1 - 3
- International Conference on Algorithms and Architectures for Parallel Processing (21st : 2021 : Online)
- Cham, Switzerland : Springer, 2022.
- Description
- Book — 1 online resource (835 pages).
- Summary
-
- Deep Learning Models and Applications.- CRFST-GCN :A Deeplearning Spital-Temporal Frame to Predict Traffic Flow.- BFR-RetinaNet: An Improved RetinaNet Model for Vehicle Detection in Aerial Images.- Learning Knowledge Graph Embeddings by Multi-Attention Mechanism for Link Prediction.- GlowImp: Combining GLOW and GAN for Multivariate Time Series Imputation.- Accurate Indoor Localization Using Magnetic Sequence Fingerprints with Deep Learning.- Wasserstein Graph Auto-Encoder.- Fine-grained Activity Recognition Based on Features of Action Subsegments and Incremental Broad Learning.- ADFA-LSTM: An Abnormal Trajectory Prediction Method Based On Bionic Neural Network.- Online Multiple Object Tracking Algorithm based on Heat Map Propagation.- Software Systems and Efficient Algorithms.- Spatio-temporal Topology Routing Algorithm for Opportunistic Network Based on Self-Attention Mechanism.- TSAEns: Ensemble Learning for KPI Anomaly Detection.- Towards Transferable Adversarial Examples using Meta Learning.- Temporal Convolution Network Based on Attention for Intelligent Anomaly Detection of Wind Turbine Blades.- Error Serial Episodes Discovery from Mobile Payment Log in Distributed ETC.- Parallel Cache Prefetching for LSM-Tree based Store: From Algorithm to Evaluation.- A Hybrid TLBO-TS Algorithm based Mobile Service Selection for Composite Services.- UPM-DMA: An Efficient Userspace DMA-Pinned Memory Management Strategy for NVMe SSD.- AHOA: Adaptively Hybrid Optimization Algorithm for Flexible Job-shop Scheduling Problem.- Trace-Navi: A High-Accuracy Indoor Navigation System based on Real-Time Activity Recognition and Discrete Trajectory Calibration.- Iterative Filling Incomplete Fingerprint Map Based on Multi-directional Signal Propagation in Large-scale Scene
- .- Dynamic Adjustment Policy of Search Driver Matching Distance via Markov Decision Process.- A Multi-Precision Quantized Super-Resolution Model Framework.- An Optimized GPU Implementation of Weakly-compressible SPH using CUDA-based strategies.- A Heterogeneous Multi-Core Network-on-Chip Mapping Optimization Algorithm.- A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-grained Classification.- Predicting Students' Academic Performance Based on Improved PSO-Xgboost: A Campus Behavior Perspective.- Motion-sequence Authentication System: guard for smart phones.- Edge Computing and Edge Intelligence.- Joint Optimization Scheme of Multi-service Replication and Request Offloading in Mobile Edge Computing.- Flying MEC: Online Task Offloading, Trajectory Planning and Charging Scheduling for UAV-assisted MEC.- Multiple Workflows Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing.- An Optimized Greedy-based Task Offloading Method for Mobile Edge Computing.- Location Aware Workflow Migration Based on Deep Reinforcement Learning in Mobile Edge Computing.- Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing against Collusion Attack.- MGFL: Multi-granularity Federated Learning in Edge Computing Systems.- Energy Efficient Priority-Based Task Scheduling for Computation Offloading in Fog Computing.- Space-Heuristic Navigation and Occupancy Map Prediction for Robot Autonomous Exploration.- Service Dependability and Security Algorithms.- Edge DDoS attack detection method based on software defined networks.- GradMFL: Gradient Memory-based Federated Learning for Hierarchical Knowledge Transferring over Non-IID Data.- Linear Coded Federated Learning.- Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-assisted E-Healthcare Systems.- Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning.- A blockchain-based proxy oriented cloud storage public audit scheme for low-performance terminal devices.- Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public Blockchains.- A Novel Protection method of continuous location sharing based on local differential privacy and conditional random field.- An Intelligent Allocation Mechanism Based on Ethereum Blockchain in Microgrid.- Data Science.- Multi-Layer Adaptive Sampling for Per-Flow Spread Measurement.- Transformer-based Rating-Aware Sequential Recommendation.- An effective single-pass approach for estimating the -quantile in data streams.- Fed-Tra: Improving Accuracy of Deep Learning Model on Non-IID Data in Federated Learning.
- .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Algorithms and Architectures for Parallel Processing (21st : 2021 : Online)
- Cham : Springer, 2022.
- Description
- Book — 1 online resource (757 pages)
- Summary
-
- Software Systems and Efficient Algorithms.- The Design and Realization of the Intelligent Drying Rack System Based on STM32.- Efficient Estimation of Time-Dependent Shortest Paths based on Shortcuts.- Multi-level PWB and PWC for Reducing TLB Miss Overheads on GPUs.- Hybrid GA-SVR: An Effective Way to Predict Short-term Traffic Flow.- Parallel and Distributed Algorithms and Applications.- MobiTrack: Mobile Crowdsensing-based Object Tracking with Min-Region and Max-Utility.- Faulty Processors Identification for Multiprocessor System under the PMC Model Using a Novel Binary Grey Wolf Optimizer.- Fast On-road Object Detector on ROS-based Mobile Robot.- A Lightweight Asynchronous I/O System for Non-Volatile Memory.- The Case for Disjoint Job Mapping on High-Radix Networked Parallel Computers.- FastCache: A Client-Side Cache With Variable-Position Merging Schema in Network Storage System.- An Efficient Parallelization Model for Sparse Non-negative Matrix Factorization Using cuSPARSE Library on Multi-GPU Platform.- HaDPA: A Data-Partition Algorithm for Data Parallel Applications on Heterogeneous HPC Platforms.- A NUMA-aware Parallel Truss Decomposition Algorithm for Large Scale Graphs.- A Large-scale Parallel Alignment Algorithm for SMRT Reads.- Square Fractional Repetition Codes for Distributed Storage Systems.- An Anti-forensic Method Based on RS Coding and Distributed Storage.- Data Science.-
- Predicting Consumers' Coupon-usage in E-commerce with Capsule Network.- A high-availability K-modes clustering method based on differential privacy.- A Strategy-based Optimization Algorithm to Design Codes for DNA Data Storage System.- Multi-Relational Hierarchical Attention for Top-k Recommendation.- Edge Computing and Edge Intelligence.- EdgeSP: Scalable Multi-Device Parallel DNN Inference on Heterogeneous Edge Clusters.- An Efficient Computation Offloading Strategy in Wireless Powered Mobile-Edge Computing Networks.- WiRD: Real-Time and Cross Domain Detection System on Edge device.- Deep Learning with Enhanced Convergence and its Application in MEC Task Offloading.- Dynamic Offloading and Frequency Allocation for Internet of Vehicles with Energy Harvesting.- SPACE : Sparsity Propagation based DCNN Training Accelerator on Edge.- Worker Recruitment Based on Edge-cloud Collaboration in Mobile Crowdsensing System.- Energy Efficient Deployment and Task Offloading for UAV-Assisted Mobile Edge Computing.- Blockchain Systems.- Research on Authentication and Key Agreement Protocol of Smart Medical Systems Based on Blockchain Technology.- CRchain: An Efficient Certificate Revocation Scheme Based on Blockchain.- Anonymous Authentication Scheme Based on Trust and Blockchain in VANETs.- BIPP: Blockchain-based Identity Privacy Protection Scheme in Internet of Vehicles for Remote Anonymous Communication.- Deep Learning Models and Applications.- Self-Adapted Frame Selection Module: Refine the Input Strategy for Video Saliency Detection.- Evolving Deep Parallel Neural Networks for Multi-Task Learning.- An Embedding Carrier-Free Steganography Method Based on Wasserstein GAN.- Design of Face Detection Algorithm Accelerator Based on Vitis.- FSAFA-stacking2: An Effective Ensemble Learning Model for Intrusion Detection with Firefly Algorithm Based Feature Selection.- Attention-based Cross-Domain Gesture Recognition using WiFi Channel State Information.- Font Transfer based on Parallel Auto-encoder for Glyph Perturbation via Strokes Moving.- A Novel GNN Model for Fraud Detection in Online Trading Activities.- IoT.- Non-Interactive Zero Knowledge Poof based Access Control in Information-Centric Internet of Things.- Simultaneous Charger Placement and Power Scheduling for On-Demand Provisioning of RF Wireless Charging Service.- A Cross-domain Authentication Scheme Based on Zero-knowledge Proof for Internet of Things.- NBUFlow: A Dataflow based Universal Task Orchestration and Offloading Platform for Low-cost Development of IoT Systems with Cloud-Edge-Device Collaborative.- IoT-GAN: Anomaly Detection for Time Series in IoT Based on Generative Adversarial Networks.- Freshness and Power Balancing Scheduling for Cooperative Vehicle-infrastructure System.- A Low Energy Consumption and Low Delay MAC Protocol Based on Receiver Initiation and Capture Effect in 5G IoT.- Building Portable ECG Classification Model
- with Cross-Dimension Knowledge Distillation.
- .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Algorithms and Architectures for Parallel Processing (21st : 2021 : Online)
- Cham, Switzerland : Springer, 2022.
- Description
- Book — 1 online resource (810 pages)
- Summary
-
- Blockchain Systems.- StateSnap: A State-Memorized P2P Storage Network for Blockchain NFT Content Data.- Towards Requester-Provider Bilateral Utility Maximization and Collision Resistance in Blockchain-based Microgrid Energy Trading.- Evaluating the Parallel Execution Schemes of Smart Contract Transactions in Different Blockchains: An Empirical Study.- Misbehavior Detection in VANET Based on Federated Learning and Blockchain.- Data Science.- ABE-AC4DDS: An Access Control Scheme based on Attribute-Based Encryption for Data Distribution Service.- An Interactive Visual System for Data Analytics of Social Media.- Auto-Recon: an Automated Network Reconnaissance System Based on Knowledge Graph.- INGCF: An Improved Recommendation Algorithm Based on NGCF.- Distributed and Network-based Computing.- AutoFlow: Hotspot-Aware, Dynamic Load Balancing for Distributed Stream Processing.- BMTP: Combining Backward Matching with Tree-based Pruning for Large-scale Content-based Pub/Sub Systems.- AF-TCP: Traffic Congestion Prediction at Arbitrary Road Segment and Flexible Future Time.- Collaborative QoS Prediction via Context-Aware Factorization Machine.- TDCT: Target-Driven Concolic Testing Using Extended Units by Calculating Function Relevance.- Multi-Task Allocation Based on Edge Interaction Assistance in Mobile Crowdsensing.- A Variable-way Address Translation Cache for the Exascale Supercomputer.- PPCTS: Performance Prediction-based Co-located Task Scheduling in Clouds.- Edge Computing and Edge Intelligence.- Risk-Aware Optimization of Distribution-based Resilient Task Assignment in Edge Computing.- Budget-aware Scheduling for Hyperparameter Optimization Process in Cloud Environment.- Workload Prediction and VM Clustering Based Server Energy Optimization in Enterprise Cloud Data Center.- Soft Actor-Critic-Based DAG Tasks Offloading in Multi-Access Edge Computing with Inter-User Cooperation.- Service Dependability and Security Algorithms.- Sensor Data Normalization among Heterogeneous Smartphones for Implicit Authentication.- Privacy-Preserving and Reliable Federated Learning.- Security Authentication of Smart Grid Based on RFF.- SEPoW: Secure and Efficient Proof of Work Sidechains.- A Spectral Clustering Algorithm Based on Differential Privacy Preservation.- A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme.- Robust Multi-Model Personalized Federated Learning via Model Distillation.- V-EPTD: A Verifiable and Efficient Scheme for Privacy-preserving Truth Discovery.- FedSP: Federated Speaker Verification with Personal Privacy Preservation.- Security Performance Analysis for Cellular Mobile Communication System with Randomly-Located Eavesdroppers.- Short and Distort: A New Manipulation as Opposed to Pump and Dump in the Cryptocurrency Market.- Privacy-preserving Swarm learning Based on Homomorphic Encryption.- Software Systems and Efficient Algorithms.- A modeling and verification method of Modbus TCP / IP protocol.- Completely Independent Spanning Trees in the Line Graphs of Torus Networks.- Adjusting OBSS/PD based on fuzzy logic to improve throughput of IEEE 802.11ax network.- Two-Stage Evolutionary Algorithm Using Clustering for Multimodal Multi-Objective Optimization with Imbalance Convergence and Diversity.- SLA: A Cache Algorithm for SSD-SMR Storage System with Minimum RMWs.- Trajectory Similarity Search with Multi-level Semantics.- Nonnegative Matrix Factorization Framework For disease-related CircRNA prediction.- A Fast Authentication and Key Agreement Protocol Based on Time-sensitive Token for Mobile Edge Computing.- Ferproof: A Constant Cost Range Proof Suitable for Floating-Point Numbers.- NEPG: Partitioning Large-Scale Power-Law Graphs.- Accelerating DCNNs via Cooperative Weight/Activation Compression.- PFA: performance and fairness-aware LLC partitioning method.- SGP: A Parallel Computing Framework for Supporting Distributed Structural Graph Clustering.- LIDUSA
- A Learned Index Structure for Dynamical Uneven Spatial Data.- Why is Your Trojan NOT Responding? A Quantitative Analysis of Failures in Backdoor Attacks of Neural Networks.- OptCL: A Middleware to Optimise Performance for High Performance Domain-Specific Languages on Heterogeneous Platforms.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.