Atnaujinkite slapukų nuostatas

El. knyga: Algorithms and Architectures for Parallel Processing: 24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024, Proceedings, Part I

Edited by , Edited by , Edited by
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 15251
  • Išleidimo metai: 16-Feb-2025
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9789819615254
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 15251
  • Išleidimo metai: 16-Feb-2025
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9789819615254

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 2931, 2024.





The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.
Fake News Detection across Multiple Domains Using Fuzzy Association
Rules.- A Scheme of Dynamic Location Privacy-preserving with Blockchain in
Intelligent Transportation System.- DBFIA: Diffusion-Based Face Image
Anonymization.- A Modular Sharing Scheme for EMRs Using Consortium Blockchain
and Proxy Re-Encryption.- PFDF: Privacy Preserving Federated Decision Forest
for Classification.- Data-Free Encoder Stealing Attack in Self-supervised
Learning.- Data Poisoning Attack against Reinforcement Learning from Human
Feedback in Robot Control Tasks.- A Mini-Model Can Make Machine Unlearning
Better.- BlockWhisper: A Blockchain-based Hybrid Covert Communication Scheme
with Strong Ability to Avoid Detection.- A Verifiable Decentralized Data
Modification Mechanism Supporting Accountability for Securing Industrial
IoT.- A Comprehensive Scheme for Transaction and Fund Tracing in Distributed
Anonymous Transactions.- AutoMiner: Reinforcement Learning-Based Mining
Attack Simulator.- FedSV: A Privacy-preserving Byzantine-robust Federated
Learning Scheme with Self-Validation.- A Dual-Defense Self-Balancing
Framework against Bilateral Model Attacks in Federated Learning.- PrivARM:
Privacy-preserving Association Rule Mining in the Cloud.- Outliers are Real:
Detecting VLM-generated Images via One-class Classification.- TSformer: A
Transformer-Based Model Focusing Specifically on the Fusion of
Temporal-Spatial Features for Traffic Forecasting.- Temperature-Based
Watermarking and Detection for Large Language Models.- CPAKE: Dynamic Batch
Authenticated Key Exchange with Conditional Privacy.- Certificate-based
Transport Layer Security Encrypted Malicious Traffic Detection in Real-time
Network Environments.- MAP-SIM: A Performance Model for Shared-Memory
Heterogeneous Systems with Mapping Awareness.- A Vectorized Sequence-to-graph
Alignment Algorithm.