語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Algorithms and architectures for par...
~
International Conference on Algorithms and Architectures for Parallel Processing (2024 :)
FindBook
Google Book
Amazon
博客來
Algorithms and architectures for parallel processing = 24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024 : proceedings.. Part I /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Algorithms and architectures for parallel processing/ edited by Tianqing Zhu, Jin Li, Aniello Castiglione.
其他題名:
24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024 : proceedings.
其他題名:
ICA3PP 2024
其他作者:
Zhu, Tianqing.
團體作者:
International Conference on Algorithms and Architectures for Parallel Processing
出版者:
Singapore :Springer Nature Singapore : : 2025.,
面頁冊數:
xv, 374 p. :ill. (chiefly color), digital ;24 cm.
內容註:
Fake News Detection across Multiple Domains Using Fuzzy Association Rules -- A Scheme of Dynamic Location Privacy-preserving with Blockchain in Intelligent Transportation System -- DBFIA: Diffusion-Based Face Image Anonymization -- A Modular Sharing Scheme for EMRs Using Consortium Blockchain and Proxy Re-Encryption -- PFDF: Privacy Preserving Federated Decision Forest for Classification -- Data-Free Encoder Stealing Attack in Self-supervised Learning -- Data Poisoning Attack against Reinforcement Learning from Human Feedback in Robot Control Tasks -- A Mini-Model Can Make Machine Unlearning Better -- BlockWhisper: A Blockchain-based Hybrid Covert Communication Scheme with Strong Ability to Avoid Detection -- A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT -- A Comprehensive Scheme for Transaction and Fund Tracing in Distributed Anonymous Transactions -- AutoMiner: Reinforcement Learning-Based Mining Attack Simulator -- FedSV: A Privacy-preserving Byzantine-robust Federated Learning Scheme with Self-Validation -- A Dual-Defense Self-Balancing Framework against Bilateral Model Attacks in Federated Learning -- PrivARM: Privacy-preserving Association Rule Mining in the Cloud -- Outliers are Real: Detecting VLM-generated Images via One-class Classification -- TSformer: A Transformer-Based Model Focusing Specifically on the Fusion of Temporal-Spatial Features for Traffic Forecasting -- Temperature-Based Watermarking and Detection for Large Language Models -- CPAKE: Dynamic Batch Authenticated Key Exchange with Conditional Privacy -- Certificate-based Transport Layer Security Encrypted Malicious Traffic Detection in Real-time Network Environments -- MAP-SIM: A Performance Model for Shared-Memory Heterogeneous Systems with Mapping Awareness -- A Vectorized Sequence-to-graph Alignment Algorithm.
Contained By:
Springer Nature eBook
標題:
Parallel processing (Electronic computers) - Congresses. -
電子資源:
https://doi.org/10.1007/978-981-96-1525-4
ISBN:
9789819615254
Algorithms and architectures for parallel processing = 24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024 : proceedings.. Part I /
Algorithms and architectures for parallel processing
24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024 : proceedings.Part I /[electronic resource] :ICA3PP 2024edited by Tianqing Zhu, Jin Li, Aniello Castiglione. - Singapore :Springer Nature Singapore :2025. - xv, 374 p. :ill. (chiefly color), digital ;24 cm. - Lecture notes in computer science,152511611-3349 ;. - Lecture notes in computer science ;15251..
Fake News Detection across Multiple Domains Using Fuzzy Association Rules -- A Scheme of Dynamic Location Privacy-preserving with Blockchain in Intelligent Transportation System -- DBFIA: Diffusion-Based Face Image Anonymization -- A Modular Sharing Scheme for EMRs Using Consortium Blockchain and Proxy Re-Encryption -- PFDF: Privacy Preserving Federated Decision Forest for Classification -- Data-Free Encoder Stealing Attack in Self-supervised Learning -- Data Poisoning Attack against Reinforcement Learning from Human Feedback in Robot Control Tasks -- A Mini-Model Can Make Machine Unlearning Better -- BlockWhisper: A Blockchain-based Hybrid Covert Communication Scheme with Strong Ability to Avoid Detection -- A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT -- A Comprehensive Scheme for Transaction and Fund Tracing in Distributed Anonymous Transactions -- AutoMiner: Reinforcement Learning-Based Mining Attack Simulator -- FedSV: A Privacy-preserving Byzantine-robust Federated Learning Scheme with Self-Validation -- A Dual-Defense Self-Balancing Framework against Bilateral Model Attacks in Federated Learning -- PrivARM: Privacy-preserving Association Rule Mining in the Cloud -- Outliers are Real: Detecting VLM-generated Images via One-class Classification -- TSformer: A Transformer-Based Model Focusing Specifically on the Fusion of Temporal-Spatial Features for Traffic Forecasting -- Temperature-Based Watermarking and Detection for Large Language Models -- CPAKE: Dynamic Batch Authenticated Key Exchange with Conditional Privacy -- Certificate-based Transport Layer Security Encrypted Malicious Traffic Detection in Real-time Network Environments -- MAP-SIM: A Performance Model for Shared-Memory Heterogeneous Systems with Mapping Awareness -- A Vectorized Sequence-to-graph Alignment Algorithm.
The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 29-31, 2024. The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.
ISBN: 9789819615254
Standard No.: 10.1007/978-981-96-1525-4doiSubjects--Topical Terms:
661130
Parallel processing (Electronic computers)
--Congresses.
LC Class. No.: QA76.58
Dewey Class. No.: 004.35
Algorithms and architectures for parallel processing = 24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024 : proceedings.. Part I /
LDR
:03670nmm a2200349 a 4500
001
2408721
003
DE-He213
005
20250216115533.0
006
m d
007
cr nn 008maaau
008
260204s2025 si s 0 eng d
020
$a
9789819615254
$q
(electronic bk.)
020
$a
9789819615247
$q
(paper)
024
7
$a
10.1007/978-981-96-1525-4
$2
doi
035
$a
978-981-96-1525-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.58
072
7
$a
UYA
$2
bicssc
072
7
$a
COM014000
$2
bisacsh
072
7
$a
UYA
$2
thema
082
0 4
$a
004.35
$2
23
090
$a
QA76.58
$b
.I61 2024
111
2
$a
International Conference on Algorithms and Architectures for Parallel Processing
$n
(24th :
$d
2024 :
$c
Macau, China)
$3
3781443
245
1 0
$a
Algorithms and architectures for parallel processing
$h
[electronic resource] :
$b
24th International Conference, ICA3PP 2024, Macau, China, October 29-31, 2024 : proceedings.
$n
Part I /
$c
edited by Tianqing Zhu, Jin Li, Aniello Castiglione.
246
3
$a
ICA3PP 2024
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2025.
300
$a
xv, 374 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15251
505
0
$a
Fake News Detection across Multiple Domains Using Fuzzy Association Rules -- A Scheme of Dynamic Location Privacy-preserving with Blockchain in Intelligent Transportation System -- DBFIA: Diffusion-Based Face Image Anonymization -- A Modular Sharing Scheme for EMRs Using Consortium Blockchain and Proxy Re-Encryption -- PFDF: Privacy Preserving Federated Decision Forest for Classification -- Data-Free Encoder Stealing Attack in Self-supervised Learning -- Data Poisoning Attack against Reinforcement Learning from Human Feedback in Robot Control Tasks -- A Mini-Model Can Make Machine Unlearning Better -- BlockWhisper: A Blockchain-based Hybrid Covert Communication Scheme with Strong Ability to Avoid Detection -- A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT -- A Comprehensive Scheme for Transaction and Fund Tracing in Distributed Anonymous Transactions -- AutoMiner: Reinforcement Learning-Based Mining Attack Simulator -- FedSV: A Privacy-preserving Byzantine-robust Federated Learning Scheme with Self-Validation -- A Dual-Defense Self-Balancing Framework against Bilateral Model Attacks in Federated Learning -- PrivARM: Privacy-preserving Association Rule Mining in the Cloud -- Outliers are Real: Detecting VLM-generated Images via One-class Classification -- TSformer: A Transformer-Based Model Focusing Specifically on the Fusion of Temporal-Spatial Features for Traffic Forecasting -- Temperature-Based Watermarking and Detection for Large Language Models -- CPAKE: Dynamic Batch Authenticated Key Exchange with Conditional Privacy -- Certificate-based Transport Layer Security Encrypted Malicious Traffic Detection in Real-time Network Environments -- MAP-SIM: A Performance Model for Shared-Memory Heterogeneous Systems with Mapping Awareness -- A Vectorized Sequence-to-graph Alignment Algorithm.
520
$a
The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 29-31, 2024. The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.
650
0
$a
Parallel processing (Electronic computers)
$x
Congresses.
$3
661130
650
0
$a
Computer architecture
$x
Congresses.
$3
678568
650
0
$a
Computer algorithms
$x
Congresses.
$3
576357
650
1 4
$a
Design and Analysis of Algorithms.
$3
3538532
650
2 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Computer Vision.
$3
3538524
700
1
$a
Zhu, Tianqing.
$3
3251606
700
1
$a
Li, Jin.
$3
1297188
700
1
$a
Castiglione, Aniello.
$3
3264275
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15251.
$3
3781457
856
4 0
$u
https://doi.org/10.1007/978-981-96-1525-4
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9514219
電子資源
11.線上閱覽_V
電子書
EB QA76.58
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入