Atnaujinkite slapukų nuostatas

El. knyga: Algorithms and Architectures for Parallel Processing: 24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024, Proceedings, Part V

Edited by , Edited by , Edited by
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 15255
  • Išleidimo metai: 16-Feb-2025
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9789819615483
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 15255
  • Išleidimo metai: 16-Feb-2025
  • Leidėjas: Springer Nature Switzerland AG
  • Kalba: eng
  • ISBN-13: 9789819615483

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 2931, 2024.





The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.
An Enhanced Intrusion Detection Method Combined with Contrastive
Federated Learning.- Black-Box Adversarial Attack Against Transformer-Based
Object Detection Models in Vehicular Networks.- FedADDP: Privacy-Preserving
Personalized Federated Learning with Adaptive Dimensional Differential
Privacy.- DP-CLMI: Differentially Private Contrastive Learning against
Membership Inference Attack.- DT-UPD: User Privacy Data Protection through
Distribution Transformation in Unlearning Cloud Service.- Deduplication and
Approximate Analytics for Encrypted IoT Data in Fog-assisted Cloud
Storage.- Encrypted Malware Traffic Detection Via Time-Frequency Domain
Analysis.- Behavior-Driven Encrypted Malware Detection with Robust Traffic
Representation.- Optimizing Self-Training Sample Selection for Euphemism
Detection in Special Scenarios.- Modal-Centric Insights into Multimodal
Federated Learning for Smart Healthcare: A Survey.- Heterogeneous Graph
Modeling for Resource-Aware Prediction of DRL Training Time.- A Comprehensive
Review on Deep Learning System Testing.- CIGraph: Accelerating Graph Queries
Over Database with Compressed Index.- Language-based Colorization with Sparse
Attention and Multi-Scale Cross-Modal Semantic Alignment.- A Power Monitoring
Framework of a Post-Quantum Cryptography Web Server.- A Lightweight Detection
Scheme for Black-Hole Attacks and Gray-Hole Attacks in VANETs.- Federated
Meta Continual Learning for Efficient and Autonomous Edge
Inference.- Progressive Multiscale Attention Network for Diabetic
Retinopathy.- FPIM: Fair and Privacy-Preserving Incentive Mechanism in Mobile
Crowdsensing.- DRL-Based UAV Collaborative Task Offloading for Post-Disaster
Scenarios.- Who is being impersonated? Deepfake Audio Detection and
Impersonated Identification via Extraction of Id-specific Features.- Review
of Incentive Mechanisms of Differential Privacy based Federated Learning
Protocols: From the Economics and Game Theoretical Perspectives.