The proceedings contain 113 papers. The topics discussed include: looking into the black box: monitoring computer architecture simulations in real-time with AkitaRTM;chaining transactions for effective concurrency man...
ISBN:
(纸本)9798350350579
The proceedings contain 113 papers. The topics discussed include: looking into the black box: monitoring computer architecture simulations in real-time with AkitaRTM;chaining transactions for effective concurrency management in hardware transactional memory;FloatAP: supporting high-performance floating-point arithmetic in associative processors;a compiler-like framework for optimizing cryptographic big integer multiplication on GPUs;flag-proxy networks: overcoming the architectural, scheduling and decoding obstacles of quantum LDPC codes;SOPHGO BM1684X: a commercial high performance terminal AI processor with large model support;distributed page table: harnessing physical memory as an unbounded hashed page table;and ICED: an integrated CGRA framework enabling DVFS-aware acceleration.
The proliferation of social media has made sites like Twitter a treasure trove of information for diagnosing mental health problems like depression. By examining trends in user-generated material, this research presen...
详细信息
Threshold automata are a computational model that has proven to be versatile in modeling threshold-based distributed algorithms and enabling their completely automatic parameterized verification. We present novel tech...
详细信息
ISBN:
(纸本)9783031711619;9783031711626
Threshold automata are a computational model that has proven to be versatile in modeling threshold-based distributed algorithms and enabling their completely automatic parameterized verification. We present novel techniques for the verification of threshold automata, based on well-structured transition systems, that allow us to extend the expressiveness of both the computational model and the specifications that can be verified. In particular, we extend the model to allow decrements and resets of shared variables, possibly on cycles, and the specifications to general coverability. While these extensions of the model in general lead to undecidability, our algorithms provide a semi-decision procedure. We demonstrate the benefit of our extensions by showing that we can model complex round-based algorithms such as the phase king consensus algorithm and the Red Belly Blockchain protocol (published in 2019), and verify them fully automatically for the first time.
The advent of pervasive wireless systems faces several challenges due to the massive data traffic growth resulting from the interconnection of billions of new devices. This makes it essential to provide smart decision...
详细信息
This paper introduces a novel real-time intrusion detection approach for UAV networks, addressing current security challenges. We leverage Generative Adversarial networks (GANs) to generate synthetic data and implemen...
详细信息
Water is a significant resource in day-to-day life, and it usually requires technological association for comprehensive management. Smart Water Grids (SWG) typically use cyberphysical systems (CPS) to monitor several ...
详细信息
Split Computing (SC) is an attractive solution toward achieving an optimal balance between onboard capabilities, resource usage, and performance in Deep Neural networks (DNNs) in the context of Internet-of-Things appl...
详细信息
Over the past three decades, wireless communication has seen a significant surge, with Vehicular networks emerging as a prominent area of interest for researchers. Managing mobility in these networks presents a consid...
详细信息
ISBN:
(纸本)9783031829307;9783031829314
Over the past three decades, wireless communication has seen a significant surge, with Vehicular networks emerging as a prominent area of interest for researchers. Managing mobility in these networks presents a considerable challenge. Vehicles moving between roadside units or base stations can experience disruptions in real-time services such as Voice over IP (VoIP), media streaming, safety-critical data transmission, and gaming. Due to the typically high speed of vehicles, these movements often result in handovers and packet loss. This research introduces a novel approach to mobility management and handover execution for mobile vehicles travelling on highways, differing from traditional methods. The proposed model predicts a vehicle's movement from one base station to the next using a probabilistic method by the correspondent node, which then initiates the binding refresh procedure accordingly. This approach reduces control traffic overhead and packet loss, leading to more efficient use of limited wireless resources. The performance of the proposed algorithm has been evaluated through simulation, demonstrating its effectiveness in reducing packet loss, handover delay, and control traffic overhead.
Small bowel cancer is one of the rare tumors that often stays untreated until it has spread to a more advanced stage. Cancer is the leading cause of death in the globe. Early detection is critical for successful treat...
详细信息
The proceedings contain 23 papers. The topics discussed include: resource optimization of stream processing in layered Internet of Things;range-based set reconciliation;FreSh: a lock-free data series index;PRISPARK: d...
ISBN:
(纸本)9798350329100
The proceedings contain 23 papers. The topics discussed include: resource optimization of stream processing in layered Internet of Things;range-based set reconciliation;FreSh: a lock-free data series index;PRISPARK: differential privacy enforcement for big data computing in Apache spark;subdomain protection is needed: an SPF and DMARC-based empirical measurement study and proactive solution of email security;low-overhead routing for offchain networks with high resource utilization;SilenTower: a robust, scalable and secure watchtower with silent executors;extending the boundaries and exploring the limits of blockchain compression;detective-dee: a non-intrusive in situ anomaly detection and fault localization framework;and CRIBA: a tool for comprehensive analysis of cryptographic ransomware’s I/O behavior.
暂无评论