Collaborative Computing: Networking, Applications and Worksharing
20th EAI International Conference, CollaborateCom 2024, Wuzhen, China, November 14-17, 2024, Proceedings, Part II Herausgegeben:Gao, Honghao; Wang, Xinheng
Collaborative Computing: Networking, Applications and Worksharing
20th EAI International Conference, CollaborateCom 2024, Wuzhen, China, November 14-17, 2024, Proceedings, Part II Herausgegeben:Gao, Honghao; Wang, Xinheng
The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14 17, 2024. The 62 full papers were carefully reviewed and selected from 173 submissions. They are categorized under the topical sections as follows: Edge computing & Task scheduling Deep Learning and application Blockchain applications Security and Privacy Protection Representation learning & Collaborative working Graph…mehr
The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14 17, 2024.
The 62 full papers were carefully reviewed and selected from 173 submissions. They are categorized under the topical sections as follows:
Edge computing & Task scheduling
Deep Learning and application
Blockchain applications
Security and Privacy Protection
Representation learning & Collaborative working
Graph neural networks & Recommendation systems
Federated Learning and application
Produktdetails
Produktdetails
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Blockchain Application.- Enabling Authenticated Query Services on Multi-Dimensional Data in Collaborative Blockchain.-ORIC-Shard: A Scalable Blockchain Network with Sharding.- A blockchain-based approach to precise accountable resource sharing.- On and Off-chain Load Balancing Model Based on Stackelberg Game.- Security and Privacy Protection.- A Large-Scale Pretrained Model for Malicious URL Detection.- CCAuth: Elevating Privacy and Security Elegance in a Continuous Covert Authentication Dance.- svRDMA: Securing an RDMA Network in Virtualization Environments.- S-TSG: Description Model of Transient Execution Attacks in Intel SGX.- FRBFT: A BFT Consensus Protocol Supporting Fault Removal for Industrial Internet of Things.- Representation learning & Collaborative Working.- KAN-PPO: A Fast Convergence and Stable Proximal Policy Optimization Powered by Kolmogorov Arnold Network.- ComplexAgents: Complex Code Generation Framework Based on Multi-Agents and Large Language Model.- Enhancing Molecular Property Prediction with Dual-Level Representation Learning.- Multi-Level Representation Learning with Neural Hawkes Process for Information Diffusion Prediction.- IoT-ILDI: Incremental Learning for Device Identification in IoT.- Worker-Quality Adaptive Task Assignment in Collaborative Crowdsourcing.- Towards Efficient Collaborative Data Transmission in JointCloud: A Dynamic Chunking Mechanism.- Critical Nodes Detection for Wireless Sensor Networks Based on Multi-Objective Optimization.- A Two-step Data Augmentation Method for Cross-lingual Sentiment Classification.- Load Balance Oriented Incentive Algorithm for Collaborative Scheduling on Intra-vehicle and Inter-vehicle.- An Enhanced STAR-RIS Air-Space Integrated Network with Collaborative Task Offloading.- A QoS-guaranteed Load Balance Scheme for Data Center Networks.
Blockchain Application.- Enabling Authenticated Query Services on Multi-Dimensional Data in Collaborative Blockchain.-ORIC-Shard: A Scalable Blockchain Network with Sharding.- A blockchain-based approach to precise accountable resource sharing.- On and Off-chain Load Balancing Model Based on Stackelberg Game.- Security and Privacy Protection.- A Large-Scale Pretrained Model for Malicious URL Detection.- CCAuth: Elevating Privacy and Security Elegance in a Continuous Covert Authentication Dance.- svRDMA: Securing an RDMA Network in Virtualization Environments.- S-TSG: Description Model of Transient Execution Attacks in Intel SGX.- FRBFT: A BFT Consensus Protocol Supporting Fault Removal for Industrial Internet of Things.- Representation learning & Collaborative Working.- KAN-PPO: A Fast Convergence and Stable Proximal Policy Optimization Powered by Kolmogorov Arnold Network.- ComplexAgents: Complex Code Generation Framework Based on Multi-Agents and Large Language Model.- Enhancing Molecular Property Prediction with Dual-Level Representation Learning.- Multi-Level Representation Learning with Neural Hawkes Process for Information Diffusion Prediction.- IoT-ILDI: Incremental Learning for Device Identification in IoT.- Worker-Quality Adaptive Task Assignment in Collaborative Crowdsourcing.- Towards Efficient Collaborative Data Transmission in JointCloud: A Dynamic Chunking Mechanism.- Critical Nodes Detection for Wireless Sensor Networks Based on Multi-Objective Optimization.- A Two-step Data Augmentation Method for Cross-lingual Sentiment Classification.- Load Balance Oriented Incentive Algorithm for Collaborative Scheduling on Intra-vehicle and Inter-vehicle.- An Enhanced STAR-RIS Air-Space Integrated Network with Collaborative Task Offloading.- A QoS-guaranteed Load Balance Scheme for Data Center Networks.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826