Muutke küpsiste eelistusi

Algorithms and Architectures for Parallel Processing: 24th International Conference, ICA3PP 2024, Macau, China, October 2931, 2024, Proceedings, Part VI [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 336 pages, kõrgus x laius: 235x155 mm, 125 Illustrations, color; 18 Illustrations, black and white; XV, 336 p. 143 illus., 125 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 15256
  • Ilmumisaeg: 17-Feb-2025
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 981961550X
  • ISBN-13: 9789819615506
  • Pehme köide
  • Hind: 63,52 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 74,73 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 336 pages, kõrgus x laius: 235x155 mm, 125 Illustrations, color; 18 Illustrations, black and white; XV, 336 p. 143 illus., 125 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 15256
  • Ilmumisaeg: 17-Feb-2025
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 981961550X
  • ISBN-13: 9789819615506
The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 2931, 2024.





The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.
SteDM: Efficient Image Steganography With Diffusion Models.- BDFC:A New
Flow Control Mechanism for Torus Networks.- A Hybrid Vectorized Merge Sort on
ARM NEON.- An Encoder-based Framework for Privacy-preserving Machine
Learning.- Load Balancing Optimizations for Distributed GMRES
Algorithm.- ZKCross: An Efficient and Reliable Cross-chain Authentication
Scheme Based on Lightweight Attribute-based Zero-knowledge Proof.- LSSM-SpMM:
A Long-Row Splitting and Short-Row Merging Approach for Parallel SpMM on
PEZY-SC3s.- A Model Inference Attack based on Random Sampling in
DLaaS.- Defense Against Textual Backdoors via Elastic Weighted
Consolidation-based Machine Unlearning.- Cross-Chain Transaction Auditing
with Truth Discovery.- Exploring the Vulnerability of ECG-based
Authentication Systems through A Dictionary Attack Approach.-LBVP:
Lightweight Blockchain-based Vehicle Platooning Scheme for Secure and
Efficient Platoon Management.- Low-Carbon Geographically Distributed
Cloud-Edge Task Scheduling.- Integrating Blockchain, Smart Contracts, NFTs,
and IPFS for Enhanced Transparency and Ethical Sourcing in Coffee and Cocoa
Supply Chains.- The Role of Artificial Intelligence Technologies in
Sustainable Urban Development: A Systematic Survey.- Enhancing Privacy in
Machine Unlearning: Posterior Perturbation against Membership Inference
Attack.- PEbfs: Implement High-performance Breadth-first Search on
PEZY-SC3s.- Textual Data De-privatization Scheme Based on Generative
Adversarial Networks.-Modeling and Simulation Verification of Operating Mode
Switching of Train Control System Based on Train-to-Train
Communication.- Performance Evaluation of NLP Models for European Portuguese:
Multi-GPU/Multi-Node Configurations and Optimization Techniques.-
FusionFrame: A Fusion Dataflow Scheduling Framework for DNN Accelerators via
Analytical Modeling.