標(biāo)題: Titlebook: Algorithms and Architectures for Parallel Processing; 20th International C Meikang Qiu Conference proceedings 2020 Springer Nature Switzerl [打印本頁(yè)] 作者: ALLY 時(shí)間: 2025-3-21 17:37
書(shū)目名稱(chēng)Algorithms and Architectures for Parallel Processing影響因子(影響力)
書(shū)目名稱(chēng)Algorithms and Architectures for Parallel Processing影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Algorithms and Architectures for Parallel Processing網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Algorithms and Architectures for Parallel Processing網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Algorithms and Architectures for Parallel Processing被引頻次
書(shū)目名稱(chēng)Algorithms and Architectures for Parallel Processing被引頻次學(xué)科排名
書(shū)目名稱(chēng)Algorithms and Architectures for Parallel Processing年度引用
書(shū)目名稱(chēng)Algorithms and Architectures for Parallel Processing年度引用學(xué)科排名
書(shū)目名稱(chēng)Algorithms and Architectures for Parallel Processing讀者反饋
書(shū)目名稱(chēng)Algorithms and Architectures for Parallel Processing讀者反饋學(xué)科排名
作者: Contort 時(shí)間: 2025-3-21 21:53 作者: FACET 時(shí)間: 2025-3-22 02:03 作者: oxidize 時(shí)間: 2025-3-22 07:02 作者: Robust 時(shí)間: 2025-3-22 09:11
Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Treety auditor. Existing schemes are mostly limited to scalability barrier and search efficiency of blockchain, which restricts their capability to support large-scale application. To address the problem above, we propose a blockchain based integrity verification scheme for large-scale cloud data using 作者: hypnotic 時(shí)間: 2025-3-22 14:28
IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing We propose an Access Control Scheme supporting Informal non-Malleable security (IM-ACS) for mobile media. In our scheme, Attribute Based Encryption method is applied to bring de-couple and fine-grain features when publishers share their media data with subscribers. All-or-Nothing transfer method is 作者: gonioscopy 時(shí)間: 2025-3-22 19:35 作者: Occupation 時(shí)間: 2025-3-22 22:05 作者: enhance 時(shí)間: 2025-3-23 03:21 作者: LAPSE 時(shí)間: 2025-3-23 06:36
An Attack-Immune Trusted Architecture for Supervisory Intelligent Terminalminals and so on will face huge secure pressure. For that reason, this paper presents a supervisory control architecture based on secure SOC system with attack-immune and trustworthiness for intelligent terminals, which possesses ability for dynamic integrity measurement (DIM) without interference a作者: 男生戴手銬 時(shí)間: 2025-3-23 10:14
A Simulation Study on Block Generation Algorithm Based on TPS Modeln not meet the performance requirements of large-scale and high concurrency in application reality. A polling discrete event simulation platform is designed to investigate the performance of PoW based block generation algorithm. The operation of block generation algorithm is simulated from three asp作者: Commentary 時(shí)間: 2025-3-23 15:38 作者: LAVE 時(shí)間: 2025-3-23 20:44 作者: 揉雜 時(shí)間: 2025-3-23 22:44
Profiling-Based Big Data Workflow Optimization in a Cross-layer Coupled Design Frameworkta workflows is now commonly supported on reliable and scalable data storage and computing platforms such as Hadoop. There are a variety of factors affecting workflow performance across multiple layers of big data systems, including the inherent properties (such as scale and topology) of the workflo作者: concentrate 時(shí)間: 2025-3-24 04:59 作者: 肉身 時(shí)間: 2025-3-24 07:51
Behavioral Fault Modelling and Analysis with BIP: A Wheel Brake System Case?Studyponents and connectors. Behavioral fault modelling and analysis refers to an integration of model based system design and safety analysis. In this paper, we integrate fault tree based safety analysis into BIP model and apply statistical model checking to verify system specification and calculate pro作者: nonsensical 時(shí)間: 2025-3-24 11:53 作者: 串通 時(shí)間: 2025-3-24 15:23 作者: Intact 時(shí)間: 2025-3-24 20:08
Algorithms and Architectures for Parallel Processing978-3-030-60248-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: heartburn 時(shí)間: 2025-3-25 01:01
Funktion und St?rung des Sakkulusn the transaction, it is necessary to effectively protect private information such as identity and transaction content through technical means. This survey investigates privacy-preserving techniques commonly used in cryptocurrencies, and comparatively analyzes the advantages and disadvantages of dif作者: 刀鋒 時(shí)間: 2025-3-25 06:36
Die vertikale Reizung der Otolithenorganechain. To address this issue, we propose a lightning network-blockchain FSM system. Our approach guarantees data authenticity by utilizing the technical characteristics of blockchain (e.g., tamper-resistant and traceability). We use lightning network to solve the throughput bottleneck issue in order作者: 收到 時(shí)間: 2025-3-25 10:32 作者: magnanimity 時(shí)間: 2025-3-25 13:50
https://doi.org/10.1007/978-3-322-93218-1ix factorization) mostly focuses on structural anomalies, without taking node descriptions or labels seriously into account. However, such information is obviously valuable for detecting anomalous nodes and links. On the other hand, network representation learning aims to represent the nodes and lin作者: ALE 時(shí)間: 2025-3-25 17:13 作者: CAMEO 時(shí)間: 2025-3-25 22:27
Ulrich Mückenberger,Marcus MenzlWe propose an Access Control Scheme supporting Informal non-Malleable security (IM-ACS) for mobile media. In our scheme, Attribute Based Encryption method is applied to bring de-couple and fine-grain features when publishers share their media data with subscribers. All-or-Nothing transfer method is 作者: 無(wú)孔 時(shí)間: 2025-3-26 03:49
https://doi.org/10.1007/978-3-322-93218-1cryptography. We leverage broadcast encryption, key regression, data privacy classification, blockchain and smart contract holistically to address such a challenge. In our design, a patient’s medical records are divided into multiple parts with different sensitivities according to personal privacy r作者: 6Applepolish 時(shí)間: 2025-3-26 06:47
Volker Hielscher,Eckart Hildebrandth)-based blockchain system is deemed to be a potential solution to addressing both issues. However, constructing consensus protocol to meet the requirement of the consistency in a networked environment is an unsolved challenge. In this paper, we propose a novel DAG-oriented consensus mechanism. Spec作者: BOOST 時(shí)間: 2025-3-26 11:40
https://doi.org/10.1007/978-3-662-67710-0e the efficiency is to exploit shared memory facilities provided by the hypervisor or the host domain to bypass traditional network path for co-located VMs. Thus it is important to be capable of determining whether two VMs are co-located on the same physical node or not. Existing approaches employ e作者: 脆弱么 時(shí)間: 2025-3-26 13:37 作者: packet 時(shí)間: 2025-3-26 20:50 作者: nostrum 時(shí)間: 2025-3-26 23:18 作者: mastopexy 時(shí)間: 2025-3-27 05:03
https://doi.org/10.1007/978-3-0348-6724-5lusters is not guaranteed well. Based on our previous work, this paper proposes a big data cluster attack detection method based on Machine Learning. This method extracts 46 types of features related to the execution of cluster tasks, which solves the problem that the existing detection scheme has f作者: Spartan 時(shí)間: 2025-3-27 05:51 作者: Creatinine-Test 時(shí)間: 2025-3-27 10:25
Thorsten Teichert,Cordelia Mühlbachata is beneficial in many applications. In this paper, a novel concept called loose tracking behavior is proposed to investigate the problem of detecting objects that travel together with a target. We develop two algorithms to solve the problem. The first one is a straightforward approach and the se作者: Offset 時(shí)間: 2025-3-27 15:24 作者: DAFT 時(shí)間: 2025-3-27 20:50 作者: 昏迷狀態(tài) 時(shí)間: 2025-3-27 22:03 作者: Legion 時(shí)間: 2025-3-28 05:07
https://doi.org/10.1007/978-3-030-60248-2artificial intelligence; computer hardware; computer networks; computer science; computer security; compu作者: 叫喊 時(shí)間: 2025-3-28 09:48 作者: GRIPE 時(shí)間: 2025-3-28 14:25 作者: Salivary-Gland 時(shí)間: 2025-3-28 14:37
Ulrich Mückenberger,Marcus Menzlused to ensure the efficiency when publishers encrypt their media data before upload it onto cloud server. The method of re-encryption on cloud is adopted to ensure that subscribers cannot obtain any acknowledge from the previous data accesses unless publisher allow them to. This scheme is analyzed to be secure.作者: 復(fù)習(xí) 時(shí)間: 2025-3-28 19:34 作者: 蒸發(fā) 時(shí)間: 2025-3-28 23:42 作者: 噱頭 時(shí)間: 2025-3-29 06:51 作者: giggle 時(shí)間: 2025-3-29 08:15
Conference proceedings 2020or Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020...The total of 142 full papers and 5 short papers included in this proceedings volumes was carefully reviewed and selected from 495 submissions...ICA3PP is covering the many dimensions of parallel algorithms and architec作者: 索賠 時(shí)間: 2025-3-29 12:18
https://doi.org/10.1007/978-3-322-93218-1data parts. With such a mechanism, we can enforce strict access and privacy control on medical data. Furthermore, we use Ethereum blockchain to connect various institutions to provide efficient data sharing, and we design smart contracts to implement the business logic of medical data sharing.作者: capillaries 時(shí)間: 2025-3-29 19:23 作者: 鎮(zhèn)痛劑 時(shí)間: 2025-3-29 22:17 作者: 鳴叫 時(shí)間: 2025-3-30 00:49 作者: 高調(diào) 時(shí)間: 2025-3-30 06:33
Detection of Loose Tracking Behavior over Trajectory Datacond one is an improved algorithm where we develop a prefix tree index structure for the trajectories encoded by Geohash to enhance the detection efficiency. Finally, the effectiveness of the proposed concepts and the efficiency of the approaches are validated by extensive experiments based on real trajectory datasets.作者: 尖牙 時(shí)間: 2025-3-30 12:17
Design of Six-Rotor Drone Based on Target Detection for Intelligent Agricultureerry with a trained deep learning model could identify the area of plants with diseases through an intelligent camera, and control the drone hovering and spraying pesticide. Experimental results show that the proposed drone have good grades in identifying the area of plants with diseases and automatic spraying.作者: 不吉祥的女人 時(shí)間: 2025-3-30 14:44 作者: 入會(huì) 時(shí)間: 2025-3-30 18:10 作者: AVANT 時(shí)間: 2025-3-30 21:40 作者: reject 時(shí)間: 2025-3-31 03:05 作者: 有斑點(diǎn) 時(shí)間: 2025-3-31 08:46 作者: Emmenagogue 時(shí)間: 2025-3-31 13:09
Understanding Privacy-Preserving Techniques in Digital Cryptocurrenciesecond, we investigate mainstream privacy preserving techniques, such as Mixer, Homomorphic Encryption, and State Channel. Specially, we focus on the development of Zero-Knowledge Proof schemes and analyze current defects. Finally, the future direction of blockchain privacy protection technology is prospected.作者: 同來(lái)核對(duì) 時(shí)間: 2025-3-31 15:12
Blockchain Meets DAG: A BlockDAG Consensus Mechanism in DAG can be achieved on new formed blocks through running the proposed global ordering scheme and block mergence operations. Blockchain-related functions can be retrieved from splitting merged blocks.