The proceedings contain 165 papers. The special focus in this conference is on algorithms and Architectures for Parallel processing. The topics include: MDCF: Multiple Dynamic Cuckoo Filters for LSM-Tree;a Game T...
ISBN:
(纸本)9789819708109
The proceedings contain 165 papers. The special focus in this conference is on algorithms and Architectures for Parallel processing. The topics include: MDCF: Multiple Dynamic Cuckoo Filters for LSM-Tree;a Game Theory Based Task Offloading Scheme for Maximizing Social Welfare in Edge computing;research on Dos Attack Simulation and Detection in Low-Orbit Satellite Network;malware Detection Method Based on Visualization;TOC: Joint Task Offloading and Computation Reuse in Vehicular Edge computing;Distributed Task Offloading for IoAV Using DDP-DQN;a Task Offloading and Resource Allocation Optimization Method in End-Edge-Cloud Orchestrated computing;multi-agent Cooperative Intrusion Detection Based on Generative data Augmentation;an Uncertainty-Aware Auction Mechanism for Federated Learning;Long Short-Term Deterministic Policy Gradient for Joint Optimization of Computational Offloading and Resource Allocation in MEC;query Optimization Mechanism for Blockchain-Based Efficient data Traceability;research on the Evolution Path of Network Hotspot Events Based on the Event Evolutionary Graph;Task Offloading in UAV-Assisted Vehicular Edge computing Networks;path Planning of Coastal Ships Based on Improved Hybrid A-Star;data Augmentation Method Based on Partial Noise Diffusion Strategy for One-Class Defect Detection Task;K Asynchronous Federated Learning with Cosine Similarity Based Aggregation on Non-IID data;MPQUIC Transmission Control Strategy for SDN-Based Satellite Network;an Energy Prediction Method for Energy Harvesting Wireless Sensor with Dynamically Adjusting Weight Factor;Bayesian Optimization for Auto-tuning Convolution Neural Network on GPU;persistent Sketch: A Memory-Efficient and Robust Algorithm for Finding Top-k Persistent Flows;faCa: Fast Aware and Competition-Avoided Balancing for data Center Network;Optimizing GNN Inference processing on Very Long Vector Processor;GDTM: Gaussian Differential Trust Mechanism for Optimal Recommender System;privacy-Enhanced Dyna
The proceedings contain 165 papers. The special focus in this conference is on algorithms and Architectures for Parallel processing. The topics include: MDCF: Multiple Dynamic Cuckoo Filters for LSM-Tree;a Game T...
ISBN:
(纸本)9789819708581
The proceedings contain 165 papers. The special focus in this conference is on algorithms and Architectures for Parallel processing. The topics include: MDCF: Multiple Dynamic Cuckoo Filters for LSM-Tree;a Game Theory Based Task Offloading Scheme for Maximizing Social Welfare in Edge computing;research on Dos Attack Simulation and Detection in Low-Orbit Satellite Network;malware Detection Method Based on Visualization;TOC: Joint Task Offloading and Computation Reuse in Vehicular Edge computing;Distributed Task Offloading for IoAV Using DDP-DQN;a Task Offloading and Resource Allocation Optimization Method in End-Edge-Cloud Orchestrated computing;multi-agent Cooperative Intrusion Detection Based on Generative data Augmentation;an Uncertainty-Aware Auction Mechanism for Federated Learning;Long Short-Term Deterministic Policy Gradient for Joint Optimization of Computational Offloading and Resource Allocation in MEC;query Optimization Mechanism for Blockchain-Based Efficient data Traceability;research on the Evolution Path of Network Hotspot Events Based on the Event Evolutionary Graph;Task Offloading in UAV-Assisted Vehicular Edge computing Networks;path Planning of Coastal Ships Based on Improved Hybrid A-Star;data Augmentation Method Based on Partial Noise Diffusion Strategy for One-Class Defect Detection Task;K Asynchronous Federated Learning with Cosine Similarity Based Aggregation on Non-IID data;MPQUIC Transmission Control Strategy for SDN-Based Satellite Network;an Energy Prediction Method for Energy Harvesting Wireless Sensor with Dynamically Adjusting Weight Factor;Bayesian Optimization for Auto-tuning Convolution Neural Network on GPU;persistent Sketch: A Memory-Efficient and Robust Algorithm for Finding Top-k Persistent Flows;faCa: Fast Aware and Competition-Avoided Balancing for data Center Network;Optimizing GNN Inference processing on Very Long Vector Processor;GDTM: Gaussian Differential Trust Mechanism for Optimal Recommender System;privacy-Enhanced Dyna
With the increasing demand for high performance and low power consumption in embedded real-time systems, performance asymmetric multiprocessor architecture is beginning to be applied to embedded real-time systems, bec...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
With the increasing demand for high performance and low power consumption in embedded real-time systems, performance asymmetric multiprocessor architecture is beginning to be applied to embedded real-time systems, because this heterogeneous architecture allows the system to allocate computational resources as needed to satisfy the demands of each application and dynamic workloads. Most of the previous studies on EDZL scheduling algorithms have focused on task prioritization, and they simply assign the highest priority tasks to the fastest processors. In this paper, we choose to assign the highest priority tasks on the slowest processor and propose SSF-EDZL (slowest speed fit for earliest deadline first until zerolaxity) scheduling algorithm. We compare SSF-EDZL scheduling algorithm with other scheduling algorithms and the experimental results show that SSF-EDZL is a better scheduling algorithm which has higher processor utilization and better scheduling performance.
The international talent database plays a crucial role in modern globalized society, but its management faces many challenges, including issues such as large data volume, data quality, data security, and query efficie...
详细信息
In the past, dataprocessing was completed on a computer or a server. This is because the resources available at that time were limited. However, with the progress of technology, it is possible to use multiple compute...
详细信息
In our evolving world, human vulnerability to diseases remains a critical concern, with an overwhelming volume of health data generated by applications. Managing this massive and complex big data requires advanced pro...
详细信息
Fog dataprocessing systems provide key abstractions to manage data and event processing in the geo-distributed and heterogeneous fog environment. The lack of standardized benchmarks for such systems, however, hinders...
详细信息
ISBN:
(纸本)9798350343946
Fog dataprocessing systems provide key abstractions to manage data and event processing in the geo-distributed and heterogeneous fog environment. The lack of standardized benchmarks for such systems, however, hinders their development and deployment, as different approaches cannot be compared quantitatively. Existing cloud data benchmarks are inadequate for fog computing, as their focus on workload specification ignores the tight integration of application and infrastructure inherent in fog computing. In this paper, we outline an approach to a fog-native dataprocessing benchmark that combines workload specifications with infrastructure specifications. This holistic approach allows researchers and engineers to quantify how a software approach performs for a given workload on given infrastructure. Further, by basing our benchmark in a realistic IoT sensor network scenario, we can combine paradigms such as low-latency event processing, machine learning inference, and offline data analytics, and analyze the performance impact of their interplay in a fog dataprocessing system.
Topological data Analysis (TDA) introduces methods that capture the underlying structure of shapes in data. Within the last two decades, TDA has been mostly examined in unsupervised machine learning tasks. TDA has bee...
详细信息
An image encryption algorithm based on chaotic scrambling and DNA sequence multi-rule coding is proposed. Through the research of related algorithms, the original image and the chaotic sequence generated by Logistic c...
详细信息
Globalization has led to an increased usage of credit cards as the mode of payment for various kinds of transactions, both online as well as offline. Just as a coin has two sides, Globalization also has another side t...
详细信息
暂无评论