Algorithms and architectures for parallel processing : 20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, Proceedings. Part III / Meikang Qiu (ed.).
Material type:
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
e-Library
Electronic Book@IST |
EBook | Available |
This three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020. The total of 142 full papers and 5 short papers included in this proceedings volumes was carefully reviewed and selected from 495 submissions. ICA3PP is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspects of daily life, the power of computing system has become increasingly critical. This conference provides a forum for academics and practitioners from countries around the world to exchange ideas for improving the efficiency, performance, reliability, security and interoperability of computing systems and applications. ICA3PP 2020 focus on two broad areas of parallel and distributed computing, i.e. architectures, algorithms and networks, and systems and applications.-- Provided by publisher.
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed December 2, 2020).
Intro -- Preface -- Organization -- Contents -- Part III -- Parallel Computing with Cybersecurity and Blockchain (PCB) -- Understanding Privacy-Preserving Techniques in Digital Cryptocurrencies -- 1 Introduction -- 2 Privacy Issues in Digital Cryptocurrencies -- 3 Classification of Privacy-Preserving Techniques -- 3.1 Privacy-Preserving Techniques of Transaction -- 3.2 Privacy-Preserving Techniques of Smart Contract -- 3.3 Privacy-Preserving Techniques of On-Chain Data -- 4 Zero-Knowledge Proofs -- 4.1 Trusted Setup -- 4.2 Verification Efficiency -- 4.3 Safety Performance
5 Discussions and Future Work -- 6 Conclusions -- References -- LNBFSM: A Food Safety Management System Using Blockchain and Lightning Network -- 1 Introduction -- 2 System Design -- 2.1 Overall Structure -- 2.2 Data Structure -- 2.3 Smart Contract -- 2.4 Consensus Mechanism -- 3 Algorithm -- 3.1 QueryVerification Algorithm -- 3.2 Balance Algorithm -- 3.3 TransactionChannelDown Algorithm -- 4 Evaluations and Findings -- 5 Conclusions -- References -- Reputation-Based Trustworthy Supply Chain Management Using Smart Contract -- 1 Introduction -- 2 Proposed Model
2.1 Key Components and Model Design -- 2.2 Reputation Assessment Blockchain (RAB) -- 3 Algorithms -- 3.1 Quality Status Generation (QSG) Algorithm -- 3.2 Token-Based Reputation Reward/Punishment Algorithm -- 4 Experiment and the Results -- 5 Conclusions -- References -- Content-Aware Anomaly Detection with Network Representation Learning -- 1 Introduction -- 2 Background and Related Works -- 2.1 Network Embedding -- 2.2 Network Anomaly Detection -- 2.3 Network Embedding Based Anomaly Detection -- 3 Problem Formulation -- 4 The Proposed Content-Aware Anomaly Detection Method
4.1 Content-Aware Network Anomaly Detection Method -- 4.2 Network Embedding Objective -- 4.3 Auto-encoder Based Anomaly Detection -- 5 Experiments -- 5.1 Benchmark Networks -- 5.2 Baseline Methods -- 5.3 Experiment Settings and Evaluation Metrics -- 5.4 Experiment Results -- 6 Conclusion -- References -- Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree -- 1 Introduction -- 2 Related Work -- 2.1 Centralized Data Integrity Verification -- 2.2 Blockchain Based Data Integrity Verification -- 3 Definitions and Preliminaries -- 3.1 System Model
3.2 Threat Model and Design Goals -- 3.3 Preliminaries -- 4 The Proposed Blockchain Based Data Integrity Verification Scheme -- 4.1 Structure of T-Merkle Tree -- 4.2 Construction of the Proposed Scheme -- 4.3 Discussion on Decentralized Verification -- 5 Security Analysis -- 5.1 Correctness -- 5.2 Unforgeability -- 6 Performance Evaluation -- 6.1 Performance Analysis -- 6.2 Experimental Results -- 7 Conclusion -- References -- IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing System -- 1 Introduction -- 2 Related Works