標題: Titlebook: Algorithms and Architectures for Parallel Processing; 23rd International C Zahir Tari,Keqiu Li,Hongyi Wu Conference proceedings 2024 The Ed [打印本頁] 作者: introspective 時間: 2025-3-21 16:15
書目名稱Algorithms and Architectures for Parallel Processing影響因子(影響力)
書目名稱Algorithms and Architectures for Parallel Processing影響因子(影響力)學科排名
書目名稱Algorithms and Architectures for Parallel Processing網(wǎng)絡公開度
書目名稱Algorithms and Architectures for Parallel Processing網(wǎng)絡公開度學科排名
書目名稱Algorithms and Architectures for Parallel Processing被引頻次
書目名稱Algorithms and Architectures for Parallel Processing被引頻次學科排名
書目名稱Algorithms and Architectures for Parallel Processing年度引用
書目名稱Algorithms and Architectures for Parallel Processing年度引用學科排名
書目名稱Algorithms and Architectures for Parallel Processing讀者反饋
書目名稱Algorithms and Architectures for Parallel Processing讀者反饋學科排名
作者: Nomogram 時間: 2025-3-21 23:59
,Joint Controller Placement and?Flow Assignment in?Software-Defined Edge Networks,lers are enabled to centralize network configuration and management. However, frequent flow fluctuations at the edge can result in a large backlog of local flow requests in the processing queue of the controllers, leading to high response delays. Although optimized controller placement and assignmen作者: 漂白 時間: 2025-3-22 03:22
,Distributed Latency-Efficient Beaconing for?Multi-channel Asynchronous Duty-Cycled IoT Networks,f Minimum Latency Beaconing Schedule (MLBS), which tries to obtain a fastest and collision-free schedule is not well studied when the IoT devices employ the duty-cycled working mode. The existing works have rigid assumptions that there exists a single channel in networks, and can only work in a cent作者: Frequency 時間: 2025-3-22 04:54 作者: 抒情短詩 時間: 2025-3-22 11:44
,SMCoEdge: Simultaneous Multi-server Offloading for?Collaborative Mobile Edge Computing,applications. However, current approaches typically perform offline task partitioning and offload each subtask to an Edge Server (ES) for processing. This leads to varying delays in subtask processing across different ESs, resulting in a high make-span of task offloading. To address this issue, we p作者: 高原 時間: 2025-3-22 13:14
,Image Inpainting Forensics Algorithm Based on?Dual-Domain Encoder-Decoder Network,inted images, which pose serious security issues. At present, there are relatively few forensic works on image inpainting. Moreover, there is a problem of poor generalization. Therefore, This paper proposes a dual-domain encoder-decoder network (DDEDNet) based on different input types, which is a tw作者: 棲息地 時間: 2025-3-22 20:08 作者: incision 時間: 2025-3-22 22:38
,FRAIM: A Feature Importance-Aware Incentive Mechanism for?Vertical Federated Learning,dering the selfishness of organizations, they will not participate in federated learning without compensation. To address this problem, in this paper, we design a feature importance-aware vertical federated learning incentive mechanism. We first synthesize a small amount of data locally using the in作者: LIMIT 時間: 2025-3-23 02:15 作者: 者變 時間: 2025-3-23 06:52 作者: 狗窩 時間: 2025-3-23 09:42 作者: 誓言 時間: 2025-3-23 16:58
,Efficiently Running SpMV on?Multi-core DSPs for?Banded Matrix, digital signal processors (DSPs) in high performance computing (HPC) systems, optimizing SpMV on these platforms has been largely overlooked. This paper introduces the FT-M7032, a new CPU-DSP heterogeneous processor multi-core platform for high-performance computing. The FT-M7032 provides programma作者: Irascible 時間: 2025-3-23 18:46
,SR-KGELS: Social Recommendation Based on?Knowledge Graph Embedding Method and?Long-Short-Term Repre) have gained popularity in social-based recommender systems due to their inherent integration of node information and topology. However, most research has focused on how to deeply model users using various datasets, with less emphasis on item relationships. Furthermore, users’ changing interests ov作者: 有權(quán) 時間: 2025-3-23 23:42
,CMMR: A Composite Multidimensional Models Robustness Evaluation Framework for?Deep Learning,mainstream evaluation standards, which fail to account for the discrepancies in evaluation results arising from different adversarial attack methods, experimental setups, and metrics sets. To address these disparities, we propose the Composite Multidimensional Model Robustness (CMMR) evaluation fram作者: 完成才會征服 時間: 2025-3-24 03:03
,Efficient Black-Box Adversarial Attacks with?Training Surrogate Models Towards Speaker Recognition ess of DNNs to launch adversarial attacks. Previous studies generate adversarial examples by injecting the human-imperceptible noise into the gradients of audio data, which is termed as white-box attacks. However, these attacks are impractical in real-world scenarios because they have a high depende作者: AV-node 時間: 2025-3-24 08:11
,SW-LeNet: Implementation and?Optimization of?LeNet-1 Algorithm on?Sunway Bluelight II Supercomputeretwork structures become more complex, and the number of parameters for training becomes larger and larger. The parallelization of convolutional neural network algorithms on multicore or many-core processors is essential for training convolutional neural networks. In this paper, we propose a paralle作者: 畸形 時間: 2025-3-24 13:30 作者: beta-carotene 時間: 2025-3-24 14:56 作者: armistice 時間: 2025-3-24 21:25
,Explaining Federated Learning Through Concepts in?Image Classification,ng a machine learning paradigm for future AI development. In recent years, federated learning has evolved in research areas such as security, model aggregation, and incentive mechanisms. However, the direction of interpretability of the model in the federated learning framework has not been explored作者: Hyperopia 時間: 2025-3-25 01:20
Algorithms and Architectures for Parallel Processing978-981-97-0808-6Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 推測 時間: 2025-3-25 03:20 作者: strdulate 時間: 2025-3-25 08:07
978-981-97-0807-9The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: blackout 時間: 2025-3-25 14:24
Gestaltung von Handelsauftritten im Internetisting encryption-based retrieval approaches are limited by the significant computational overhead and merely support precise query, which might fail to handle the incomplete keywords and misspellings in the query. To achieve both query efficiency and privacy-preserving for large-scale data, this pa作者: 承認 時間: 2025-3-25 17:21
Der Handel im Informationszeitalterlers are enabled to centralize network configuration and management. However, frequent flow fluctuations at the edge can result in a large backlog of local flow requests in the processing queue of the controllers, leading to high response delays. Although optimized controller placement and assignmen作者: restrain 時間: 2025-3-25 20:15 作者: 角斗士 時間: 2025-3-26 01:34
https://doi.org/10.1007/978-3-642-99929-1egy. Recent research works have increasingly focused on exploring task allocation scenarios that are more realistic and specific, involving heterogeneous tasks and participants, and often incorporating multi-objective optimization techniques. In this paper, we consider the spatial-temporal sensing p作者: 磨碎 時間: 2025-3-26 05:54 作者: 軍械庫 時間: 2025-3-26 08:35
https://doi.org/10.1007/978-3-642-99929-1inted images, which pose serious security issues. At present, there are relatively few forensic works on image inpainting. Moreover, there is a problem of poor generalization. Therefore, This paper proposes a dual-domain encoder-decoder network (DDEDNet) based on different input types, which is a tw作者: Spinal-Fusion 時間: 2025-3-26 15:52 作者: cringe 時間: 2025-3-26 19:31 作者: 污點 時間: 2025-3-26 22:09 作者: entrance 時間: 2025-3-27 03:43
Klinische Untersuchungsmethoden der Faeces,by poisoning the training dataset with trigger-embedded malicious samples during learning. Current defense methods against GNN backdoor are not practical due to their requirement for access to the GNN parameters and training samples. To address this issue, we present a .ack-b.x .NN .ckdoor .efense s作者: STALE 時間: 2025-3-27 06:32 作者: ORE 時間: 2025-3-27 12:32 作者: Ceremony 時間: 2025-3-27 15:05 作者: 喃喃而言 時間: 2025-3-27 17:54
https://doi.org/10.1007/978-3-642-91000-5mainstream evaluation standards, which fail to account for the discrepancies in evaluation results arising from different adversarial attack methods, experimental setups, and metrics sets. To address these disparities, we propose the Composite Multidimensional Model Robustness (CMMR) evaluation fram作者: 鞭子 時間: 2025-3-27 22:09 作者: Inordinate 時間: 2025-3-28 06:06
Die Gase des Organismus und ihre Analyse,etwork structures become more complex, and the number of parameters for training becomes larger and larger. The parallelization of convolutional neural network algorithms on multicore or many-core processors is essential for training convolutional neural networks. In this paper, we propose a paralle作者: 確定無疑 時間: 2025-3-28 07:52
https://doi.org/10.1007/978-3-642-91001-2veloped rapidly. While smart contracts are widely used in blockchain, they also face more and more security risks, and smart contract vulnerability detection becomes more and more important. Therefore, aiming at the problems that the existing bytecode-based vulnerability multi-label detection method作者: 細胞膜 時間: 2025-3-28 12:18 作者: Obscure 時間: 2025-3-28 15:28 作者: 思考而得 時間: 2025-3-28 19:33
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/a/image/153082.jpg作者: 劇本 時間: 2025-3-29 02:43 作者: 衰弱的心 時間: 2025-3-29 03:39 作者: 執(zhí)拗 時間: 2025-3-29 08:32
0302-9743 wed and selected from 439 submissions.?ICA3PP covers the many dimensions of parallel algorithms and architectures; encompassing fundamental theoretical approaches; practical experimental projects; and commercial components and systems..978-981-97-0807-9978-981-97-0808-6Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: SLAG 時間: 2025-3-29 13:54
https://doi.org/10.1007/978-3-642-99929-1roperties of the tasks and the participants, and design a novel .ulti-objective .ulti-task allocation scheme with .obility .rediction(M3P). Experiments on the real-world dataset validate the effectiveness of our proposed methods compared against baselines.作者: 提名的名單 時間: 2025-3-29 18:49 作者: 輕而薄 時間: 2025-3-29 23:09 作者: 極大的痛苦 時間: 2025-3-30 01:40 作者: 花爭吵 時間: 2025-3-30 04:16 作者: instructive 時間: 2025-3-30 10:17
,Robust Medical Data Sharing System Based on?Blockchain and?Threshold Rroxy Re-encryption,hertext conversion without revealing the patient’s private key, reducing the risk of the original key being leaked and enhancing the robustness of the entire system to achieve secure sharing, stable sharing, and transparent sharing of private data. Finally, a robust medical information security sharing system is obtained.作者: 大溝 時間: 2025-3-30 15:08 作者: resuscitation 時間: 2025-3-30 17:25
Black-Box Graph Backdoor Defense,ration; and 2) model fine-tuning, which fine-tunes the model to a backdoor-free state by a loss function with a penalty regularization for poisoned features. We demonstrate the effectiveness of our method through extensive experiments on various datasets and attack algorithms under the assumption of black-box conditions.作者: 開玩笑 時間: 2025-3-30 22:51 作者: Neutropenia 時間: 2025-3-31 01:55 作者: 發(fā)起 時間: 2025-3-31 06:19 作者: nonsensical 時間: 2025-3-31 12:47 作者: Vertebra 時間: 2025-3-31 15:13
,Distributed Latency-Efficient Beaconing for?Multi-channel Asynchronous Duty-Cycled IoT Networks,a distributed beaconing scheduling method which can compute a low-latency and collision-free schedule is proposed with a theoretical bounded, taking the active time slots of each node into account. Finally, the extensive simulation results demonstrate the effectiveness of the proposed algorithm in t作者: sacrum 時間: 2025-3-31 18:09 作者: concentrate 時間: 2025-3-31 21:53 作者: COMMA 時間: 2025-4-1 02:27 作者: 巫婆 時間: 2025-4-1 08:05
,DRL-Based Optimization Algorithm for?Wireless Powered IoT Network,ransmission time duration, partial offloading decisions and transmission power allocation strategy, we obtain the maximum of the sum computation rate (SCR). Firstly, we formulate this as a non-convex problem which is hard to address. Secondly, we decompose the problem into a top-problem of optimizin作者: Hamper 時間: 2025-4-1 11:41
,Efficiently Running SpMV on?Multi-core DSPs for?Banded Matrix,ers and computations. To evaluate our approach, we compare its performance with a baseline executed on the general-purpose CPU cores of the FT-M7032 heterogeneous platform. Experimental results demonstrate that our techniques achieve a significant speedup of 2.0. compared to the competing baselines.作者: Cosmopolitan 時間: 2025-4-1 16:54 作者: 鬼魂 時間: 2025-4-1 21:18 作者: 名字的誤用 時間: 2025-4-2 01:38 作者: Commentary 時間: 2025-4-2 06:38
,SW-LeNet: Implementation and?Optimization of?LeNet-1 Algorithm on?Sunway Bluelight II Supercomputerng optimization are used in process-level optimization. Compared with the original LeNet, SW-LeNet can achieve 4.94x speedups in a single core group. Moreover, SW-LeNet can be scaled up to 2,048 processes, with 133,120 cores, and achieves 84.93% parallel efficiency.作者: Feedback 時間: 2025-4-2 10:05 作者: 冷淡一切 時間: 2025-4-2 12:45
,PM-Migration: A Page Placement Mechanism for?Real-Time Systems with?Hybrid Memory Architecture,cess frequency of write-intensive pages to leverage the read-write asymmetry of Intel Optane DC persistent memory module (DCPMM), a commercially available PM hardware. It also incorporates a transmission handover strategy to select the transfer engine according to the size of the page and then utili