the proceedings contain 222 papers. the topics discussed include: DRL-deploy: adaptive service function chains deployment with deep reinforcement learning;accuracy vs. efficiency: achieving boththrough hardware-aware...
ISBN:
(纸本)9781665435741
the proceedings contain 222 papers. the topics discussed include: DRL-deploy: adaptive service function chains deployment with deep reinforcement learning;accuracy vs. efficiency: achieving boththrough hardware-aware quantization and reconfigurable architecture with mixed precision;cmss: collaborative modeling of safety and security requirements for network protocols;FGPA: fine-grained pipelined acceleration for depthwise separable CNN in resource constraint scenarios;Dyacon: JointCloud dynamic access control model of data security based on verifiable credentials;understanding the runtime overheads of deep learning inference on edge devices;and alleviating imbalance in synchronous distributed training of deep neural networks.
the proceedings contain 161 papers. the topics discussed include: deep learning for phishing detection;a partition matching method for optimal attack path analysis;an energy and robustness adjustable optimization meth...
ISBN:
(纸本)9781728111414
the proceedings contain 161 papers. the topics discussed include: deep learning for phishing detection;a partition matching method for optimal attack path analysis;an energy and robustness adjustable optimization method of file distribution services;deriving the political affinity of twitter users from their followers;on the usability of big (social) data;re-running large-scale parallel programs using two nodes;predicting hacker adoption on darkweb forums using sequential rule mining;an on-the-fly scheduling strategy for distributed stream processing platform;deadlock-free adaptive routing based on the repetitive turn model for 3D network-on-chip;and radix: enabling high-throughput georeferencing for phenotype monitoring over voluminous observational data.
the proceedings contain 41 papers. the topics discussed include: Bayesian network inference with qualitative expert knowledge for decision support systems;semantic query validation in guided-based systems: assuring th...
ISBN:
(纸本)9780769540887
the proceedings contain 41 papers. the topics discussed include: Bayesian network inference with qualitative expert knowledge for decision support systems;semantic query validation in guided-based systems: assuring the construction of queries that make sense;user and item pattern matching in multi-criteria recommender systems;modeling of device collaboration process based on Petri net;CP-nets based methodology for integrating functional verification and performance analysis of network protocol;a novel security approach for critical information systems: preventing flooding in the non-authenticated client area using a new service from local network service providers;achieving flow-level controllability in network intrusion detection system;explaining classification by finding response-related subgroups in data;real-time implementation of synthetic aperture sonar imaging on high performance clusters;and recovering depth from a single image using dark channel prior.
the proceedings contain 43 papers. the topics discussed include: an intelligent IT infrastructure for the future;heavy tails and models for the web and social networks;spoken web: a parallel web for the masses: indust...
ISBN:
(纸本)3642113214
the proceedings contain 43 papers. the topics discussed include: an intelligent IT infrastructure for the future;heavy tails and models for the web and social networks;spoken web: a parallel web for the masses: industry keynote;scheduling in multi-channel wireless networks;maintaining safety in interdomain routing with hierarchical path-categories;on communication complexity of secure message transmission in directed networks;a leader-free Byzantine consensus algorithm;lessons from the sparse sensor network deployment in rural India;radio network distributed algorithms in the unknown neighborhood model;the weak network tracing problem;poisoning the Kad network;formal understanding of the emergence of superpeer networks: a complex network approach;parallelization of the Lanczos algorithm on multi-core platforms;and channel assignment in virtual cut-through switching based wireless mesh networks.
the primary goal of the economic dispatch (ED) is to organize the generation schedule to fulfill system energy demand at the lowest possible operational cost while meeting all other requirements, including system secu...
详细信息
the techniques of request duplication and request reissue are used to reduce tail latency in distributed systems by sending redundant read requests to multiple replicas. However, these strategies can fail if the dupli...
详细信息
the proceedings contain 35 papers. the topics discussed include: explainable deep learning for cyber-attack detection in electric vehicle charging stations;a confidentiality-preserving distributed linear programming m...
ISBN:
(纸本)9798400711589
the proceedings contain 35 papers. the topics discussed include: explainable deep learning for cyber-attack detection in electric vehicle charging stations;a confidentiality-preserving distributed linear programming model for solving large-scale economic dispatch problems;benchmarking fully homomorphic encryption libraries in IoT devices;assessing ChatGPT’s code generation capabilities with short vs long context programming problems;enhancing sleep disorder diagnosis with a machine learning approach using ensemble neural networks: sleep disorder diagnosis with ensemble neural networks;enhancing EmoBot: an in-depth analysis of user expectation and satisfaction in an emotion-aware chatbot;and knowledge distillation and weight pruning for two-step compression of ConvNets in rice leaf disease classification.
Social media sentiment analysis is the procedure of gathering and examining data on how people discuss products on social media. Sentiment analysis weighs emotions and opinions in addition to a straightforward count o...
详细信息
the growing integration of Electric Vehicles (EVs) into smart grids has led to significant cybersecurity challenges, particularly concerning vulnerabilities in Electric Vehicle Charging Systems (EVCS). these systems, ...
详细信息
Modern vehicles are integrated systems of complex software that support advanced features such as autonomous driving and over-the-air updates. Software-defined vehicles (SDVs) are emerging as a future automotive parad...
详细信息
暂无评论