the proceedings contain 43 papers. the topics discussed include: an intelligent IT infrastructure for the future;heavy tails and models for the web and social networks;spoken web: a parallel web for the masses: indust...
ISBN:
(纸本)3642113214
the proceedings contain 43 papers. the topics discussed include: an intelligent IT infrastructure for the future;heavy tails and models for the web and social networks;spoken web: a parallel web for the masses: industry keynote;scheduling in multi-channel wireless networks;maintaining safety in interdomain routing with hierarchical path-categories;on communication complexity of secure message transmission in directed networks;a leader-free Byzantine consensus algorithm;lessons from the sparse sensor network deployment in rural India;radio network distributed algorithms in the unknown neighborhood model;the weak network tracing problem;poisoning the Kad network;formal understanding of the emergence of superpeer networks: a complex network approach;parallelization of the Lanczos algorithm on multi-core platforms;and channel assignment in virtual cut-through switching based wireless mesh networks.
the proceedings contain 222 papers. the topics discussed include: DRL-deploy: adaptive service function chains deployment with deep reinforcement learning;accuracy vs. efficiency: achieving boththrough hardware-aware...
ISBN:
(纸本)9781665435741
the proceedings contain 222 papers. the topics discussed include: DRL-deploy: adaptive service function chains deployment with deep reinforcement learning;accuracy vs. efficiency: achieving boththrough hardware-aware quantization and reconfigurable architecture with mixed precision;cmss: collaborative modeling of safety and security requirements for network protocols;FGPA: fine-grained pipelined acceleration for depthwise separable CNN in resource constraint scenarios;Dyacon: JointCloud dynamic access control model of data security based on verifiable credentials;understanding the runtime overheads of deep learning inference on edge devices;and alleviating imbalance in synchronous distributed training of deep neural networks.
the proceedings contain 41 papers. the topics discussed include: Bayesian network inference with qualitative expert knowledge for decision support systems;semantic query validation in guided-based systems: assuring th...
ISBN:
(纸本)9780769540887
the proceedings contain 41 papers. the topics discussed include: Bayesian network inference with qualitative expert knowledge for decision support systems;semantic query validation in guided-based systems: assuring the construction of queries that make sense;user and item pattern matching in multi-criteria recommender systems;modeling of device collaboration process based on Petri net;CP-nets based methodology for integrating functional verification and performance analysis of network protocol;a novel security approach for critical information systems: preventing flooding in the non-authenticated client area using a new service from local network service providers;achieving flow-level controllability in network intrusion detection system;explaining classification by finding response-related subgroups in data;real-time implementation of synthetic aperture sonar imaging on high performance clusters;and recovering depth from a single image using dark channel prior.
the proceedings contain 161 papers. the topics discussed include: deep learning for phishing detection;a partition matching method for optimal attack path analysis;an energy and robustness adjustable optimization meth...
ISBN:
(纸本)9781728111414
the proceedings contain 161 papers. the topics discussed include: deep learning for phishing detection;a partition matching method for optimal attack path analysis;an energy and robustness adjustable optimization method of file distribution services;deriving the political affinity of twitter users from their followers;on the usability of big (social) data;re-running large-scale parallel programs using two nodes;predicting hacker adoption on darkweb forums using sequential rule mining;an on-the-fly scheduling strategy for distributed stream processing platform;deadlock-free adaptive routing based on the repetitive turn model for 3D network-on-chip;and radix: enabling high-throughput georeferencing for phenotype monitoring over voluminous observational data.
the proceedings contain 66 papers. the topics discussed include: design and implementation of service composition protocol based on DSR;Hamiltonian cycle embedding in hierarchical crossed cubes;systematic development ...
ISBN:
(纸本)9780769542874
the proceedings contain 66 papers. the topics discussed include: design and implementation of service composition protocol based on DSR;Hamiltonian cycle embedding in hierarchical crossed cubes;systematic development of correct bulk synchronous parallel programs;multiple search centers based fast motion estimation algorithm for H.264/AVC;transient congestion avoidance in software distributed shared memory systems;experiences with hierarchical storage management support in blue whale file system;commit protocols for a distributed transactional memory;a feature-based replica consistency strategy for spatial data in distributed GIS;integrating DBMSs as a read-only execution layer into hadoop;multi-aggregate-query scheduling over data streams;and Rawls scheduler: load considered proportional share scheduling for high performance multimedia systems.
the primary goal of the economic dispatch (ED) is to organize the generation schedule to fulfill system energy demand at the lowest possible operational cost while meeting all other requirements, including system secu...
详细信息
I/O constitutes a significant portion of most of the application run-time. Spawning many such applications concurrently on an HPC system leads to severe I/O contention. thus, understanding and subsequently reducing I/...
详细信息
Current Radio-Frequency Identification (RFID) technology involves two types of physical devices: tags and reader. the reader combines in a single physical device transmission (to the tags) and reception (from the tags...
详细信息
ISBN:
(纸本)9781450301824
Current Radio-Frequency Identification (RFID) technology involves two types of physical devices: tags and reader. the reader combines in a single physical device transmission (to the tags) and reception (from the tags) functions. In this paper we discuss an alternative approach, where receive functions are performed by a separate device called "RFID listener". this allows distributed tag-sensing schemes where one transmitter coexists with multiple listeners. We discuss pros and cons of both approaches and present our implementation of a passive RFID listener on GNU Radio. Our implementation is a basis for experimenting with future distributed listener-based systems, but it can be also used as a cheap and flexible protocol analyzer for currently available commercial RFID readers.
作者:
Ong, D.Khaddaj, S.Faculty of Computing
Information Systems and Mathematics Kingston University London Kingston Upon Thames Surrey KT1 2EE United Kingdom
the continuous decentralisation and distribution of software, hardware, and human resources depends on a number of fundamental factors including the ability to provide desired Quality of Service (QoS) on resources ass...
详细信息
Mutual exclusion is one of the fundamental problems in distributedcomputing but existing mutual exclusion algorithms are unadapted to the dynamics and lack of membership knowledge of current distributed systems (e.g....
详细信息
ISBN:
(纸本)9781450360944
Mutual exclusion is one of the fundamental problems in distributedcomputing but existing mutual exclusion algorithms are unadapted to the dynamics and lack of membership knowledge of current distributed systems (e.g., mobile ad-hoc networks, peer-to-peer systems, etc.). Additionally, in order to circumvent the impossibility of solving mutual exclusion in asynchronous message passing systems where processes can crash, some solutions include the use of (T+Sigma(l)) [3], which is the weakest failure detector to solve mutual exclusion in known static distributed systems. In this paper, we define a new failure detector T Sigma(lr) which is equivalent to (T+Sigma(l)) in known static systems, and prove that T Sigma(lr) is the weakest failure detector to solve mutual exclusion in unknown dynamic systems with partial memory losses. We consider that crashed processes may recover.
暂无评论