Some of the most challenging problems in science and engineering are being addressed by the integration of computation and science, a research ?eld known as computational science. Computational science plays a vital r...
详细信息
ISBN:
(数字)9783540448631
ISBN:
(纸本)9783540401964
Some of the most challenging problems in science and engineering are being addressed by the integration of computation and science, a research ?eld known as computational science. Computational science plays a vital role in fundamental advances in biology, physics, chemistry, astronomy, and a host of other disciplines. This is through the coordination of computation, data management, access to instrumentation, knowledge synthesis, and the use of new devices. It has an impact on researchers and practitioners in the sciences and beyond. The sheer size of many challenges in computational science dictates the use of supercomputing, parallel and distri- ted processing, grid-based processing, advanced visualization and sophisticated algorithms. At the dawn of the 21st century the series of International Conferences on Computational science (ICCS) was initiated with a ?rst meeting in May 2001 in San Francisco. The success of that meeting motivated the organization of the - cond meeting held in Amsterdam April 21–24, 2002, where over 500 participants pushed the research ?eld further. The International Conference on Computational science 2003 (ICCS 2003) is the follow-up to these earlier conferences. ICCS 2003 is unique, in that it was a single event held at two di?erent sites almost opposite each other on the globe – Melbourne, Australia and St. Petersburg, Russian Federation. The conference ran on the same dates at both locations and all the presented work was published in a single set of proceedings, which you hold in your hands right now.
This edited volume features a wide spectrum of the latest computerscience research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming langu...
详细信息
ISBN:
(数字)9783319326993
ISBN:
(纸本)9783319326979;9783319813493
This edited volume features a wide spectrum of the latest computerscience research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems.;This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computerscience research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.
Microservice architectures are increasingly used to modularize IoT applications and deploy them in distributed and heterogeneous edge computing environments. Over time, these microservice-based IoT applications are su...
详细信息
Microservice architectures are increasingly used to modularize IoT applications and deploy them in distributed and heterogeneous edge computing environments. Over time, these microservice-based IoT applications are susceptible to performance anomalies caused by resource hogging (e.g., CPU or memory), resource contention, etc., which can negatively impact their Quality of Service and violate their Service Level Agreements. Existing research on performance anomaly detection for edge computing environments focuses on model training approaches that either achieve high accuracy at the expense of a time-consuming and resource-intensive training process or prioritize training efficiency at the cost of lower accuracy. To address this gap, while considering the resource constraints and the large number of devices in modern edge platforms, we propose two clustering-based model training approaches: (1) intra-cluster parameter transfer learning-based model training (ICPTL) and (2) cluster-level model training (CM). These approaches aim to find a trade-off between the training efficiency of anomaly detection models and their accuracy. We compared the models trained under ICPTL and CM to models trained for specific devices (most accurate, least efficient) and a single general model trained for all devices (least accurate, most efficient). Our findings show that ICPTL’s model accuracy is comparable to that of the model per device approach while requiring only 40% of the training time. In addition, CM further improves training efficiency by requiring 23% less training time and reducing the number of trained models by approximately 66% compared to ICPTL, yet achieving a higher accuracy than a single general model.
This book constitutes the proceedings of the 4th International Conference on Social Informatics, SocInfo 2012, held in Lausanne, Switzerland, in December 2012. The 21 full papers, 18 short papers included in this vol...
详细信息
ISBN:
(数字)9783642353864
ISBN:
(纸本)9783642353857
This book constitutes the proceedings of the 4th International Conference on Social Informatics, SocInfo 2012, held in Lausanne, Switzerland, in December 2012.
The 21 full papers, 18 short papers included in this volume were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections named: social choice mechanisms in the e-society,computational models of social phenomena, social simulation, web mining and its social interpretations, algorithms and protocols inspired by human societies, socio-economic systems and applications, trust, privacy, risk and security in social contexts.
These proceedings contain the papers presented at the 4th International S- posium on Location and Context Awareness (LoCA) during May 7–8, 2009 in Tokyo,***-generation mobile and pervasive computingsystems. Pervasiv...
详细信息
ISBN:
(数字)9783642017216
ISBN:
(纸本)9783642017209
These proceedings contain the papers presented at the 4th International S- posium on Location and Context Awareness (LoCA) during May 7–8, 2009 in Tokyo,***-generation mobile and pervasive computingsystems. Pervasive computing is a model of computing in which computation is everywhere and computer functions are - tegrated into everything. The ultimate aim is to make information, applications and services available anywhere and at anytime in the human environment in a ?uid manner appropriate to our current context. Once away from the desktop, we ?nd ourselves in a wide variety of contexts and hence situations. For computing to be relevant and useful in these emerging situations we must rely on a range of contextual cues. Context includes phys- logical, environmental, and computational data, whether sensed or inferred. In addition, context includes details of a user’s activities, goals, abilities, pref- ences, a?ordances, and surroundings. With location and context awareness we can expect computers to deliver information, services, and entertainment in a way that maximizes convenience and minimizes intrusion.
Mathematical and statistical models have played important roles in neuroscience, especially by describing the electrical activity of neurons recorded individually, or collectively across large networks. As the field m...
详细信息
Mathematical and statistical models have played important roles in neuroscience, especially by describing the electrical activity of neurons recorded individually, or collectively across large networks. As the field moves forward rapidly, new challenges are emerging. For maximal effectiveness, those working to advance computational neuroscience will need to appreciate and exploit the complementary strengths of mechanistic theory and the statistical paradigm.
暂无评论