the proceedings contain 259 papers. the topics discussed include: EdGCon: auto-assigner of iconicity ratings grounded by lexical properties to aid in generation of technical gestures;a semantic evidence-based approach...
ISBN:
(纸本)9781450395175
the proceedings contain 259 papers. the topics discussed include: EdGCon: auto-assigner of iconicity ratings grounded by lexical properties to aid in generation of technical gestures;a semantic evidence-based approach to continuous cloud service certification;digital forgetting using key decay;on the measurement of performance metrics for virtualization-enhanced architectures;COSTA: a cost-driven solution for migrating applications in multi-cloud environments;towards a high-interaction physics-aware honeynet for industrial control systems;enhancing polar codes efficiency on 3D flash memory by exploiting multiple error variations;traffic intersections as agents: a model checking approach for analyzing communicating agents;an extensible framework for implementing byzantine fault-tolerant protocols;detection of adversarial attacks by observing deep features with structured data algorithms;and proof of swarm based ensemble learning for federated learning applications.
the proceedings contain 272 papers. the topics discussed include: residual size is not enough for anomaly detection: improving detection performance using residual similarity in multivariate time series;CSP specificat...
ISBN:
(纸本)9781450387132
the proceedings contain 272 papers. the topics discussed include: residual size is not enough for anomaly detection: improving detection performance using residual similarity in multivariate time series;CSP specification and verification of relay-based railway interlocking systems;on enduring more data through enabling page rewrite capability on multi-level-cell flash memory;RAM: exploiting restrained and approximate management for enabling neural network training on NVM-based systems;CIIA: critical infrastructure impact assessment;ontology-based user privacy management in the smart grid;efficient and scalable geographical peer matching for P2P energy sharing communities;planetary digital twin: a case study in aquaculture;a framework for representing internet of things security and privacy policies and detecting potential problems;and energy-efficient fog computing-enabled data transmission protocol in tactile internet-based applications.
the proceedings contain 255 papers. the topics discussed include: coordination of marine multi robot systems with communication constraints;detection of war-caused agricultural field damages using sentinel-2 satellite...
ISBN:
(纸本)9798400702433
the proceedings contain 255 papers. the topics discussed include: coordination of marine multi robot systems with communication constraints;detection of war-caused agricultural field damages using sentinel-2 satellite data with machine learning and anomaly detection;real-time 3D registration and fusion with SRAM-based analog in-memory computing;enhancing safety in cyber-physical systems through runtime enforcement;least privilege persistent-storage access in web browsers;rescuing QUIC flows from countermeasures against UDP flooding attacks;avoiding empty instances and offset drifts of basic sequencer tasks in automotive operating system;trustful coopetitive infrastructures for the new space exploration era;knowledge base grounded pre-trained language models via distillation;and CoSMo: a multilingual modular language for content selection modelling.
this paper presents a configurable approximate quantum multiplier that integrates approximate and exact controlled adders with a truncation scheme to balance accuracy and circuit complexity in noisy quantum environmen...
详细信息
ISBN:
(纸本)9798400706295
this paper presents a configurable approximate quantum multiplier that integrates approximate and exact controlled adders with a truncation scheme to balance accuracy and circuit complexity in noisy quantum environments. It achieves significant enhancements in error metrics over an exact multiplier, demonstrating its potential for noise-resilient quantum computing in noisy quantum devices.
In-memory computing systems are designed to offload workloads without transmitting tasks between CPU or GPU, reducing energy consumption. 3D sensors generate events of interest, usually powered by harvested energy or ...
详细信息
the demand for low latency, bandwidth efficiency, and privacy has driven distributed applications to the network edge, where heterogeneous, and untrusted, and uncontrolled networks pose challenges. this paper presents...
详细信息
ISBN:
(纸本)9798400706295
the demand for low latency, bandwidth efficiency, and privacy has driven distributed applications to the network edge, where heterogeneous, and untrusted, and uncontrolled networks pose challenges. this paper presents a software-defined overlay networking (SDON) middleware that simplifies application development through centralized control of edge resources while addressing many challenges prevalent at the edge. SDON enables applications to specify high-level requirements, such as service placement and communication goals. these are automatically translated into device-specific configurations and deployed on appropriate edge resources. the middleware is implemented as fully functional software, published as open-source, and will be evaluated in multiple edge computing use cases, to demonstrate its application optimization potential.
the rapid advancement in electronics, embedded systems, wireless communications, computer software applications and artificial intelligence is expanding the use of the Internet-of-things (IoT) in many application doma...
详细信息
Bias detection and mitigation is an active area of research in machine learning. this work extends previous research done by the authors Van Busum and Fang (proceedings of the 38thacm/sigappsymposium on applied Comp...
详细信息
the proceedings contain 26 papers. the topics discussed include: discovery of patent influence with directed acyclic graph network analysis;FedShare: secure aggregation based on additive secret sharing in federated le...
ISBN:
(纸本)9798400707445
the proceedings contain 26 papers. the topics discussed include: discovery of patent influence with directed acyclic graph network analysis;FedShare: secure aggregation based on additive secret sharing in federated learning;enhancing declarative temporal model mining in relational databases: a preliminary study;condensed nearest neighbor rules for multi-label datasets;challenges of spatio-temporal trajectory data use: focus group findings from the 1st International Summer School on Data Science for Mobility;BIOCHAIN: towards a platform for securely sharing microbiological data;very fast variations of training set size reduction algorithms for instance-based classification;bitcoin price prediction considering sentiment analysis on Twitter and Google News;approach considering collective intelligence for interactive web services composition;information visualization for industrial process monitoring;and AdapterEM: pre-trained language model adaptation for generalized entity matching using adapter-tuning.
In this paper, we focus on how the main operations in evolutionary algorithms spend energy in two different languages: C++ and zig. By setting up a methodology that gives us a precise measure of the energy spent by ke...
详细信息
ISBN:
(纸本)9798400706295
In this paper, we focus on how the main operations in evolutionary algorithms spend energy in two different languages: C++ and zig. By setting up a methodology that gives us a precise measure of the energy spent by key evolutionary algorithm functions, we can give the scientific software engineer some actionable insights on how to write energy-conscious evolutionary algorithms. Our experiments show that C++ using the well-known GNU compiler can achieve a 50% reduction in energy consumption for some integer-based fitness functions, as well as very good performance on classical genetic operators.
暂无评论