the proceedings contain 249 papers. the topics discussed include: future technological challenges for high performance computers;an agile programming model for grid end users;scalable and practical nonblocking switchi...
详细信息
ISBN:
(纸本)0769524052
the proceedings contain 249 papers. the topics discussed include: future technological challenges for high performance computers;an agile programming model for grid end users;scalable and practical nonblocking switching networks;an efficient distributed broadcasting algorithm for wireless ad hoc networks;a ring removal movement-based mobility location update scheme;a scalable security architecture for grid;a novel security model based on virtual organization for grid;a simple process calculus for the analysis of security protocols;the architecture of the large-scale distributed intrusion detection system;construction of a prototype of a volume communications environment;study of channel characteristics of power line communications networks;the maximal rates of more general complex orthogonal designs;and random walk routing for wireless sensor networks.
the proceedings contain 28 papers. the topics discussed include: performance and usability implications of multiplatform and WebAssembly containers;operations patterns for hybrid quantum applications;optimization of c...
ISBN:
(纸本)9789897587474
the proceedings contain 28 papers. the topics discussed include: performance and usability implications of multiplatform and WebAssembly containers;operations patterns for hybrid quantum applications;optimization of cloud-native application execution over the edge cloud continuum enabled by DVFS;energy-aware node selection for cloud-based parallel workloads with machine learning and infrastructure as code;security-aware allocation of replicated data in distributed storage systems;performance analysis of mdx ii: a next-generation cloud platform for cross-disciplinary data science research;data orchestration platform for AI workflows execution across computing continuum;framework for decentralized data strategies in virtual banking: navigating scalability, innovation, and regulatory challenges in thailand;and anomaly detection for partially observable container systems based on architecture profiling.
the proceedings contain 109 papers. the topics discussed include: an intrusion detection architecture for ad hoc network based on artificial immune system;conditional fault-tolerant hamiltonicity of twisted cubes;cond...
详细信息
ISBN:
(纸本)0769527361
the proceedings contain 109 papers. the topics discussed include: an intrusion detection architecture for ad hoc network based on artificial immune system;conditional fault-tolerant hamiltonicity of twisted cubes;conditional fault-tolerant hamiltonicity of star graphs;merging source and shared trees multicast in MPLS networks;java annotated concurrency based on the concurrent package;a high-efficiency vector interpolator using redundant CORDIC arithmetic in power-aware 3D graphics rendering;error-diffusion kernel estimation using least squares;remote sensing images classification/data fusion using distance weighted multiple classifiers systems;image encryption and decryption using SCAN methodology;an attribute-based access control model for web services;administrative usage control model for secure interoperability;an efficient assignment of transmission opportunity in qos guaranteed wireless LAN;and k-MCore for multicasting on mobile ad hoc networks.
the increasing demand for real-time data analysis in Internet of things (IoT) ecosystems has created several challenges, particularly in environments where resources are limited, and minimizing data processing latency...
详细信息
Common to many distributed systems such as the Internet-of-things (IoT) is decentralisation, often with a growing number of devices with diverse computational capabilities and security requirements. If integrated into...
详细信息
this paper examines how co-locating multiple VMs on a single physical server with shared storage impacts I/O performance, specifically focusing on latency of I/O operations, and the overall throughput. We introduce a ...
详细信息
the growing popularity of data-intensive applications in cloud computing necessitates a cost-effective approach to harnessing distributed processing capabilities. However, the wide variety of instance types and config...
详细信息
Federated Learning (FL) is vulnerable to backdoor attacks through data poisoning if the data is not scrutinized, as malicious participants can inject backdoor triggers in normal samples, leading to poisoned updates. D...
详细信息
Graphics Processing Units (GPUs) are widely used as powerful hardware accelerators for data-intensive tasks. However, their efficacy can be hindered by constraints in device memory and data transfer speeds via the PCI...
详细信息
the rapid growth of cloud computing has brought new challenges in parallel Batch Machine Scheduling (PBMS), particularly when incorporating malleability and rejection constraints. this has led to the parallel Batch Ma...
详细信息
暂无评论