Serverless computing breaks down applications into workflows of stateless functions, where the output of each function serves as the input for the next. When these workflows are distributed across multiple processing ...
详细信息
the Cuk converter is a particularly interesting converter, as it can be used to generate voltages which could be above or below the supply voltage. the chokes take up the most space when setting up such a converter. I...
详细信息
I/O constitutes a significant portion of most of the application run-time. Spawning many such applications concurrently on an HPC system leads to severe I/O contention. thus, understanding and subsequently reducing I/...
详细信息
A precise model with low order for controller design is indispensable for the high performance control of thin flexible structures. Such systems require a high model quality ranging from slow, low frequency dynamics (...
详细信息
this book constitutes the thoroughly refereed proceedings of the 11thinternationalconference on Collaborative computing: networking, Applications, and Worksharing, CollaborateCom 2015, held in Wuhan, China, in Novem...
ISBN:
(数字)9783319289106
ISBN:
(纸本)9783319289090;9783319289106
this book constitutes the thoroughly refereed proceedings of the 11thinternationalconference on Collaborative computing: networking, Applications, and Worksharing, CollaborateCom 2015, held in Wuhan, China, in November 2015. the 24 full papers and 8 short papers presented were carefully reviewed and selected from numerous submissions. they address topics around networking, technology and systems, including but not limited to collaborative cloud computing, architecture and evaluation, collaborative applications, sensors and Internet of things (IoT), security.
Localization is a hot topic in networking industry and falls into two categories: indoor localization and outdoor localization. Indoor localization takes place inside a building or other structure, whereas outdoor loc...
详细信息
Attacks that aim to disrupt services, known as distributed Denial of Service (DDoS), exploit protocol vulnerabilities and utilize legitimate traffic to target systems, thereby threatening the normal operation of the n...
详细信息
ISBN:
(数字)9798331595104
ISBN:
(纸本)9798331595111
Attacks that aim to disrupt services, known as distributed Denial of Service (DDoS), exploit protocol vulnerabilities and utilize legitimate traffic to target systems, thereby threatening the normal operation of the network. this paper proposes a method for filtering DDoS attack traffic along routing paths within the Software Defined networking (SDN) domain. the method, based on the SDN framework, employs a consistency hashing algorithm to select nodes in the global routing platform, forming secure access paths. By utilizing the accuracy of edge node detection and inter-domain cooperation, the attack is effectively mitigated along the path close to its origin, which is referred to as path filtering. the paper also provides a design for the filtering framework and details the filtering steps.
the proceedings contain 422 papers. the topics discussed include: alert generation on detection of suspicious activity using transfer learning;an approach for Bengali automatic question answering system using attentio...
ISBN:
(纸本)9781728168517
the proceedings contain 422 papers. the topics discussed include: alert generation on detection of suspicious activity using transfer learning;an approach for Bengali automatic question answering system using attention mechanism;EduBlock: securing educational documents using blockchain technology;OPTICK - a low cost wearable head up display for search and rescue operations;benchmarking distributed stream processing frameworks for real time classical machine learning applications;road boundary detection using 3D-to-2D transformation of lidar data and conditional generative adversarial networks;a novel highly sensitive photonic crystal fiber sensor for detecting ph levels of acetic acid aqueous solution based on surface plasmon resonance;emergence of edge computing: an advancement over cloud and fog;QML based community detection in the realm of social network analysis;trust management in cyber physical system using blockchain;and a switching capacitor based buck-boost converter and its analysis.
Quantum computing is fundamentally transforming the cybersecurity landscape by simultaneously introducing robust defense mechanisms and sophisticated attack vectors. this paper explores the dual nature of quantum comp...
详细信息
ISBN:
(数字)9798331508913
ISBN:
(纸本)9798331508920
Quantum computing is fundamentally transforming the cybersecurity landscape by simultaneously introducing robust defense mechanisms and sophisticated attack vectors. this paper explores the dual nature of quantum computing in cybersecurity, examining how it enhances artificial intelligence-powered malware detection systems and strengthens encryption protocols, while also enabling the development of adaptive quantum-enhanced threats such as polymorphic malware and quantum key distribution attacks. Additionally, the paper analyzes the convergence of quantum computing with Large Language Models (LLMs) and neural networks, highlighting implications for threat intelligence across social media platforms, cybersecurity operations, and open-source intelligence. through comprehensive analysis and the proposition of quantum-resilient security frameworks, this research provides cybersecurity professionals with actionable strategies for navigating the emerging quantum computing era.
Serverless edge computing is transforming distributed systems, especially for IoT, by merging serverless architecture with edge computing. this evolution demands efficient scheduling methods, as traditional approaches...
详细信息
ISBN:
(数字)9798331508913
ISBN:
(纸本)9798331508920
Serverless edge computing is transforming distributed systems, especially for IoT, by merging serverless architecture with edge computing. this evolution demands efficient scheduling methods, as traditional approaches struggle with dynamic and heterogeneous environments. Deep Reinforcement Learning (DRL), particularly the Proximal Policy Optimization (PPO) algorithm, offers a promising alternative. Our proposed method, SMPPO, introduces a global trajectory memory where agents learn from boththeir own and others' experiences. Simulations show SMPPO consistently outperforms others, improving total performance by 15% and response time by 25%. this robust, scalable approach advances scheduling in serverless edge computing.
暂无评论