SALE ON NOW! PROMOTIONS

Close Notification

Your cart does not contain any items

Algorithms and Architectures for Parallel Processing

24th International Conference, ICA3PP 2024, Macau, China, October 29–31, 2024, Proceedings,...

Tianqing Zhu Jin Li Aniello Castiglione Zuobin Ying

$162.95   $130.01

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
Springer Nature Switzerland AG
17 February 2025
The six-volume set, LNCS 15251-15256, constitutes the refereed proceedings of the 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024, held in Macau, China, during October 29–31, 2024.

The 91 full papers, 35 short papers and 5 workshop papers included in these proceedings were carefully reviewed and selected from 265 submissions. They focus on the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems.
Edited by:   , , ,
Imprint:   Springer Nature Switzerland AG
Country of Publication:   Switzerland
Volume:   15251
Dimensions:   Height: 235mm,  Width: 155mm, 
ISBN:   9789819615247
ISBN 10:   9819615240
Series:   Lecture Notes in Computer Science
Pages:   374
Publication Date:  
Audience:   Professional and scholarly ,  Undergraduate
Format:   Paperback
Publisher's Status:   Active
Fake News Detection across Multiple Domains Using Fuzzy Association Rules.- A Scheme of Dynamic Location Privacy-preserving with Blockchain in Intelligent Transportation System.- DBFIA: Diffusion-Based Face Image Anonymization.- A Modular Sharing Scheme for EMRs Using Consortium Blockchain and Proxy Re-Encryption.- PFDF: Privacy Preserving Federated Decision Forest for Classification.- Data-Free Encoder Stealing Attack in Self-supervised Learning.- Data Poisoning Attack against Reinforcement Learning from Human Feedback in Robot Control Tasks.- A Mini-Model Can Make Machine Unlearning Better.- BlockWhisper: A Blockchain-based Hybrid Covert Communication Scheme with Strong Ability to Avoid Detection.- A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT.- A Comprehensive Scheme for Transaction and Fund Tracing in Distributed Anonymous Transactions.- AutoMiner: Reinforcement Learning-Based Mining Attack Simulator.- FedSV: A Privacy-preserving Byzantine-robust Federated Learning Scheme with Self-Validation.- A Dual-Defense Self-Balancing Framework against Bilateral Model Attacks in Federated Learning.- PrivARM: Privacy-preserving Association Rule Mining in the Cloud.- Outliers are Real: Detecting VLM-generated Images via One-class Classification.- TSformer: A Transformer-Based Model Focusing Specifically on the Fusion of Temporal-Spatial Features for Traffic Forecasting.- Temperature-Based Watermarking and Detection for Large Language Models.- CPAKE: Dynamic Batch Authenticated Key Exchange with Conditional Privacy.- Certificate-based Transport Layer Security Encrypted Malicious Traffic Detection in Real-time Network Environments.- MAP-SIM: A Performance Model for Shared-Memory Heterogeneous Systems with Mapping Awareness.- A Vectorized Sequence-to-graph Alignment Algorithm.

See Also