The proceedings contain 27 papers. The topics discussed include: Tetris: automatic UAF exploit generation by manipulating layout based on reactivated paths;artificial neural network for processing fingerprint image no...
ISBN:
(纸本)9798350396379
The proceedings contain 27 papers. The topics discussed include: Tetris: automatic UAF exploit generation by manipulating layout based on reactivated paths;artificial neural network for processing fingerprint image noise;facial expression intensity estimation considering change characteristic of facial feature values for each facial expression;developing a gamification method based on motivation subscales for lifelogging applications;preliminary study of reasoning existing projects' descriptions based on classname word elements;construction and evaluation of a speech emotion classifier using LSTM;concurrency control program generation in genetic programming considering depth of the program tree;reconfiguration cost for reconfigurable computing architectures;and parallel binary search tree construction inspired by thread-level speculation.
The proceedings contain 40 papers. The special focus in this conference is on Parallel and distributedcomputing, Applications and Technologies. The topics include: Edge-Gateway Intrusion Detection for Smart Home;ener...
ISBN:
(纸本)9783031299261
The proceedings contain 40 papers. The special focus in this conference is on Parallel and distributedcomputing, Applications and Technologies. The topics include: Edge-Gateway Intrusion Detection for Smart Home;energy-Delay Tradeoff in Parallel Task Allocation and Execution for Autonomous Platooning Applications;a Reservation-Based List Scheduling for Embedded Systems with Memory Constraints;Formalization and Verification of SIP Using CSP;Towards a Blockchain and Fog-Based Proactive Data Distribution Framework for ICN;research on User Influence Weighted Scoring Algorithm Incorporating Incentive Mechanism;bloodMan-Chain: A Management of Blood and Its Products Transportation Based on Blockchain Approach;a Systematic Comparison on Prevailing Intrusion Detection Models;enhancing Resolution of Inferring Hi-C Data Integrating U-Net and ResNet Networks;detecting Network Intrusions with Resilient Approaches Based on Convolutional Neural Networks;Multi-GPU Scaling of a Conservative Weakly Compressible Solver for Large-Scale Two-Phase Flow Simulation;analysis of Precision Vectors for Ising-Based Linear Regression;Evaluating and Analyzing Irregular Tree Search in the Tascell and HOPE Parallel Programming Languages;distributed Parallel Tall-Skinny QR Factorization: Performance Evaluation of Various Algorithms on Various Systems;a Partitioned Memory Architecture with Prefetching for Efficient Video Encoders;a Hardware Trojan Exploiting Coherence Protocol on NoCs;A System-Wide Communication to Couple Multiple MPI Programs for Heterogeneous computing;a Task-Parallel Runtime for Heterogeneous Multi-node Vector Systems;Accelerating Radiative Transfer Simulation on NVIDIA GPUs with OpenACC;QR Factorization of Block Low-Rank Matrices on Multi-instance GPU;equivalence Checking of Code Transformation by Numerical and Symbolic Approaches;improving the Performance of Lattice Boltzmann Method with Pipelined Algorithm on A Heterogeneous Multi-zone Processor;MEA: A Framework for Model Chec
The proceedings contain 46 papers. The topics discussed include: undervolting on wireless sensor nodes: a critical perspective;a scalable causal broadcast that tolerates dynamics of mobile networks;robotic sorting on ...
ISBN:
(纸本)9781450395601
The proceedings contain 46 papers. The topics discussed include: undervolting on wireless sensor nodes: a critical perspective;a scalable causal broadcast that tolerates dynamics of mobile networks;robotic sorting on the grid;greedy algorithms for scheduling package delivery with multiple drones;a study on migration scheduling in distributed stream processing engines;distributed matrix tiling using a hypergraph labeling formulation;a lattice linear predicate parallel algorithm for the dynamic programming problems;a fast wait-free multi-producers single-consumer queue;limited associativity makes concurrent software caches a breeze;and topology inference of networks utilizing rooted spanning tree embeddings.
I/O constitutes a significant portion of most of the application run-time. Spawning many such applications concurrently on an HPC system leads to severe I/O contention. Thus, understanding and subsequently reducing I/...
详细信息
Partitioning large matrices is an important problem in distributed linear algebra computing, used in ML among others. Briefly, our goal is to perform a sequence of matrix algebra operations in a distributed manner on ...
详细信息
In this tutorial, the aim is to report some basic results about computational models representing robot based computing systems. In particular, we consider what in the literature is referred to as the model. This is o...
详细信息
Arbitrary Pattern Formation is a fundamental robot coordination problem. The problem asks for a distributed algorithm that allows a swarm of autonomous mobile robots to form any pattern given as input. The majority of...
详细信息
The problem of scheduling Directed Acyclic Graphs (DAGs) in order to minimize schedule length (also known as makespan), is known to be a challenging as well as computationally hard problem. Therefore, researchers have...
详细信息
In this paper we discuss two important problems: Dispersion and Exploration. We have provided two optimal algorithms for each of them. For Dispersion we have provided an algorithm which is optimal in terms of memory c...
详细信息
This paper focuses on positive computing using multimedia data called multimedia positive computing. The impression of multimedia data is used to change a person's mood. Presenting a piece of multimedia data induc...
详细信息
暂无评论