


default search action
23rd ICA3PP 2023: Tianjin, China - Part IV
- Zahir Tari, Keqiu Li, Hongyi Wu:
Algorithms and Architectures for Parallel Processing - 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14490, Springer 2024, ISBN 978-981-97-0858-1 - Kaijie Feng
, Xiaoya Fan
, Jianfeng An
, Haoyang Wang
, Chuxi Li
:
CSDSE: Apply Cooperative Search to Solve the Exploration-Exploitation Dilemma of Design Space Exploration. 1-23 - Yingchi Mao, Chenxin Li, Zibo Wang, Zijian Tu, Ping Ping:
Differential Privacy in Federated Dynamic Gradient Clipping Based on Gradient Norm. 24-41 - Shengqiang Zeng, Hongwei Zhang, Jinsong Wang, Kai Shi:
SolGPT: A GPT-Based Static Vulnerability Detection Model for Enhancing Smart Contract Security. 42-62 - Jianfeng Guan
, Pengcheng Wang, Su Yao, Jing Zhang:
Neuron Pruning-Based Federated Learning for Communication-Efficient Distributed Training. 63-81 - Yixuan Wang, Bo Zhao, Zhonghao Sun, Zhihui Huo, Xueying Li, Yabiao Wu, Jiao Li:
A Novel Network Topology Sensing Method for Network Security Situation Awareness. 82-101 - Rui Cao
, Zhengchang Song, Bingxin Niu, Junhua Gu, Chunjie Li:
Distributed Task Offloading Method Based on Federated Reinforcement Learning in Vehicular Networks with Incomplete Information. 102-118 - Chaoying Yan
, Lijun Sun
, Shangguang Wang
, Shuaiyong Li
:
Carbon Trading Based on Consortium Chain: Building, Modeling, and Analysis. 119-130 - Weihe Li, Jiawei Huang, Yu Liang, Jingling Liu, Wenlu Zhang, Wenjun Lyu, Jianxin Wang:
CAST: An Intricate-Scene Aware Adaptive Bitrate Approach for Video Streaming via Parallel Training. 131-147 - Zhengchang Song, Rui Cao
, Bingxin Niu, Junhua Gu, Chunjie Li:
A Hybrid Active and Passive Cache Method Based on Deep Learning in Edge Computing. 148-159 - Yi Xu, Ruyi Guo, Jonathan Kua, Haoyu Luo, Zheng Zhang, Xiao Liu:
We Will Find You: An Edge-Based Multi-UAV Multi-Recipient Identification Method in Smart Delivery Services. 160-173 - Dong-Fang Wu
, Chuanhe Huang, Yabo Yin
, Shidong Huang, Hui Gong:
Multi-objective Optimization for Joint Handover Decision and Computation Offloading in Integrated Communications and Computing 6G Networks. 174-193 - Tian Qin, Pengfei Wang, Qiang Zhang:
A Joint Optimization Scheme in Heterogeneous UAV-Assisted MEC. 194-216 - Yi Xu, Fengguang Luan, Jonathan Kua, Haoyu Luo, Zhipeng Wang, Xiao Liu:
Multi-UAV Collaborative Face Recognition for Goods Receiver in Edge-Based Smart Delivery Services. 217-235 - Xueying Yang, Chen Li, Zidong Han, Zhonghua Lu:
Distributed Generative Adversarial Networks for Fuzzy Portfolio Optimization. 236-247 - Xiang Ying, Wei Luo, Jianrong Wang:
A Novel Transaction Processing Model for Sharded Blockchain. 248-264 - Zheng Wan, Yuxuan Luo, Xiaogang Dong:
Computation Offloading Based on Deep Reinforcement Learning for UAV-MEC Network. 265-276 - Yue Hong, Caie Wang, Wei Zheng:
Privacy-Aware Scheduling Heuristic Based on Priority in Edge Environment. 277-294 - Yu Du, Haijia Bao, Ya Li:
A Novel Multi-objective Evolutionary Algorithm Hybrid Simulated Annealing Concept for Recommendation Systems. 295-306 - Wenzhong Ou, Daipeng Feng, Ke Luo, Xu Chen:
Eco-SLAM: Resource-Efficient Edge-Assisted Collaborative Visual SLAM System. 307-324 - Xinxin Qi
, Juan Chen, Rongyu Deng, Zekai Li, Lin Deng, Yuan Yuan, Yonggang Che:
PowerDis: Fine-Grained Power Monitoring Through Power Disaggregation Model. 325-346 - Kai Ding, Yidu Huang, Ming Tao, Renping Xie, Xueqiang Li, Xuefeng Zhong:
WBGT Index Forecast Using Time Series Models in Smart Cities. 347-358 - Haisheng Yu, Rajesh Kumar, Wenyong Wang, Ji Zhang, Zhifeng Liu, Sai Zou, Jiangchuan Yang, Leong Io Hon:
Intelligent Collaborative Control of Multi-source Heterogeneous Data Streams for Low-Power IoT: A Flow Machine Learning Approach. 359-377 - Wei Jiang, Jin Wang
, Lingzhi Li
, Dongyang Yu
, Can Liu:
Test-and-Decode: A Partial Recovery Scheme for Verifiable Coded Computing. 378-397 - Dongyang Yu
, Jin Wang
, Lingzhi Li
, Wei Jiang, Can Liu:
RecAGT: Shard Testable Codes with Adaptive Group Testing for Malicious Nodes Identification in Sharding Permissioned Blockchain. 398-418 - Xiaohui Wei
, Jianpeng Zhao
, Nan Jiang
, Hengshan Yue
:
GLAM-SERP: Building a Graph Learning-Assisted Model for Soft Error Resilience Prediction in GPGPUs. 419-435 - Tao Tao, Zhiwen Xiao
, Jibin Wang, Jing Shang, Zhihui Wu:
THRCache: DRAM-NVM Multi-level Cache with Thresholded Heterogeneous Random Choices. 436-455 - Renhai Xu, Wenxin Li, Keqiu Li:
Efficient Multi-tunnel Flow Scheduling for Traffic Engineering. 456-473 - Zhiyun Guan
, Junhua Wu
, Guangshun Li, Tielin Wang
:
An Updatable Key Management Scheme for Underwater Wireless Sensor Networks. 474-485

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.