Muutke küpsiste eelistusi

Algorithms and Architectures for Parallel Processing: 23rd International Conference, ICA3PP 2023, Tianjin, China, October 2022, 2023, Proceedings, Part II 2024 ed. [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 504 pages, kõrgus x laius: 235x155 mm, 170 Illustrations, color; 21 Illustrations, black and white; XXI, 504 p. 191 illus., 170 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 14488
  • Ilmumisaeg: 01-Mar-2024
  • Kirjastus: Springer Nature
  • ISBN-10: 9819708001
  • ISBN-13: 9789819708000
  • Pehme köide
  • Hind: 76,49 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 89,99 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 504 pages, kõrgus x laius: 235x155 mm, 170 Illustrations, color; 21 Illustrations, black and white; XXI, 504 p. 191 illus., 170 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 14488
  • Ilmumisaeg: 01-Mar-2024
  • Kirjastus: Springer Nature
  • ISBN-10: 9819708001
  • ISBN-13: 9789819708000

The 7-volume set LNCS 14487-14493 constitutes the proceedings of the 23rd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2023, which took place in Tianjin, China, during October, 2023.

The 145 full papers included in this book were carefully reviewed and selected from 439 submissions. ICA3PP covers many dimensions of parallel algorithms and architectures; encompassing fundamental theoretical approaches; practical experimental projects; and commercial components and systems.


LearnedSync A Learning-based Sync Optimization for Cloud
Storage.- Optimizing CSR-Based SpMV on a New MIMD Architecture
Pezy-SC3s.- Cyber Attack Detection Method for Networked Vehicles based on
Data-Enhanced DBN.- A Multi-Source Domain Adaption Approach to Minority Disk
Failure Prediction.- Sequenced Quantization RNN Offloading for Dependency
Task in Mobile Edge Computing.- KylinArm An Arm Gesture Recognition System
for Mobile Devices.- FCSO Source Code Summarization by Fusing Multiple Code
Features and Ensuring Self-consistency Output.- Graph Structure
Learning-based Compression Meth-od for Convolutional Neural
Networks.- Reliability-Aware VNF Provisioning in Homogeneous and
Heterogeneous Multi-Access Edge Computing.- Approximate Query Processing
based on Approximate Materialized View.- Schema Integration on Massive Data
Sources.- A Hybrid Few-Shot Learning based Intrusion Detection Method for
Internet of vehicles.- Noise-robust Gaussian distribution based imbalanced
oversampling.- LAST An Efficient In-Place Static Binary Translator for RISC
architectures.- Personalized Privacy Risk Assessment Based on Deep Neural
Network for Image Sharing on Social Networks.- A Pipelined AES and SM4
Hardware Implementation for Multi-Tasking Virtualized
Environments.- Blockchain-Assisted Privacy-Preserving Public Auditing Scheme
for Cloud Storage Systems.- MANet: An Architecture Adaptive Method for Sparse
Matrix Format Selection.- Service-Aware Cooperative Task Offloading and
Scheduling in Multi-Access Edge Computing Empowered IoT.- Dynamic Multi-Bit
Parallel Computing Method Based on Reconfigurable Structure.- A Heuristic
Method for Data Allocation and Task Scheduling on Heterogeneous
Multiprocessor Systems under Memory Constraints.- ACDP-Floc: An Adaptive
Clipping Differential Privacy Federation Learning Method For Wireless Indoor
Localization.- Label-only Membership Inference Attack Against Federated
Distillation.- Efficient proactive resource allocation for multi-stage
cloud-native microservices.- Reliable Function Computation Offloading in
Cloud-edge Collaborative Network.- A Fast, Reliable, Adaptive Multi-hop
Broadcast Scheme for Vehicular Ad Hoc Networks.- A Grouping-Based Multi-Task
Scheduling Strategy with Deadline Constraint on Heterogeneous Edge
Computing.- Real-time Driver Fatigue Detection Method Based on Comprehensive
Facial Features.