libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro
ARGOMENTO:  BOOKS > INFORMATICA > TESTI GENERALI

zhu tianqing (curatore); li jin (curatore); castiglione aniello (curatore) - algorithms and architectures for parallel processing
Zoom

Algorithms and Architectures for Parallel Processing 24th International Conference, ICA3PP 2024, Macau, China, October 29–31, 2024, Proceedings, Part V

; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
71,98 €
NICEPRICE
68,38 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 02/2025





Trama

The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 29–31, 2024.

The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.





Sommario

An Enhanced Intrusion Detection Method Combined with Contrastive Federated Learning.- Black-Box Adversarial Attack Against Transformer-Based Object Detection Models in Vehicular Networks.- FedADDP: Privacy-Preserving Personalized Federated Learning with Adaptive Dimensional Differential Privacy.- DP-CLMI: Differentially Private Contrastive Learning against Membership Inference Attack.- DT-UPD: User Privacy Data Protection through Distribution Transformation in Unlearning Cloud Service.- Deduplication and Approximate Analytics for Encrypted IoT Data in Fog-assisted Cloud Storage.- Encrypted Malware Traffic Detection Via Time-Frequency Domain Analysis.- Behavior-Driven Encrypted Malware Detection with Robust Traffic Representation.- Optimizing Self-Training Sample Selection for Euphemism Detection in Special Scenarios.- Modal-Centric Insights into Multimodal Federated Learning for Smart Healthcare: A Survey.- Heterogeneous Graph Modeling for Resource-Aware Prediction of DRL Training Time.- A Comprehensive Review on Deep Learning System Testing.- CIGraph: Accelerating Graph Queries Over Database with Compressed Index.- Language-based Colorization with Sparse Attention and Multi-Scale Cross-Modal Semantic Alignment.- A Power Monitoring Framework of a Post-Quantum Cryptography Web Server.- A Lightweight Detection Scheme for Black-Hole Attacks and Gray-Hole Attacks in VANETs.- Federated Meta Continual Learning for Efficient and Autonomous Edge Inference.- Progressive Multiscale Attention Network for Diabetic Retinopathy.- FPIM: Fair and Privacy-Preserving Incentive Mechanism in Mobile Crowdsensing.- DRL-Based UAV Collaborative Task Offloading for Post-Disaster Scenarios.- Who is being impersonated? Deepfake Audio Detection and Impersonated Identification via Extraction of Id-specific Features.- Review of Incentive Mechanisms of Differential Privacy based Federated Learning Protocols: From the Economics and Game Theoretical Perspectives.











Altre Informazioni

ISBN:

9789819615476

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XV, 342 p. 100 illus., 85 illus. in color.
Pagine Arabe: 342
Pagine Romane: xv


Dicono di noi