The proceedings contain 95 papers. The topics discussed include: distributed sparse random projection trees for constructing K-nearest neighbor graphs;fast deterministic gathering with detection on arbitrary graphs: t...
ISBN:
(纸本)9798350337662
The proceedings contain 95 papers. The topics discussed include: distributed sparse random projection trees for constructing K-nearest neighbor graphs;fast deterministic gathering with detection on arbitrary graphs: the power of many robots;accurate and efficient distributed covid-19 spread prediction based on a large-scale time-varying people mobility graph;accelerating packet processing in container overlay networks via packet-level parallelism;efficient hardware primitives for immediate memory reclamation in optimistic data structures;efficient hardware primitives for immediate memory reclamation in optimistic data structures;accelerating distributed deep learning training with compression assisted Allgather and reduce-scatter communication;accelerating CNN inference on long vector architectures via co-design;exploiting input tensor dynamics in activation checkpointing for efficient training on GPU;drill: log-based anomaly detection for large-scale storage systems using source code analysis;dynasparse: accelerating GNN inference through dynamic sparsity exploitation;exploiting sparsity in pruned neural networks to optimize large model training;SRC: mitigate I/O throughput degradation in network congestion control of disaggregated storage systems;boosting multi-block repair in cloud storage systems with wide-stripe erasure coding;on doorway egress by autonomous robots;and on the arithmetic intensity of distributed-memory dense matrix multiplication involving a symmetric input matrix (SYMM).
The proceedings contain 202 papers. The topics discussed include: multi-relational graph convolutional networks for skeleton-based action recognition;identifying the right person in social networks with double metapho...
ISBN:
(纸本)9781665414852
The proceedings contain 202 papers. The topics discussed include: multi-relational graph convolutional networks for skeleton-based action recognition;identifying the right person in social networks with double metaphone codes;a novel strong cache consistency mechanism in ICN based on role division and lease model;demystifying the largest live game streaming platform via black-box measurement;framework-agnostic optimization of repeated skewed joins at massive scale;remote procedure call optimization of big data systems based on data awareness;MCSEC: secure coded matrix multiplication scheme for edge computing with minimum communication cost;low-rate DoS attack detection based on WPD-EE algorithm;user identity linkage across location-based social networks with spatio-temporal check-in patterns;optimizing 3-D placement of multiple UAVs based on Taguchi’s method;and feature envy detection based on Bi-LSTM with self-attention mechanism.
The proceedings contain 311 papers. The topics discussed include: a robust image hashing with enhanced randomness by using random walk on zigzag blocking;securing fast learning! ridge regression over encrypted big dat...
ISBN:
(纸本)9781509032051
The proceedings contain 311 papers. The topics discussed include: a robust image hashing with enhanced randomness by using random walk on zigzag blocking;securing fast learning! ridge regression over encrypted big data;computational trust model for repeated trust games;formal analysis of selective disclosure attribute-based credential system in applied Pi calculus;node trust prediction framework in mobile ad hoc networks;trust enhancement over range search for encrypted data;healthcare fraud detection based on trustworthiness of doctors;integrated security for services hosted in virtual environments;a permissioned blockchain framework for supporting instant transaction and dynamic block size;trust validation of cloud IaaS: a customer-centric approach;distributed bitcoin account management;trusted Boolean search on cloud using searchable symmetric encryption;and dynamic attribute-based access control in cloud storage systems.
The proceedings contain 161 papers. The topics discussed include: deep learning for phishing detection;a partition matching method for optimal attack path analysis;an energy and robustness adjustable optimization meth...
ISBN:
(纸本)9781728111414
The proceedings contain 161 papers. The topics discussed include: deep learning for phishing detection;a partition matching method for optimal attack path analysis;an energy and robustness adjustable optimization method of file distribution services;deriving the political affinity of twitter users from their followers;on the usability of big (social) data;re-running large-scale parallel programs using two nodes;predicting hacker adoption on darkweb forums using sequential rule mining;an on-the-fly scheduling strategy for distributed stream processing platform;deadlock-free adaptive routing based on the repetitive turn model for 3D network-on-chip;and radix: enabling high-throughput georeferencing for phenotype monitoring over voluminous observational data.
The proceedings contain 173 papers. The topics discussed include: portable implementation of advanced driver-assistance algorithms on heterogeneous architectures;improving CPU performance through dynamic GPU access th...
ISBN:
(纸本)9781538634080
The proceedings contain 173 papers. The topics discussed include: portable implementation of advanced driver-assistance algorithms on heterogeneous architectures;improving CPU performance through dynamic GPU access throttling in CPU-GPU heterogeneous processors;alternative processor within threshold: flexible scheduling on heterogeneous systems;preemptive resource management for dynamically arriving tasks in an oversubscribed heterogeneous computing system;modeling of applications and hardware to explore task mapping and scheduling strategies on a heterogeneous micro-server system;consumer-and-provider-oriented efficient IaaS resource allocation;a pipelined and scalable dataflow implementation of convolutional neural networks on FPGA;on-chip memory based binarized convolutional deep neural network applying batch normalization free technique on an FPGA;automatic flow selection and quality-of-result estimation for FPGA placement;exploiting decoupled OpenCL work-items with data dependencies on FPGAs: a case study;ReEP: a toolset for generation and programming of reconfigurable datapaths for event processing;a generic approach to the development of coprocessors for elliptic curve cryptosystems;a hardware acceleration for surface EMG non-negative matrix factorization;and on-FPGA real-time processing of biological signals from high-density MEAs: a design space exploration.
The proceedings contain 117 papers. The topics discussed include: detection of a novel dual attack in named data networking;fair DMA scheduler for low-latency accelerator offloading;multi-attribute decision-making met...
ISBN:
(纸本)9781665464970
The proceedings contain 117 papers. The topics discussed include: detection of a novel dual attack in named data networking;fair DMA scheduler for low-latency accelerator offloading;multi-attribute decision-making method based on interval intuitionistic trapezoidal fuzzy number to determine the expert weight: note: sub-titles are not captured in Xplore and should not be used;binary-level directed symbolic execution through pattern learning;an efficient metric-based approach for static use-after-free detection;a graph convolution neural network based method for insider threat detection;maintenance worker scheduling for charging pile fault: a multi-agent RL approach;towards secure bilateral friend query with conjunctive policy matching in social networks;structure-noise-aware anchor link prediction across social networks;file system to support secure cloud-based sharing;discovering agent models using process mining: initial approach and a case study;and towards agent-based simulation of the parallel trading market of pharmaceuticals.
暂无评论