the proceedings contain 84 papers. the topics discussed include: on preventing symbolic execution attacks by low cost obfuscation;code clone tracer (CCT): a tracking tool for analyzing human and social factors in crea...
ISBN:
(纸本)9781728116518
the proceedings contain 84 papers. the topics discussed include: on preventing symbolic execution attacks by low cost obfuscation;code clone tracer (CCT): a tracking tool for analyzing human and social factors in creating and reusing code clones;connecting personal health records together with EHR using tangle;an multi-client web-based interactive HCI for interactive supercomputing;toward sustainable communities with a community currency a study in car sharing;extraction of useful features from neural network for facial expression recognition;and extracting related concepts from Wikipedia by using a graph database system.
the proceedings contain 117 papers. the topics discussed include: detection of a novel dual attack in named data networking;fair DMA scheduler for low-latency accelerator offloading;multi-attribute decision-making met...
ISBN:
(纸本)9781665464970
the proceedings contain 117 papers. the topics discussed include: detection of a novel dual attack in named data networking;fair DMA scheduler for low-latency accelerator offloading;multi-attribute decision-making method based on interval intuitionistic trapezoidal fuzzy number to determine the expert weight: note: sub-titles are not captured in Xplore and should not be used;binary-level directed symbolic execution through pattern learning;an efficient metric-based approach for static use-after-free detection;a graph convolution neural network based method for insider threat detection;maintenance worker scheduling for charging pile fault: a multi-agent RL approach;towards secure bilateral friend query with conjunctive policy matching in social networks;structure-noise-aware anchor link prediction across social networks;file system to support secure cloud-based sharing;discovering agent models using process mining: initial approach and a case study;and towards agent-based simulation of the parallel trading market of pharmaceuticals.
the proceedings contain 94 papers. the topics discussed include: optimizing deep learning split deployment for IoT edge networks;efficient fault-tolerant syndrome measurement of quantum error-correcting codes based on...
ISBN:
(纸本)9781728126166
the proceedings contain 94 papers. the topics discussed include: optimizing deep learning split deployment for IoT edge networks;efficient fault-tolerant syndrome measurement of quantum error-correcting codes based on 'flag';comparison of binary rain prediction on HIMAWARI using MPI and CUDA;effect of parallel processing by duplicating histogram in automatic image binarization for high-level synthesis;joint mobile data collection and energy supply scheme for rechargeable wireless sensor networks;ultra reliable communication: availability analysis in 5G cellular networks;an improved online multidimensional bin packing algorithm;and improving recommender systems accuracy in social networks using popularity.
Web servers are the backbone of modern Internet infrastructure, serving as the primary medium for online information distribution. Despite their critical role, web servers are susceptible to cyber-attacks. While curre...
详细信息
Function-as-a-Service (FaaS) is an emerging cloud computing model ideal for processing vast amounts of data generated by the Internet of things. However, existing FaaS approaches struggle to leverage resources efficie...
详细信息
Smart cities are a manifestation of the Internet of things (IoT). the push for smart cities has led to the proliferation of video cameras in public spaces [1]. London is expected to deploy 642,000 cameras by 2020. the...
详细信息
Load balanced transaction scheduling in on-demand computing system is known to be NP-hard problem. In order to solve this problem, this paper introduces a hybrid approach named cuckoo search-ant colony optimization. T...
详细信息
ISBN:
(纸本)9781450360944
Load balanced transaction scheduling in on-demand computing system is known to be NP-hard problem. In order to solve this problem, this paper introduces a hybrid approach named cuckoo search-ant colony optimization. the approach dynamically generates an optimal schedule by clustering the on-demand computing resources considering their load and completes the transaction execution within their deadlines. the approach also balances the load of the system before scheduling the transactions. For clustering the resources we use cuckoo search method. We use ant colony optimization for selecting the appropriate and optimal resources. We evaluate the performance of the proposed algorithm with six existing algorithms.
Achieving advanced Mobile Edge computing (MEC) services such as dynamic resource assignment and slicing, maintaining Quality of Service (QoS), and enabling heterogeneous virtual functions are some of the technical cha...
详细信息
Achieving advanced Mobile Edge computing (MEC) services such as dynamic resource assignment and slicing, maintaining Quality of Service (QoS), and enabling heterogeneous virtual functions are some of the technical challenges associated with edge-cloud enhanced 5G architectures now under consideration. this paper proposes a named-object based virtual network (NOVN) architecture to support low-latency applications in the MEC. Software router implementation running on the ORBIT testbed validates the named-object approach, showing low VN processing and control overhead, and making it possible to achieve low latency. A latency performance improvement of 30% is achieved as compared to the baseline implementation without NOVN. the results also validate feasibility of using the advanced MEC services for an example latency constrained edge cloud scenario. (C) 2020 Elsevier B.V. All rights reserved.
Mutual exclusion is one of the fundamental problems in distributedcomputing but existing mutual exclusion algorithms are unadapted to the dynamics and lack of membership knowledge of current distributed systems (e.g....
详细信息
ISBN:
(纸本)9781450360944
Mutual exclusion is one of the fundamental problems in distributedcomputing but existing mutual exclusion algorithms are unadapted to the dynamics and lack of membership knowledge of current distributed systems (e.g., mobile ad-hoc networks, peer-to-peer systems, etc.). Additionally, in order to circumvent the impossibility of solving mutual exclusion in asynchronous message passing systems where processes can crash, some solutions include the use of (T+Sigma(l)) [3], which is the weakest failure detector to solve mutual exclusion in known static distributed systems. In this paper, we define a new failure detector T Sigma(lr) which is equivalent to (T+Sigma(l)) in known static systems, and prove that T Sigma(lr) is the weakest failure detector to solve mutual exclusion in unknown dynamic systems with partial memory losses. We consider that crashed processes may recover.
Major problem of IEEE 802.11 based Vehicular Ad-hoc Network (VANET) is traffic congestion. the traffic congestion occurs due to unnecessary bandwidth usages, high vehicle density, excess increase in transmission power...
详细信息
ISBN:
(纸本)9781450360944
Major problem of IEEE 802.11 based Vehicular Ad-hoc Network (VANET) is traffic congestion. the traffic congestion occurs due to unnecessary bandwidth usages, high vehicle density, excess increase in transmission power and immediate topology changes in a vehicular ad-hoc network which leads to excessive packet loss and lowers the safety of the applications. Under such conditions, all the transmitted packets from the source may not be delivered to the destination. Vehicles unaware of the traffic congestion increase the difficulty of it by eventually joining it. Many congestion control techniques have been proposed, but still, the problem arises. In this paper, we propose distributed alpha-Fair Transmit Power Adaptation Based Congestion Control in Vehicular Ad-hoc Network to discover and reduce traffic congestion using the transmit power control and optimum node selection for cooperative VANET in the framework of the utility function optimization. the proposed system has better performance as compared to DFAV, DV-CAST, and UV-CAST regarding packet reception probability, average packet delivery ratio, and average end-to-end packet delivery delay in Vehicular Ad-hoc Network (VANET).
暂无评论