Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Dynamic Idle Resource Leasing To Safely Oversubscribe Capacity At Meta
- Nishant Gupta,
- Iyswarya Narayanan,
- Shivam Handa,
- Sayak Chakraborti,
- Pankit Thapar,
- Baohua Shan,
- Ariel Rao,
- Yuanlai Liu,
- Pengyuan Wang,
- Yuqing Wu,
- Qingyi Gao,
- Chris Chao-Chun Cheng,
- Sihan You,
- Louis Huang,
- Jingyuan Fan,
- Kenny Yu,
- Kevin Lin,
- Tengfei Mu,
- Parth Malani,
- Haiying Wang,
- Trey Lu,
- Peter Zhang
SoCC '24: Proceedings of the 2024 ACM Symposium on Cloud ComputingPages 792–810https://doi.org/10.1145/3698038.3698537Meta maintains additional capacity within its infrastructure to ensure high availability for business workloads, accommodating user growth, temporal traffic variations, and unforeseen regional failures. However, this strategic choice inherently leads to ...
- research-articleNovember 2024
Federated Learning Survey: A Multi-Level Taxonomy of Aggregation Techniques, Experimental Insights, and Future Frontiers
ACM Transactions on Intelligent Systems and Technology (TIST), Volume 15, Issue 6Article No.: 113, Pages 1–69https://doi.org/10.1145/3678182The emerging integration of Internet of Things (IoT) and AI has unlocked numerous opportunities for innovation across diverse industries. However, growing privacy concerns and data isolation issues have inhibited this promising advancement. Unfortunately, ...
- research-articleNovember 2024
SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection
Expert Systems with Applications: An International Journal (EXWA), Volume 256, Issue Chttps://doi.org/10.1016/j.eswa.2024.124896AbstractPhishing attacks have recently become a real danger that threatens the security of sensitive data. This research paper presents a new approach based on Secure Multi-Party Computation (SMPC) to identify phishing attacks on encrypted emails while ...
- research-articleNovember 2024
Efficient exponential Rosenbrock methods till order four
Journal of Computational and Applied Mathematics (JCAM), Volume 453, Issue Chttps://doi.org/10.1016/j.cam.2024.116158AbstractIn a previous paper, a technique was described to avoid order reduction with exponential Rosenbrock methods when integrating initial boundary value problems with time-dependent boundary conditions. That requires to calculate some information on ...
- ArticleOctober 2024
Efficient and Privacy-Preserving Multi-user, Multi-database and Multi-dimensional Range Query
AbstractThe rapid development of information technology relies on data. Both data analysis and calculation require data querying first. However, due to data privacy preservation concerns, outsourced data is generally encrypted, which brings more ...
-
- ArticleNovember 2024
SDNet: A Simple and Efficient Salient Object Detection Decoder with Only 60K Parameters
AbstractIn salient object detection, the importance of model lightweighting is increasingly highlighted, particularly in resource-constrained environments. To address this, we present SDNet, an efficient decoder that significantly reduces the number of ...
- research-articleOctober 2024
An efficient privacy-preserving and verifiable scheme for federated learning
Future Generation Computer Systems (FGCS), Volume 160, Issue CPages 238–250https://doi.org/10.1016/j.future.2024.06.002AbstractAs one of the most important methods of privacy computing, federated learning has attracted much attention as it makes data available but invisible (i.e., uploading gradients instead of raw data). However, adversaries may still recover some ...
Highlights- Our scheme guarantees privacy-preservation, verifiability and data availability.
- The accuracy is effective, while computation and communication costs are efficiency.
- ArticleOctober 2024
Resource-Efficient Medical Image Analysis with Self-adapting Forward-Forward Networks
AbstractWe introduce a fast Self-adapting Forward-Forward Network (SaFF-Net) for medical imaging analysis, mitigating power consumption and resource limitations, which currently primarily stem from the prevalent reliance on back-propagation for model ...
- research-articleOctober 2024
Improving technical efficiency in data envelopment analysis for efficient firms: A case on Chinese banks
Information Sciences: an International Journal (ISCI), Volume 681, Issue Chttps://doi.org/10.1016/j.ins.2024.121237AbstractData Envelopment Analysis (DEA) as a data-oriented benchmarking tool is considered a powerful and promising instrument for performance evaluation in various application areas. In DEA, the set of all decision-making units (DMUs) is divided into ...
- research-articleOctober 2024
Design and Analysis of Slotted Microstrip Patch Array Antenna at 2.4GHz for WLAN
Wireless Personal Communications: An International Journal (WPCO), Volume 138, Issue 4Pages 2055–2064https://doi.org/10.1007/s11277-024-11430-7AbstractWireless technology is one of the major area of research in communication systems. Antenna plays major role in communication system so designing and fabrication of antenna is very important for the communication system. An understanding the ...
- ArticleSeptember 2024
- ArticleSeptember 2024
Exploring Proprioceptive Feedback in the Evolution of Modular Robots
Parallel Problem Solving from Nature – PPSN XVIIIPages 405–418https://doi.org/10.1007/978-3-031-70071-2_25AbstractWe investigate an evolvable robot system where the body provides proprioceptive sensory signals to the controller (brain) about the positions of the joints. The key aspect we consider is whether all joints should be sensed or if sensing fewer ...
- ArticleSeptember 2024
Efficiency of Fuzzy Decision Algorithms Based on the Strength of Decision Rules
AbstractCharacterizing data sets through logic rules is a fundamental task for modeling knowledge systems. Mathematical tools, such as Rough Set Theory (RST) and Formal Concept Analysis (FCA), offer mechanisms for automatically obtaining these logic ...
- ArticleSeptember 2024
The Simpler The Better: An Entropy-Based Importance Metric to Reduce Neural Networks’ Depth
Machine Learning and Knowledge Discovery in Databases. Research TrackPages 92–108https://doi.org/10.1007/978-3-031-70365-2_6AbstractWhile deep neural networks are highly effective at solving complex tasks, large pre-trained models are commonly employed even to solve consistently simpler downstream tasks, which do not necessarily require a large model’s complexity. Motivated by ...
- research-articleNovember 2024
Privacy-preserving logistic regression with improved efficiency
Journal of Information Security and Applications (JISA), Volume 85, Issue Chttps://doi.org/10.1016/j.jisa.2024.103848AbstractLogistic regression is a well-known method for classification and is being widely used in our daily life. To obtain a logistic regression model with sufficient accuracy, collecting a large number of data samples from multiple sources is ...
Improving efficiency of Monte Carlo method via code intrinsic framework
ICPP '24: Proceedings of the 53rd International Conference on Parallel ProcessingPages 97–106https://doi.org/10.1145/3673038.3673071Uncertainty quantification (UQ) has been widely applied in numerical simulation in recent years. Among different UQ methods, the Monte Carlo (MC) method played an important role in the field of UQ due to its simplicity and robustness. However, MC ...
- research-articleOctober 2024
Allocation of CO2 emission quotas for industrial production in Industry 4.0: Efficiency and equity
Computers and Industrial Engineering (CINE), Volume 194, Issue Chttps://doi.org/10.1016/j.cie.2024.110375Graphical abstractDisplay Omitted
Highlights- The industrial sector is divided into two stages: production and trading.
- New carbon quotas allocation scheme results in higher efficiency and fairness.
- The proposed allocation process combines regional coordination and equity.
The method of carbon emission quota (CEQ) allocation based on data envelopment analysis (DEA) can allocate quotas without impacting efficiency improvements in industrial sector. A key element in effectively reducing carbon emissions is ensuring ...
- research-articleSeptember 2024
Efficient handover authentication protocol with message integrity for mobile clients in wireless mesh networks
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103806AbstractWireless Mesh Network (WMN) has become the most favorable choice among various networking options due to its distributed nature. It offers continuous Internet services, in comparison with other conventional networks, through a self-healing and ...
- articleAugust 2024
Application of Deep Learning for Automatic Identification of Hazardous Materials and Urban Safety Supervision
Journal of Organizational and End User Computing (JOEUC-IGI), Volume 36, Issue 1Pages 1–20https://doi.org/10.4018/JOEUC.349582The rapid process of urbanization and industrial development has raised significant concerns regarding the presence and management of hazardous substances. However, conventional methods employed for identifying hazardous substances and monitoring urban ...
- research-articleJuly 2024
A procedure to obtain quadratic convergence from the secant method
Journal of Computational and Applied Mathematics (JCAM), Volume 448, Issue Chttps://doi.org/10.1016/j.cam.2024.115912AbstractFrom the secant method and using symmetric divided differences, we construct a uniparametric family of secant-type iterative methods with quadratic convergence and better computational efficiency than the secant method. In addition, we ...