The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 29-31, 2024. The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.
The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 29-31, 2024.
The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Fake News Detection across Multiple Domains Using Fuzzy Association Rules.- A Scheme of Dynamic Location Privacy-preserving with Blockchain in Intelligent Transportation System.- DBFIA: Diffusion-Based Face Image Anonymization.- A Modular Sharing Scheme for EMRs Using Consortium Blockchain and Proxy Re-Encryption.- PFDF: Privacy Preserving Federated Decision Forest for Classification.- Data-Free Encoder Stealing Attack in Self-supervised Learning.- Data Poisoning Attack against Reinforcement Learning from Human Feedback in Robot Control Tasks.- A Mini-Model Can Make Machine Unlearning Better.- BlockWhisper: A Blockchain-based Hybrid Covert Communication Scheme with Strong Ability to Avoid Detection.- A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT.- A Comprehensive Scheme for Transaction and Fund Tracing in Distributed Anonymous Transactions.- AutoMiner: Reinforcement Learning-Based Mining Attack Simulator.- FedSV: A Privacy-preserving Byzantine-robust Federated Learning Scheme with Self-Validation.- A Dual-Defense Self-Balancing Framework against Bilateral Model Attacks in Federated Learning.- PrivARM: Privacy-preserving Association Rule Mining in the Cloud.- Outliers are Real: Detecting VLM-generated Images via One-class Classification.- TSformer: A Transformer-Based Model Focusing Specifically on the Fusion of Temporal-Spatial Features for Traffic Forecasting.- Temperature-Based Watermarking and Detection for Large Language Models.- CPAKE: Dynamic Batch Authenticated Key Exchange with Conditional Privacy.- Certificate-based Transport Layer Security Encrypted Malicious Traffic Detection in Real-time Network Environments.- MAP-SIM: A Performance Model for Shared-Memory Heterogeneous Systems with Mapping Awareness.- A Vectorized Sequence-to-graph Alignment Algorithm.
Fake News Detection across Multiple Domains Using Fuzzy Association Rules.- A Scheme of Dynamic Location Privacy-preserving with Blockchain in Intelligent Transportation System.- DBFIA: Diffusion-Based Face Image Anonymization.- A Modular Sharing Scheme for EMRs Using Consortium Blockchain and Proxy Re-Encryption.- PFDF: Privacy Preserving Federated Decision Forest for Classification.- Data-Free Encoder Stealing Attack in Self-supervised Learning.- Data Poisoning Attack against Reinforcement Learning from Human Feedback in Robot Control Tasks.- A Mini-Model Can Make Machine Unlearning Better.- BlockWhisper: A Blockchain-based Hybrid Covert Communication Scheme with Strong Ability to Avoid Detection.- A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT.- A Comprehensive Scheme for Transaction and Fund Tracing in Distributed Anonymous Transactions.- AutoMiner: Reinforcement Learning-Based Mining Attack Simulator.- FedSV: A Privacy-preserving Byzantine-robust Federated Learning Scheme with Self-Validation.- A Dual-Defense Self-Balancing Framework against Bilateral Model Attacks in Federated Learning.- PrivARM: Privacy-preserving Association Rule Mining in the Cloud.- Outliers are Real: Detecting VLM-generated Images via One-class Classification.- TSformer: A Transformer-Based Model Focusing Specifically on the Fusion of Temporal-Spatial Features for Traffic Forecasting.- Temperature-Based Watermarking and Detection for Large Language Models.- CPAKE: Dynamic Batch Authenticated Key Exchange with Conditional Privacy.- Certificate-based Transport Layer Security Encrypted Malicious Traffic Detection in Real-time Network Environments.- MAP-SIM: A Performance Model for Shared-Memory Heterogeneous Systems with Mapping Awareness.- A Vectorized Sequence-to-graph Alignment Algorithm.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826