E-Book, Englisch, 851 Seiten, eBook
Wang / Zomaya / Martinez Algorithms and Architectures for Parallel Processing
1. Auflage 2015
ISBN: 978-3-319-27161-3
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings
E-Book, Englisch, 851 Seiten, eBook
Reihe: Theoretical Computer Science and General Issues
ISBN: 978-3-319-27161-3
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book constitutes the refereed proceedings of the
Workshops and Symposiums of the 15th International Conference on Algorithms and
Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China,
in November 2015.
The program of this year consists of 6
symposiums/workshops that cover a wide range of research topics on parallel
processing technology: the Sixth International Workshop on Trust, Security and
Privacy for Big Data, TrustData 2015; the Fifth International Symposium on
Trust, Security and Privacy for Emerging Applications, TSP 2015; the Third
International Workshop on Network Optimization and Performance Evaluation, NOPE
2015; the Second International Symposium on Sensor-Cloud Systems, SCS 2015; the
Second International Workshop on Security and Privacy Protection in Computer
and Network Systems, SPPCN 2015; and the First International Symposium on
Dependability in Sensor, Cloud, and Big Data Systems and Applications,
DependSys 2015.
The aim of these symposiums/workshops is to provide a
forum to bring together practitioners and researchers from academia and
industry for discussion and presentations on the current research and future
directions related to parallel processing technology. The themes and topics of
these symposiums/workshops are a valuable complement to the overall scope of
ICA3PP 2015 and give additional values and interests.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Trust, security and privacy for Big Data.- Trust, security and privacy for emerging applications.- Network optimization and performance evaluation.- Sensor-cloud systems.- Security and privacy protection in computer and network Systems.- Dependability in sensor, cloud, and Big Data systems.