This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004. The goal of the conference was ...
详细信息
ISBN:
(数字)9783540301417
ISBN:
(纸本)9783540233886
This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004. The goal of the conference was to establish an international forum for engineers and scientists to present their ideas and experiences in network and parallel computing. A total of 338 submissions were received in response to the call for papers. These papers werefrom Australia, Brazil,Canada,China, Finland, France, G- many, Hong Kong, India, Iran, Italy, Japan, Korea, Luxemburg, Malaysia, N- way, Spain, Sweden, Taiwan, UK, and USA. Each submission was sent to at least three *** paper was judged according to its originality,inno- tion, readability, and relevance to the expected audience. Based on the reviews received, a total of 69 papers were accepted to be included in the proceedings. Among the 69 papers, 46 were accepted as full papers and were presented at the *** accepted23papersasshortpapers;eachofthesepaperswas given an opportunity to have a brief presentation at the conference, followed by discussions in a poster session. Thus, due to the limited scope and time of the conference and the high number of submissions received, only 20% of the total submissions were included in the ?nal program.
After two decades, data processing has finally, and probably forever, found its niche among civil engineering and construction (CEC) professionnals, through word processors, digitizing tables, management software, and...
详细信息
ISBN:
(数字)9781468474046
ISBN:
(纸本)9781850912538
After two decades, data processing has finally, and probably forever, found its niche among civil engineering and construction (CEC) professionnals, through word processors, digitizing tables, management software, and increasingly via drawing software and computer-aided design (CAD), recently, robots have even started invading work sites. What are the main trends of CAD and robotics in the field of architecture and civil enginee ring? What type of R&D effort do university and industrial laboratories undertake to devise the professional software that will be on the market in the next three to five years? These are the issues which will be addressed during this symposium. To this effect, we have planned concurrently an equipment and software show, as well as a twofold conference. Robotic is just starting in the field of civil engineering and construction. A pioneer, the Civil Engineering Departement of Carnegie-Mellon University, in the United States, organized the first two international symposia, in 1984 and 1985 in Pittsburgh. This is the third meeting on the subject (this year, however, we have also included CAD). It constitutes the first large international symposium where CAD experts, specialists in architecture and CEC robotics will meet. From this standpoint, it should be an ideal forum for exchanging views and expe riences on a wide range of topics, and we hope it will give rise to novel applications and new syntheses. This symposium is intented for scientists, teachers, students and also for manufacturers and all CEC professionals.
The goal of this book is to explore various security paradigms such as Machine Learning, Big data, Cyber Physical systems, and Blockchain to address both intelligence and reconfigurability in various IoT devices. The ...
详细信息
ISBN:
(数字)9783031319525
ISBN:
(纸本)9783031319518;9783031319549
The goal of this book is to explore various security paradigms such as Machine Learning, Big data, Cyber Physical systems, and Blockchain to address both intelligence and reconfigurability in various IoT devices. The book further aims to address and analyze the state of the art of blockchain-based intelligent networks in IoT systems and related technologies including healthcare sector. AI can ease, optimize, and automate the blockchain-based decision-making process for better governance and higher performance in IoT systems. Considering the incredible progress made by AI models, a blockchain system powered by intelligent AI algorithms can detect the existence of any kind of attack and automatically invoke the required defense mechanisms. In case of unavoidable damage, AI models can help to isolate the compromised component from the blockchain platform and safeguard the overall system from crashing. Furthermore, AI models can also contribute toward the robustness and scalability of blockchain-based intelligent IoT networks. The book is designed to be the first-choice reference at university libraries, academic institutions, research and development centers, information technology centers, and any institutions interested in integration of AI and IoT. The intended audience of this book include UG/PG students, Ph.D. scholars of this fields, industry technologists, young entrepreneurs, professionals, network designers, data scientists, technology specialists, practitioners, and people who are interested in exploring the role of AI and blockchain technology in IoT systems.
WebAssembly (abbreviated as Wasm) was initially introduced for the Web and quickly extended its reach into various domains beyond the Web. To create Wasm applications, developers can compile high-level programming lan...
详细信息
WebAssembly (abbreviated as Wasm) was initially introduced for the Web and quickly extended its reach into various domains beyond the Web. To create Wasm applications, developers can compile high-level programming languages into Wasm binaries or manually write the textual format of Wasm and translate it into Wasm binaries by the toolchain. Regardless of whether it is utilized within or outside the Web, the execution of Wasm binaries is supported by the Wasm runtime. Such a runtime provides a secure, memory-efficient, and sandboxed execution environment to execute Wasm binaries. This paper provides a comprehensive survey of research on Wasm runtimes with 103 collected research papers related to Wasm runtimes following the traditional systematic literature review process. It characterizes existing studies from two different angles, including the internal research of Wasm runtimes (Wasm runtime design, testing, and analysis) and the external research (applying Wasm runtimes to various domains). This paper also proposes future research directions about Wasm runtimes.
The advancement of the Internet of Medical Things (IoMT) has led to the emergence of various health and emotion care services, e.g., health monitoring. To cater to increasing computational requirements of IoMT service...
详细信息
The advancement of the Internet of Medical Things (IoMT) has led to the emergence of various health and emotion care services, e.g., health monitoring. To cater to increasing computational requirements of IoMT services, Mobile Edge computing (MEC) has emerged as an indispensable technology in smart health. Benefiting from the cost-effectiveness of deployment, unmanned aerial vehicles (UAVs) equipped with MEC servers in Non-Orthogonal Multiple Access (NOMA) have emerged as a promising solution for providing smart health services in proximity to medical devices (MDs). However, the escalating number of MDs and the limited availability of communication resources of UAVs give rise to a significant increase in transmission latency. Moreover, due to the limited communication range of UAVs, the geographically-distributed MDs lead to workload imbalance of UAVs, which deteriorates the service response delay. To this end, this paper proposes a UAV-enabled Distributed computation Offloading and Power control method with Multi-Agent, named DOPMA, for NOMA-based IoMT environment. Specifically, this paper introduces computation and transmission queue models to analyze the dynamic characteristics of task execution latency and energy consumption. Moreover, a credit assignment scheme-based reward function is designed considering both system-level rewards and rewards tailored to each MD, and an improved multi-agent deep deterministic policy gradient algorithm is developed to derive offloading and power control decisions independently. Extensive simulations demonstrate that the proposed method outperforms existing schemes, achieving \(7.1\%\) reduction in energy consumption and \(16\%\) decrease in average delay.
Welcome to the proceedings of GCC2004 and the city of Wuhan. Grid computing has become a mainstream research area in computerscience and the GCC conference has become one of the premier forums for presentation of new...
详细信息
ISBN:
(数字)9783540302087
ISBN:
(纸本)9783540235644
Welcome to the proceedings of GCC2004 and the city of Wuhan. Grid computing has become a mainstream research area in computerscience and the GCC conference has become one of the premier forums for presentation of new and exciting research in all aspectsofgridandcooperativecomputing. Theprogramcommitteeispleasedtopresent the proceedings of the 3rd International Conference on Grid and Cooperative Comp- ing (GCC2004), which comprises a collection of excellent technical papers, posters, workshops, and keynote speeches. The papers accepted cover a wide range of exciting topics, including resource grid and service grid, information grid and knowledge grid, grid monitoring,managementand organizationtools, grid portal, grid service, Web s- vices and their QoS, service orchestration, grid middleware and toolkits, software glue technologies, grid security, innovative grid applications, advanced resource reservation andscheduling,performanceevaluationandmodeling,computer-supportedcooperative work, P2P computing, automatic computing, and meta-information management. The conference continues to grow and this year a record total of 581 manuscripts (including workshop submissions) were submitted for consideration. Expecting this growth, the size of the program committee was increased from 50 members for GCC 2003 for 70 in GCC 2004. Relevant differences from previous editions of the conf- ence: it is worth mentioning a signi?cant increase in the number of papers submitted by authors from outside China; and the acceptance rate was much lower than for p- vious GCC conferences. From the 427 papers submitted to the main conference, the program committee selected only 96 regular papers for oral presentation and 62 short papers for poster presentation in the program.
With the continuous growth of user scale and application data, the demand for large-scale concurrent graph processing is increasing. Typically, large-scale concurrent graph processing jobs need to process correspondin...
详细信息
With the continuous growth of user scale and application data, the demand for large-scale concurrent graph processing is increasing. Typically, large-scale concurrent graph processing jobs need to process corresponding snapshots of dynamically changing graph data to obtain information at different time points. To enhance the throughput of such applications, current solutions concurrently process multiple graph snapshots on the GPU. However, when dealing with rapidly changing graph data, transferring multiple snapshots of concurrent jobs to the GPU results in high data transfer overhead between CPU and GPU. Additionally, the execution mode of existing work suffers from underutilization of GPU computational *** this work, we introduce CGCGraph, which can be integrated into existing GPU graph processing systems like Subway, to enable efficient concurrent graph snapshot processing jobs and enhance overall system resource utilization. The key idea is to offload unshared graph data of multiple concurrent snapshots to the CPU, reducing CPU-GPU transfer overhead. By implementing CPU-GPU co-execution, there is potential for enhanced utilization of GPU computing resources. Specifically, CGCGraph leverages kernel fusion to process shared graph data concurrently on the GPU, while executing all snapshots in parallel on the CPU, with each snapshot assigned a dedicated thread. This approach enables efficient concurrent processing within a novel CPU-GPU co-execution model, incorporating three optimization strategies targeting storage, computation, and synchronization. We integrate CGCGraph with Subway, an existing system designed for out-of-GPU-memory static graph processing. Experimental results show that the integration of CGCGraph with current GPU-based systems obtains performance improvements ranging from 1.7 to 4.5 times.
This volume contains the proceedings of the Third International DMTF Academic Alliance Workshop on systems and Virtualization Management: Standards and the Cloud (SVM 2009) held in Wuhan, China, during September 22-23...
详细信息
ISBN:
(数字)9783642149443
ISBN:
(纸本)9783642149436
This volume contains the proceedings of the Third International DMTF Academic Alliance Workshop on systems and Virtualization Management: Standards and the Cloud (SVM 2009) held in Wuhan, China, during September 22-23, 2009. The SVM 2009 proceedings are intended for use by students of systems and vir- alization management. The reader is presumed to have a basic knowledge of systems management technologies and standards at the level provided, for example, by the Common Information Model (CIM) standard for modeling management resources. The student of systems management will find here material that could be included in an advanced study program. These proceedings should furthermore allow students to acquire an appreciation of the breadth and variety of systems and virtualization m- agement research. The proceedings also illuminate related standards and research issues, answering questions such as: what are the implications of virtualization for distributed systems management, which advances in information models and protocols aid in managing virtualization, what new problems will we incur when managing virtualized systems and services, and how might management itself benefit from virtualization? Topics related to managing distributed systems, virtualization of distributed - sources/services and work in management standardization are also highlighted. There were 28 regular paper submissions. These went through an active review process, with each submission reviewed by at least three members of the Program Committee. We also sought external reviews from experts in certain areas. All these inputs were used by the Program Committee in selecting a final program with 12 regular papers.
暂无评论