Algorithms and Architectures for Parallel Processing : 25th International Conference, ICA3PP 2025, Zhengzhou, China, October 30-November 2, 2025, Proceedings, Part IV (Lecture Notes in Computer Science)

個数:
  • 予約
  • ポイントキャンペーン

Algorithms and Architectures for Parallel Processing : 25th International Conference, ICA3PP 2025, Zhengzhou, China, October 30-November 2, 2025, Proceedings, Part IV (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 590 p.
  • 言語 ENG
  • 商品コード 9789819584079

Full Description

The eight volume set, LNCS 16381-16388 constitutes the refereed proceedings of the 25th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2025, held in Zhengzhou, China, during October 30 -November 2, 2025.

The 158 full papers, 104 research papers and 48 session papers included in these proceedings were carefully reviewed and selected from 543 submissions. They focus on the following topical sections:

Part I : Parallel and Distributed Architectures; Software Systems and Programming Models.

Part II : Parallel and Distributed Algorithms and Applications.

Part III : Parallel and Distributed Algorithms and Applications; Internet of Things and Cyber-Physical-Social Computing; Performance Modeling and Evaluation.

Part IV : Service Dependability and Security in Distributed and Parallel Systems; Network Architectures and Algorithms.

Part V: Network Architectures and Algorithms.

Part VI: Parallel and Distributed Architectures; Software Systems and Programming Models; Parallel and Distributed Algorithms and Applications; Big Data Management and Analysis; Performance Modeling and Evaluation.

Part VII: Service Dependability and Security in Distributed and Parallel Systems; Network Architectures and Algorithms; Internet of Things and Cyber-Physical-Social Computing.

Part VIII: Intelligent Distributed Computing; Resource Coordination and Joint Optimization in Cloud-Edge-End Systems; Symbiotic AI and Data Ecosystems; Smart Education Powered by Parallel and Distributed Processing; AI for Networks and Networking for AI; Emerging Network Technologies in Computing and Networking Convergence.

Contents

.- Service Dependability and Security in Distributed and Parallel Systems.
.- M2C: A Blockchain-Based Certificate Batching Architecture for Software-Defined Networks.
.- PacketMorph: Generation of Recoverable Adversarial Packets against Encrypted Traffic Classification via Class-wise Universal Perturbation.
.- DecFLLM: A Privacy-Preserving Fine-Tuning Framework for Federated Large Language Models via Adapter Decomposition.
.- Reinforcement Learning-Based Autonomous Collision Avoidance for Ships in Realistic Physical Environments.
.- IDSF: A Cross-Domain Data Trustworthy Sharing Framework for Large-Scale IIoT with Integrated DID and Enhanced PBFT Algorithm.
.- Are Relay Chains Practically Deployable? Trusted Behavior Dynamics via Evolutionary Games.
.- Multi-Task Learning for HDD Failure Prediction in Heterogeneous Storage Systems.
.- A Dual Personalized Clustering-Based Defense Against Composite Poisoning Attacks in Federated Learning.
.- Index-Free Searchable Symmetric Encryption for Full-Text Substring Search.
.- A Weakly Centralized Hierarchical Sensitive Data Sharing Scheme Based on Edge Computing.
.- A Lightweight E-Health Data Access Control Scheme in Fog Computing.
.- Hawk: Saturation Attack Detection Based on Structured Spatial Interactions and Temporal Dependencies-Guided Graph Learning in SDN.
.- RoboClarify: Clarifying Ambiguous Instructions Through Scenario-Guided Risk Assessment for Home Embodied Agents.
.- Pistis: Enabling Secure Interoperability Across Unobservable Permissioned Blockchains.
.- HBCA: Healthcare-Oriented Blockchain-Assisted Cross-Domain Authentication.
.- HeRF-AD: Robust Anomaly Detection for Software Systems via Heterogeneous Representation Fusion.
.- Defending Backdoor Attacks in Visual Pre-Trained Models with Group L1/2 Regularization and Knowledge Distillation.
.- LIME-Enhanced Insider Threat Detection for Distributed Security Systems.
.- Graph Representation Learning via Generative-Contrastive Fusion for Advanced Persistent Threat Detection.
.- zkGCN: Zero-Knowledge Based Verifiable Inference for Graph Convolutional Networks.
.- A GAN-Integrated Framework for Fileless Attack Provenance.
.- EPOMTA: Efficient and Privacy-preserving online Multi-Task Allocation in Mobile Crowdsourcing.
.- Multiscale Deep Neural Network Intrusion Detection Model Based on Denoising Feature Selection with EQLv2.
.- TriDA: Triangular Fuzzy Double Auction for Efficient and Accurate Task-Worker Matching in Blockchain-Based Crowdsourcing.
.- An Anonymous, Certificateless, and Multi-Receiver Aggregate Signcryption Scheme without Secure Channel in VANETs.
.- Network Architectures and Algorithms.
.- Ditto: A Flexible Transmission Control Mechanism for Diverse User Demands and Network Conditions.
.- Decentralized Multi-UAV Trajectory Optimization for Cooperation in Wireless Charging Networks.
.- Mitigating Hash Polarization with Flow-Level Load Balancing in Leaf-Spine Data Center Network.
.- QoS-Aware Hybrid Routing for LEO Satellite Networks: Dynamic Path Allocation and Partitioning-Based Optimization.
.- Hybrid Swarm Intelligence-Based Path Planning for Mobile Nodes in DTN over Complex Terrains.
.- 6RLD: A Seedless Region Active IPv6 Address Dynamic Detection Method Based on Large Language Model and RAG Technology.
.- DFNets: An Indoor Localization Model Based on Fresnel Clustering Fusion.

最近チェックした商品