Attack.- PEbfs: Implement High-performance Breadth-first Search on PEZY-SC3s.- Textual Data De-privatization Scheme Based on Generative Adversarial Networks.-Modeling and Simulation Verification of Operating Mode Switching of Train Control System Based on Train-to-Train Communication.- Performance Evaluation of NLP Models for European Portuguese: Multi-GPU/Multi-Node Configurations and Optimization Techniques.- FusionFrame: A Fusion Dataflow Scheduling Framework for DNN Accelerators via Analytical Modeling.
SteDM: Efficient Image Steganography With Diffusion Models.- BDFC:A New Flow Control Mechanism for Torus Networks.- A Hybrid Vectorized Merge Sort on ARM NEON.- An Encoder-based Framework for Privacy-preserving Machine Learning.- Load Balancing Optimizations for Distributed GMRES Algorithm.- ZKCross: An Efficient and Reliable Cross-chain Authentication Scheme Based on Lightweight Attribute-based Zero-knowledge Proof.- LSSM-SpMM: A Long-Row Splitting and Short-Row Merging Approach for Parallel SpMM on PEZY-SC3s.- A Model Inference Attack based on Random Sampling in DLaaS.- Defense Against Textual Backdoors via Elastic Weighted Consolidation-based Machine Unlearning.- Cross-Chain Transaction Auditing with Truth Discovery.- Exploring the Vulnerability of ECG-based Authentication Systems through A Dictionary Attack Approach.-LBVP: Lightweight Blockchain-based Vehicle Platooning Scheme for Secure and Efficient Platoon Management.- Low-Carbon Geographically Distributed Cloud-Edge Task Scheduling.- Integrating Blockchain, Smart Contracts, NFTs, and IPFS for Enhanced Transparency and Ethical Sourcing in Coffee and Cocoa Supply Chains.- The Role of Artificial Intelligence Technologies in Sustainable Urban Development: A Systematic Survey.- Enhancing Privacy in Machine Unlearning: Posterior Perturbation against Membership Inference Attack.- PEbfs: Implement High-performance Breadth-first Search on PEZY-SC3s.- Textual Data De-privatization Scheme Based on Generative Adversarial Networks.-Modeling and Simulation Verification of Operating Mode Switching of Train Control System Based on Train-to-Train Communication.- Performance Evaluation of NLP Models for European Portuguese: Multi-GPU/Multi-Node Configurations and Optimization Techniques.- FusionFrame: A Fusion Dataflow Scheduling Framework for DNN Accelerators via Analytical Modeling.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826