the proceedings contain 44 papers. the discussed topics include: performance analysis of interconnection networks under bursty and batch arrival traffic;a lazy EDF interrupt scheduling algorithm for multiprocessor in ...
详细信息
ISBN:
(纸本)9783540729044
the proceedings contain 44 papers. the discussed topics include: performance analysis of interconnection networks under bursty and batch arrival traffic;a lazy EDF interrupt scheduling algorithm for multiprocessor in parallel computing environment;a time and interaction model for open distributed timing computation;efficient linkable ring signatures and threshold signatures from linear feedback shift register;an improved algorithm for Alhusaini's algorithm in heterogeneous distributed systems;a framework of software component adaptation;data interoperation between ChinaGrid ad SRB;method for computational grids resources allocate based on auction and utility analyses;automatic conceptual indexing of web services and its application to service retrieval;on-demand capacity framework;implementing digital right management in P2P content sharing system;and a generalized critical task anticipation technique for DAG scheduling.
the proceedings contain 131 papers. the special focus in this conference is on algorithms and architectures for parallelprocessing. the topics include: MARO: Enabling Full MPI Automatic Refactoring in DSL-Based ...
ISBN:
(纸本)9789819615247
the proceedings contain 131 papers. the special focus in this conference is on algorithms and architectures for parallelprocessing. the topics include: MARO: Enabling Full MPI Automatic Refactoring in DSL-Based Programming Framework;SSC: An SRAM-Based Silence Computing Design for On-chip Memory;TP-BFT: A Faster Asynchronous BFT Consensus withparallel Structure;LTP: A Lightweight On-Chip Temporary Prefetcher for Data-Dependent Memory Accesses;A Neural Network-Based PUF Protection Method Against Machine Learning Attack;Compression Format and Systolic Array Structure Co-design for Accelerating Sparse Matrix Multiplication in DNNs;multidimensional Intrinsic Identity Construction and Dynamic Seamless Authentication Schemes in IoT Environments;invisible Backdoor Attack with Image Contours Triggers;finestra: Multi-aggregator Swarm Learning for Gradient Leakage Defense;DIsFU: Protecting Innocent Clients in Federated Unlearning;multiple-Round Aggregation of Abstract Semantics for Secure Heterogeneous Federated Learning;dynamic Privacy Protection with Large Language Model in Social Networks;a Dynamic Symmetric Searchable Encryption Scheme for Rapid Conjunctive Queries;a Data Watermark Scheme Base on Data Converted Bitmap for Data Trading;distributed Incentive Algorithm for Fine-Grained Offloading in Vehicular Ad Hoc Networks;mitigating Over-Unlearning in Machine Unlearning with Synthetic Data Augmentation;AW-YOLOv9: Adverse Weather Conditions Adaptation for UAV Detection;efficient and Privacy-Preserving Ranking-Based Federated Learning;on-Chain Dynamic Policy Evaluation for Decentralized Access Control;DPG-FairFL: A Dual-Phase GAN-Based Defense Framework Against Image-Based Fairness Data Poisoning Attacks in Federated Learning.
the proceedings contain 131 papers. the special focus in this conference is on algorithms and architectures for parallelprocessing. the topics include: MARO: Enabling Full MPI Automatic Refactoring in DSL-Based ...
ISBN:
(纸本)9789819615278
the proceedings contain 131 papers. the special focus in this conference is on algorithms and architectures for parallelprocessing. the topics include: MARO: Enabling Full MPI Automatic Refactoring in DSL-Based Programming Framework;SSC: An SRAM-Based Silence Computing Design for On-chip Memory;TP-BFT: A Faster Asynchronous BFT Consensus withparallel Structure;LTP: A Lightweight On-Chip Temporary Prefetcher for Data-Dependent Memory Accesses;A Neural Network-Based PUF Protection Method Against Machine Learning Attack;Compression Format and Systolic Array Structure Co-design for Accelerating Sparse Matrix Multiplication in DNNs;multidimensional Intrinsic Identity Construction and Dynamic Seamless Authentication Schemes in IoT Environments;invisible Backdoor Attack with Image Contours Triggers;finestra: Multi-aggregator Swarm Learning for Gradient Leakage Defense;DIsFU: Protecting Innocent Clients in Federated Unlearning;multiple-Round Aggregation of Abstract Semantics for Secure Heterogeneous Federated Learning;dynamic Privacy Protection with Large Language Model in Social Networks;a Dynamic Symmetric Searchable Encryption Scheme for Rapid Conjunctive Queries;a Data Watermark Scheme Base on Data Converted Bitmap for Data Trading;distributed Incentive Algorithm for Fine-Grained Offloading in Vehicular Ad Hoc Networks;mitigating Over-Unlearning in Machine Unlearning with Synthetic Data Augmentation;AW-YOLOv9: Adverse Weather Conditions Adaptation for UAV Detection;efficient and Privacy-Preserving Ranking-Based Federated Learning;on-Chain Dynamic Policy Evaluation for Decentralized Access Control;DPG-FairFL: A Dual-Phase GAN-Based Defense Framework Against Image-Based Fairness Data Poisoning Attacks in Federated Learning.
the proceedings contain 131 papers. the special focus in this conference is on algorithms and architectures for parallelprocessing. the topics include: MARO: Enabling Full MPI Automatic Refactoring in DSL-Based ...
ISBN:
(纸本)9789819615414
the proceedings contain 131 papers. the special focus in this conference is on algorithms and architectures for parallelprocessing. the topics include: MARO: Enabling Full MPI Automatic Refactoring in DSL-Based Programming Framework;SSC: An SRAM-Based Silence Computing Design for On-chip Memory;TP-BFT: A Faster Asynchronous BFT Consensus withparallel Structure;LTP: A Lightweight On-Chip Temporary Prefetcher for Data-Dependent Memory Accesses;A Neural Network-Based PUF Protection Method Against Machine Learning Attack;Compression Format and Systolic Array Structure Co-design for Accelerating Sparse Matrix Multiplication in DNNs;multidimensional Intrinsic Identity Construction and Dynamic Seamless Authentication Schemes in IoT Environments;invisible Backdoor Attack with Image Contours Triggers;finestra: Multi-aggregator Swarm Learning for Gradient Leakage Defense;DIsFU: Protecting Innocent Clients in Federated Unlearning;multiple-Round Aggregation of Abstract Semantics for Secure Heterogeneous Federated Learning;dynamic Privacy Protection with Large Language Model in Social Networks;a Dynamic Symmetric Searchable Encryption Scheme for Rapid Conjunctive Queries;a Data Watermark Scheme Base on Data Converted Bitmap for Data Trading;distributed Incentive Algorithm for Fine-Grained Offloading in Vehicular Ad Hoc Networks;mitigating Over-Unlearning in Machine Unlearning with Synthetic Data Augmentation;AW-YOLOv9: Adverse Weather Conditions Adaptation for UAV Detection;efficient and Privacy-Preserving Ranking-Based Federated Learning;on-Chain Dynamic Policy Evaluation for Decentralized Access Control;DPG-FairFL: A Dual-Phase GAN-Based Defense Framework Against Image-Based Fairness Data Poisoning Attacks in Federated Learning.
the proceedings contain 131 papers. the special focus in this conference is on algorithms and architectures for parallelprocessing. the topics include: MARO: Enabling Full MPI Automatic Refactoring in DSL-Based ...
ISBN:
(纸本)9789819615476
the proceedings contain 131 papers. the special focus in this conference is on algorithms and architectures for parallelprocessing. the topics include: MARO: Enabling Full MPI Automatic Refactoring in DSL-Based Programming Framework;SSC: An SRAM-Based Silence Computing Design for On-chip Memory;TP-BFT: A Faster Asynchronous BFT Consensus withparallel Structure;LTP: A Lightweight On-Chip Temporary Prefetcher for Data-Dependent Memory Accesses;A Neural Network-Based PUF Protection Method Against Machine Learning Attack;Compression Format and Systolic Array Structure Co-design for Accelerating Sparse Matrix Multiplication in DNNs;multidimensional Intrinsic Identity Construction and Dynamic Seamless Authentication Schemes in IoT Environments;invisible Backdoor Attack with Image Contours Triggers;finestra: Multi-aggregator Swarm Learning for Gradient Leakage Defense;DIsFU: Protecting Innocent Clients in Federated Unlearning;multiple-Round Aggregation of Abstract Semantics for Secure Heterogeneous Federated Learning;dynamic Privacy Protection with Large Language Model in Social Networks;a Dynamic Symmetric Searchable Encryption Scheme for Rapid Conjunctive Queries;a Data Watermark Scheme Base on Data Converted Bitmap for Data Trading;distributed Incentive Algorithm for Fine-Grained Offloading in Vehicular Ad Hoc Networks;mitigating Over-Unlearning in Machine Unlearning with Synthetic Data Augmentation;AW-YOLOv9: Adverse Weather Conditions Adaptation for UAV Detection;efficient and Privacy-Preserving Ranking-Based Federated Learning;on-Chain Dynamic Policy Evaluation for Decentralized Access Control;DPG-FairFL: A Dual-Phase GAN-Based Defense Framework Against Image-Based Fairness Data Poisoning Attacks in Federated Learning.
the proceedings contain 131 papers. the special focus in this conference is on algorithms and architectures for parallelprocessing. the topics include: MARO: Enabling Full MPI Automatic Refactoring in DSL-Based ...
ISBN:
(纸本)9789819615506
the proceedings contain 131 papers. the special focus in this conference is on algorithms and architectures for parallelprocessing. the topics include: MARO: Enabling Full MPI Automatic Refactoring in DSL-Based Programming Framework;SSC: An SRAM-Based Silence Computing Design for On-chip Memory;TP-BFT: A Faster Asynchronous BFT Consensus withparallel Structure;LTP: A Lightweight On-Chip Temporary Prefetcher for Data-Dependent Memory Accesses;A Neural Network-Based PUF Protection Method Against Machine Learning Attack;Compression Format and Systolic Array Structure Co-design for Accelerating Sparse Matrix Multiplication in DNNs;multidimensional Intrinsic Identity Construction and Dynamic Seamless Authentication Schemes in IoT Environments;invisible Backdoor Attack with Image Contours Triggers;finestra: Multi-aggregator Swarm Learning for Gradient Leakage Defense;DIsFU: Protecting Innocent Clients in Federated Unlearning;multiple-Round Aggregation of Abstract Semantics for Secure Heterogeneous Federated Learning;dynamic Privacy Protection with Large Language Model in Social Networks;a Dynamic Symmetric Searchable Encryption Scheme for Rapid Conjunctive Queries;a Data Watermark Scheme Base on Data Converted Bitmap for Data Trading;distributed Incentive Algorithm for Fine-Grained Offloading in Vehicular Ad Hoc Networks;mitigating Over-Unlearning in Machine Unlearning with Synthetic Data Augmentation;AW-YOLOv9: Adverse Weather Conditions Adaptation for UAV Detection;efficient and Privacy-Preserving Ranking-Based Federated Learning;on-Chain Dynamic Policy Evaluation for Decentralized Access Control;DPG-FairFL: A Dual-Phase GAN-Based Defense Framework Against Image-Based Fairness Data Poisoning Attacks in Federated Learning.
the proceedings contain 131 papers. the special focus in this conference is on algorithms and architectures for parallelprocessing. the topics include: MARO: Enabling Full MPI Automatic Refactoring in DSL-Based ...
ISBN:
(纸本)9789819615445
the proceedings contain 131 papers. the special focus in this conference is on algorithms and architectures for parallelprocessing. the topics include: MARO: Enabling Full MPI Automatic Refactoring in DSL-Based Programming Framework;SSC: An SRAM-Based Silence Computing Design for On-chip Memory;TP-BFT: A Faster Asynchronous BFT Consensus withparallel Structure;LTP: A Lightweight On-Chip Temporary Prefetcher for Data-Dependent Memory Accesses;A Neural Network-Based PUF Protection Method Against Machine Learning Attack;Compression Format and Systolic Array Structure Co-design for Accelerating Sparse Matrix Multiplication in DNNs;multidimensional Intrinsic Identity Construction and Dynamic Seamless Authentication Schemes in IoT Environments;invisible Backdoor Attack with Image Contours Triggers;finestra: Multi-aggregator Swarm Learning for Gradient Leakage Defense;DIsFU: Protecting Innocent Clients in Federated Unlearning;multiple-Round Aggregation of Abstract Semantics for Secure Heterogeneous Federated Learning;dynamic Privacy Protection with Large Language Model in Social Networks;a Dynamic Symmetric Searchable Encryption Scheme for Rapid Conjunctive Queries;a Data Watermark Scheme Base on Data Converted Bitmap for Data Trading;distributed Incentive Algorithm for Fine-Grained Offloading in Vehicular Ad Hoc Networks;mitigating Over-Unlearning in Machine Unlearning with Synthetic Data Augmentation;AW-YOLOv9: Adverse Weather Conditions Adaptation for UAV Detection;efficient and Privacy-Preserving Ranking-Based Federated Learning;on-Chain Dynamic Policy Evaluation for Decentralized Access Control;DPG-FairFL: A Dual-Phase GAN-Based Defense Framework Against Image-Based Fairness Data Poisoning Attacks in Federated Learning.
Efficient image processingarchitectures are consistently in demand across a multitude of applications, particularly those customized for resource-constrained systems-on-chip (SoC). the increasing need for high-perfor...
详细信息
ISBN:
(纸本)9798400709586
Efficient image processingarchitectures are consistently in demand across a multitude of applications, particularly those customized for resource-constrained systems-on-chip (SoC). the increasing need for high-performance image processing in various sectors has driven the development of specialized architectures. However, deploying such architectures on platforms with limited resources, such as SoCs, poses significant challenges. Furthermore, the implementation of complex algorithms to handle large datasets using software solutions often leads to slower response times, prompting exploration into hardware implementations. Field-Programmable Gate Arrays (FPGAs) are becoming popular for hardware implementations because of their attributes: low latency, connectivity, parallel computing capabilities, and flexibility. Consequently, the utilization of FPGA-based implementations has resulted in faster and more efficient performance of unique architectures tailored to specific requirements. this paper presents a novel hardware/software co-design approach to implement erosion, dilation, and neighborhood image processing operations on the FPGA development board, "Zedboard". In this approach, the FPGA is programmed by connecting it to a PC via USB, facilitating the transfer of an image pixel by pixel. the pixels are temporarily stored in on-chip DDR and accessed through DMA (Direct Memory Access) until they are requested by an interrupt signal from the Image processing IP, at which point they are moved to line buffers for faster processing. Once processed, the image is transmitted back to the PC via UART, facilitating pixel-by-pixel transfer for verification, where it is compared with a reference image generated using Python. this comparison confirms a 99.22% match between the processed image and the reference image, withthe discrepancy occurring at the image's edges due to initial padding. Additionally, the time required to process the entire image was measured and displayed
the proceedings contain 78 papers. the topics discussed include: efficient weighted multiselection in parallelarchitectures;local block factorization and its parallelization to block tridiagonal matrices;parity declu...
ISBN:
(纸本)0769515126
the proceedings contain 78 papers. the topics discussed include: efficient weighted multiselection in parallelarchitectures;local block factorization and its parallelization to block tridiagonal matrices;parity declustering data layout for tolerating dependent disk failures in network raid systems;an analysis of update ordering in a cluster of replicated servers;performance of dynamic load balancing algorithm on cluster of workstations and PCs;universal parallel numerical computing for 3d convection-diffusion equation with variable coefficients;efficient loop partitioning for parallel codes of irregular scientific computations;an evolutionary algorithm of contracting search space based on partial ordering relation for constrained optimization problems;a new divide and conquer algorithm for real symmetric band generalized eigenvalue problem;a framework of using cooperating mobile agents to achieve load sharing in distributed web server groups;and design and analysis of finite difference domain decomposition algorithms for the two-dimensional heat equation.
暂无评论