語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
到查詢結果
[ author_sort:"qiu, meikang." ]
切換:
標籤
|
MARC模式
|
ISBD
Algorithms and architectures for par...
~
(1998 :)
Algorithms and architectures for parallel processing20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, proceedings.Part III /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Algorithms and architectures for parallel processingedited by Meikang Qiu.
其他題名:
20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, proceedings.
其他題名:
ICA3PP 2020
其他作者:
Qiu, Meikang.
團體作者:
出版者:
Cham :Springer International Publishing :2020.
面頁冊數:
xv, 712 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Parallel processing (Electronic computers)
電子資源:
https://doi.org/10.1007/978-3-030-60248-2
ISBN:
9783030602482$q(electronic bk.)
Algorithms and architectures for parallel processing20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, proceedings.Part III /
Algorithms and architectures for parallel processing
20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, proceedings.Part III /[electronic resource] :ICA3PP 2020edited by Meikang Qiu. - Cham :Springer International Publishing :2020. - xv, 712 p. :ill., digital ;24 cm. - Theoretical computer science and general issues ;12454. - Theoretical computer science and general issues ;11195..
Understanding Privacy-preserving Techniques in Digital Cryptocurrencies -- LNBFSM: A Food Safety Management System Using Blockchain and Lightning Network -- Reputation-based Trustworthy Supply Chain Management Using Smart Contract -- Content-aware Anomaly Detection with Network Representation Learning -- Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree -- IM-ACS: An Access Control Scheme Supporting Informal non-Malleable Security in Mobile Media Sharing System -- Blockchain-Based Secure and Privacy-Preserving Clinical Data Sharing and Integration -- Blockchain Meets DAG: A BlockDAG Consensus Mechanism -- Dynamic Co-located VM Detection and Membership Update for Residency Aware Inter-VM Communication in Virtualized Clouds -- An attack-immune trusted architecture for supervisory intelligent terminal -- A simulation study on block generation algorithm based on TPS model -- Improving iForest for Hydrological Time Series Anomaly Detection -- Machine Learning-based Attack Detection Method in Hadoop -- Profiling-based Big Data Workflow Optimization in a Cross-Layer Coupled Design Framework -- Detection of Loose Tracking Behavior over Trajectory Data -- Behavioral fault modeling and analysis with BIP: A Wheel Brake System Case Study -- H2P: A Novel Model to Study the Propagation of Modern Hybrid Worm in Hierarchical Networks -- Design of six-rotor drone based on target detection for intelligent agriculture -- Consensus in Lens of Consortium Blockchain: An Empirical Study -- Collaborative design service system based on ceramic cloud service platform -- Towards NoC protection of HT-Greyhole attack -- Cross-Shard Transaction Processing in Sharding Blockchains -- Lexicon-Enhanced Transformer With Pointing For Domains Specific Generative Question Answering -- Design of Smart Home System Based on Collaborative Edge Computing and Cloud Computing -- Classification of Depression Based on Local Binary Pattern and Singular Spectrum Analysis -- Cloud Allocation and Consolidation Based on a Scalability Metric -- Adversarial Attacks on Deep Learning Models of Computer Vision: A Survey -- PLRS: Personalized literature hybrid recommendation system with paper influence- FleetChain: A Secure Scalable and Responsive Blockchain Achieving Optimal Sharding -- DSBFT: A Delegation based Scalable Byzantine False Tolerance Consensus Mechanism -- A Privacy-Preserving Approach for Continuous Data Publication -- Web Attack Detection based on User Behaviour Semantics -- A Supervised Anonymous Issuance scheme of Central Bank Digital Currency based on Blockchain -- IncreAIBMF: Incremental Learning for Encrypted Mobile Application Identification -- A Multi-Level Features Fusion Network for Detecting Obstructive Sleep Apnea Hypopnea Syndrome -- BIMP: Blockchain-Based Incentive Mechanism With Privacy Preserving in Location Proof -- Indoor Positioning and Prediction in Smart Elderly Care: Model, System and Applications -- Research on Stylization Algorithm of Ceramic Decorative Pattern Based on Ceramic Cloud Design Service Platform- Blockchain Consensus Mechanisms and Their Applications in IoT: A Literature Survey -- Towards A secure Communication of Data in IoT Networks: A Technical Research Report -- B Efficient Thermography Guided Learning for Breast Cancer Detection -- PTangle: A Parallel Detector for Unverified Blockchain Transactions -- DOS-GAN: A Distributed Over-Sampling Method Based on Generative Adversarial Networks For Distributed Class-Imbalance Learning -- Effective Sentiment Analysis for Multimodal Review Data on the Web -- Digital Currency Investment Strategy Framework Based on Ranking- Authentication Study for Brain-based Computer Interfaces using Music Stimulations -- An Ensemble Learning Approach to Detect Malwares Based on Static Information -- Automatic Medical Image Report Generation With Multi-View and Multi-Modal Attention Mechanism.
This three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020. The total of 142 full papers and 5 short papers included in this proceedings volumes was carefully reviewed and selected from 495 submissions. ICA3PP is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspects of daily life, the power of computing system has become increasingly critical. This conference provides a forum for academics and practitioners from countries around the world to exchange ideas for improving the efficiency, performance, reliability, security and interoperability of computing systems and applications. ICA3PP 2020 focus on two broad areas of parallel and distributed computing, i.e. architectures, algorithms and networks, and systems and applications.
ISBN: 9783030602482$q(electronic bk.)
Standard No.: 10.1007/978-3-030-60248-2doiSubjects--Topical Terms:
184697
Parallel processing (Electronic computers)
LC Class. No.: QA76.58
Dewey Class. No.: 005.1
Algorithms and architectures for parallel processing20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, proceedings.Part III /
LDR
:06218nmm a2200349 a 4500
001
586258
003
DE-He213
005
20210128134759.0
006
m d
007
cr nn 008maaau
008
210323s2020 sz s 0 eng d
020
$a
9783030602482$q(electronic bk.)
020
$a
9783030602475$q(paper)
024
7
$a
10.1007/978-3-030-60248-2
$2
doi
035
$a
978-3-030-60248-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.58
072
7
$a
PBKS
$2
bicssc
072
7
$a
MAT006000
$2
bisacsh
072
7
$a
PBKS
$2
thema
082
0 4
$a
005.1
$2
23
090
$a
QA76.58
$b
.I61 2020
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Algorithms and architectures for parallel processing
$h
[electronic resource] :
$b
20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, proceedings.
$n
Part III /
$c
edited by Meikang Qiu.
246
3
$a
ICA3PP 2020
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xv, 712 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Theoretical computer science and general issues ;
$v
12454
505
0
$a
Understanding Privacy-preserving Techniques in Digital Cryptocurrencies -- LNBFSM: A Food Safety Management System Using Blockchain and Lightning Network -- Reputation-based Trustworthy Supply Chain Management Using Smart Contract -- Content-aware Anomaly Detection with Network Representation Learning -- Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree -- IM-ACS: An Access Control Scheme Supporting Informal non-Malleable Security in Mobile Media Sharing System -- Blockchain-Based Secure and Privacy-Preserving Clinical Data Sharing and Integration -- Blockchain Meets DAG: A BlockDAG Consensus Mechanism -- Dynamic Co-located VM Detection and Membership Update for Residency Aware Inter-VM Communication in Virtualized Clouds -- An attack-immune trusted architecture for supervisory intelligent terminal -- A simulation study on block generation algorithm based on TPS model -- Improving iForest for Hydrological Time Series Anomaly Detection -- Machine Learning-based Attack Detection Method in Hadoop -- Profiling-based Big Data Workflow Optimization in a Cross-Layer Coupled Design Framework -- Detection of Loose Tracking Behavior over Trajectory Data -- Behavioral fault modeling and analysis with BIP: A Wheel Brake System Case Study -- H2P: A Novel Model to Study the Propagation of Modern Hybrid Worm in Hierarchical Networks -- Design of six-rotor drone based on target detection for intelligent agriculture -- Consensus in Lens of Consortium Blockchain: An Empirical Study -- Collaborative design service system based on ceramic cloud service platform -- Towards NoC protection of HT-Greyhole attack -- Cross-Shard Transaction Processing in Sharding Blockchains -- Lexicon-Enhanced Transformer With Pointing For Domains Specific Generative Question Answering -- Design of Smart Home System Based on Collaborative Edge Computing and Cloud Computing -- Classification of Depression Based on Local Binary Pattern and Singular Spectrum Analysis -- Cloud Allocation and Consolidation Based on a Scalability Metric -- Adversarial Attacks on Deep Learning Models of Computer Vision: A Survey -- PLRS: Personalized literature hybrid recommendation system with paper influence- FleetChain: A Secure Scalable and Responsive Blockchain Achieving Optimal Sharding -- DSBFT: A Delegation based Scalable Byzantine False Tolerance Consensus Mechanism -- A Privacy-Preserving Approach for Continuous Data Publication -- Web Attack Detection based on User Behaviour Semantics -- A Supervised Anonymous Issuance scheme of Central Bank Digital Currency based on Blockchain -- IncreAIBMF: Incremental Learning for Encrypted Mobile Application Identification -- A Multi-Level Features Fusion Network for Detecting Obstructive Sleep Apnea Hypopnea Syndrome -- BIMP: Blockchain-Based Incentive Mechanism With Privacy Preserving in Location Proof -- Indoor Positioning and Prediction in Smart Elderly Care: Model, System and Applications -- Research on Stylization Algorithm of Ceramic Decorative Pattern Based on Ceramic Cloud Design Service Platform- Blockchain Consensus Mechanisms and Their Applications in IoT: A Literature Survey -- Towards A secure Communication of Data in IoT Networks: A Technical Research Report -- B Efficient Thermography Guided Learning for Breast Cancer Detection -- PTangle: A Parallel Detector for Unverified Blockchain Transactions -- DOS-GAN: A Distributed Over-Sampling Method Based on Generative Adversarial Networks For Distributed Class-Imbalance Learning -- Effective Sentiment Analysis for Multimodal Review Data on the Web -- Digital Currency Investment Strategy Framework Based on Ranking- Authentication Study for Brain-based Computer Interfaces using Music Stimulations -- An Ensemble Learning Approach to Detect Malwares Based on Static Information -- Automatic Medical Image Report Generation With Multi-View and Multi-Modal Attention Mechanism.
520
$a
This three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020. The total of 142 full papers and 5 short papers included in this proceedings volumes was carefully reviewed and selected from 495 submissions. ICA3PP is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspects of daily life, the power of computing system has become increasingly critical. This conference provides a forum for academics and practitioners from countries around the world to exchange ideas for improving the efficiency, performance, reliability, security and interoperability of computing systems and applications. ICA3PP 2020 focus on two broad areas of parallel and distributed computing, i.e. architectures, algorithms and networks, and systems and applications.
650
0
$a
Parallel processing (Electronic computers)
$3
184697
650
0
$a
Computer architecture
$v
Congresses.
$3
456423
650
0
$a
Computer science
$x
Mathematics.
$3
181991
650
0
$a
Application software.
$3
200645
650
0
$a
Software engineering.
$3
184729
650
0
$a
Data structures (Computer science)
$3
183917
650
0
$a
Computer security.
$3
184416
650
1 4
$a
Computational Mathematics and Numerical Analysis.
$3
274020
650
2 4
$a
Computer Applications.
$3
273760
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
273709
650
2 4
$a
Software Engineering/Programming and Operating Systems.
$3
273711
650
2 4
$a
Data Structures and Information Theory.
$3
825714
650
2 4
$a
Systems and Data Security.
$3
274481
700
1
$a
Qiu, Meikang.
$3
697209
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Theoretical computer science and general issues ;
$v
11195.
$3
824674
856
4 0
$u
https://doi.org/10.1007/978-3-030-60248-2
950
$a
Mathematics and Statistics (SpringerNature-11649)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000190078
電子館藏
1圖書
電子書
EB QA76.58 .I61 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-60248-2
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入