Collaborative Computing: Networking, Applications and Worksharing (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee) (2025. xii, 381 S. XII, 381 p. 235 mm)

個数:

Collaborative Computing: Networking, Applications and Worksharing (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee) (2025. xii, 381 S. XII, 381 p. 235 mm)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783031932533

Full Description

The three-volume set LNICST 624, 625, 626 constitutes the refereed proceedings of the 20th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2024, held in Wuzhen, China, during November 14-17, 2024. 

The 62 full papers were carefully reviewed and selected from 173 submissions. They are categorized under the topical sections as follows:  

Edge computing & Task scheduling

Deep Learning and application

Blockchain applications

Security and Privacy Protection

Representation learning & Collaborative working

Graph neural networks & Recommendation systems

Federated Learning and application

Contents

Blockchain Application.- Enabling Authenticated Query Services on Multi-Dimensional Data in Collaborative Blockchain.- ORIC-Shard: A Scalable Blockchain Network with Sharding.- A blockchain-based approach to precise accountable resource sharing.- On and Off-chain Load Balancing Model Based on Stackelberg Game.- Security and Privacy Protection.- A Large-Scale Pretrained Model for Malicious URL Detection.- CCAuth: Elevating Privacy and Security Elegance in a Continuous Covert Authentication Dance.- svRDMA: Securing an RDMA Network in Virtualization Environments.- S-TSG: Description Model of Transient Execution Attacks in Intel SGX.- FRBFT: A BFT Consensus Protocol Supporting Fault Removal for Industrial Internet of Things.- Representation learning & Collaborative Working.- KAN-PPO: A Fast Convergence and Stable Proximal Policy Optimization Powered by Kolmogorov-Arnold Network.- ComplexAgents: Complex Code Generation Framework Based on Multi-Agents and Large Language Model.- Enhancing Molecular Property Prediction with Dual-Level Representation Learning.- Multi-Level Representation Learning with Neural Hawkes Process for Information Diffusion Prediction.- IoT-ILDI: Incremental Learning for Device Identification in IoT.- Worker-Quality Adaptive Task Assignment in Collaborative Crowdsourcing.- Towards Efficient Collaborative Data Transmission in JointCloud: A Dynamic Chunking Mechanism.- Critical Nodes Detection for Wireless Sensor Networks Based on Multi-Objective Optimization.- A Two-step Data Augmentation Method for Cross-lingual Sentiment Classification.- Load Balance Oriented Incentive Algorithm for Collaborative Scheduling on Intra-vehicle and Inter-vehicle.- An Enhanced STAR-RIS Air-Space Integrated Network with Collaborative Task Offloading.- A QoS-guaranteed Load Balance Scheme for Data Center Networks.

最近チェックした商品