Muutke küpsiste eelistusi

E-raamat: Algorithms and Architectures for Parallel Processing: 25th International Conference, ICA3PP 2025, Zhengzhou, China, October 30-November 2, 2025, Proceedings, Part IV

Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 135,23 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The eight volume set, LNCS 16381-16388 constitutes the refereed proceedings of the 25th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2025, held in Zhengzhou, China, during October 30 -November 2, 2025.



The 158 full papers, 104 research papers and 48 session papers included in these proceedings were carefully reviewed and selected from 543 submissions. They focus on the following topical sections:



Part I : Parallel and Distributed Architectures; Software Systems and Programming Models.



Part II : Parallel and Distributed Algorithms and Applications.



Part III : Parallel and Distributed Algorithms and Applications; Internet of Things and Cyber-Physical-Social Computing; Performance Modeling and Evaluation.



Part IV : Service Dependability and Security in Distributed and Parallel Systems; Network Architectures and Algorithms.

Part V: Network Architectures and Algorithms.







Part VI: Parallel and Distributed Architectures; Software Systems and Programming Models; Parallel and Distributed Algorithms and Applications; Big Data Management and Analysis; Performance Modeling and Evaluation.







Part VII: Service Dependability and Security in Distributed and Parallel Systems; Network Architectures and Algorithms; Internet of Things and Cyber-Physical-Social Computing.







Part VIII: Intelligent Distributed Computing; Resource Coordination and Joint Optimization in Cloud-Edge-End Systems; Symbiotic AI and Data Ecosystems; Smart Education Powered by Parallel and Distributed Processing; AI for Networks and Networking for AI; Emerging Network Technologies in Computing and Networking Convergence.
.- Service Dependability and Security in Distributed and Parallel
Systems.
.- M2C: A Blockchain-Based Certificate Batching Architecture for
Software-Defined Networks.
.- PacketMorph: Generation of Recoverable Adversarial Packets against
Encrypted Traffic Classification via Class-wise Universal Perturbation.
.- DecFLLM: A Privacy-Preserving Fine-Tuning Framework for Federated Large
Language Models via Adapter Decomposition.
.- Reinforcement Learning-Based Autonomous Collision Avoidance for Ships in
Realistic Physical Environments.
.- IDSF: A Cross-Domain Data Trustworthy Sharing Framework for Large-Scale
IIoT with Integrated DID and Enhanced PBFT Algorithm.
.- Are Relay Chains Practically Deployable? Trusted Behavior Dynamics via
Evolutionary Games.
.- Multi-Task Learning for HDD Failure Prediction in Heterogeneous Storage
Systems.
.- A Dual Personalized Clustering-Based Defense Against Composite Poisoning
Attacks in Federated Learning.
.- Index-Free Searchable Symmetric Encryption for Full-Text Substring
Search.
.- A Weakly Centralized Hierarchical Sensitive Data Sharing Scheme Based on
Edge Computing.
.- A Lightweight E-Health Data Access Control Scheme in Fog Computing.
.- Hawk: Saturation Attack Detection Based on Structured Spatial Interactions
and Temporal Dependencies-Guided Graph Learning in SDN.
.- RoboClarify: Clarifying Ambiguous Instructions Through Scenario-Guided
Risk Assessment for Home Embodied Agents.
.- Pistis: Enabling Secure Interoperability Across Unobservable Permissioned
Blockchains.
.- HBCA: Healthcare-Oriented Blockchain-Assisted Cross-Domain
Authentication.
.- HeRF-AD: Robust Anomaly Detection for Software Systems via Heterogeneous
Representation Fusion.
.- Defending Backdoor Attacks in Visual Pre-Trained Models with Group L1/2
Regularization and Knowledge Distillation.
.- LIME-Enhanced Insider Threat Detection for Distributed Security Systems.
.- Graph Representation Learning via Generative-Contrastive Fusion for
Advanced Persistent Threat Detection.
.- zkGCN: Zero-Knowledge Based Verifiable Inference for Graph Convolutional
Networks.
.- A GAN-Integrated Framework for Fileless Attack Provenance.
.- EPOMTA: Efficient and Privacy-preserving online Multi-Task Allocation in
Mobile Crowdsourcing.
.- Multiscale Deep Neural Network Intrusion Detection Model Based on
Denoising Feature Selection with EQLv2.
.- TriDA: Triangular Fuzzy Double Auction for Efficient and Accurate
Task-Worker Matching in Blockchain-Based Crowdsourcing.
.- An Anonymous, Certificateless, and Multi-Receiver Aggregate Signcryption
Scheme without Secure Channel in VANETs.
.- Network Architectures and Algorithms.
.- Ditto: A Flexible Transmission Control Mechanism for Diverse User Demands
and Network Conditions.
.- Decentralized Multi-UAV Trajectory Optimization for Cooperation in
Wireless Charging Networks.
.- Mitigating Hash Polarization with Flow-Level Load Balancing in Leaf-Spine
Data Center Network.
.- QoS-Aware Hybrid Routing for LEO Satellite Networks: Dynamic Path
Allocation and Partitioning-Based Optimization.
.- Hybrid Swarm Intelligence-Based Path Planning for Mobile Nodes in DTN over
Complex Terrains.
.- 6RLD: A Seedless Region Active IPv6 Address Dynamic Detection Method Based
on Large Language Model and RAG Technology.
.- DFNets: An Indoor Localization Model Based on Fresnel Clustering Fusion.