The Journal of Supercomputing最新文献

筛选
英文 中文
Link fault tolerability of 3-ary n-cube based on g-good-neighbor r-component edge-connectivity 基于 "g-好邻居 "r-分量边缘连通性的 3ary n 立方体的链路容错性
The Journal of Supercomputing Pub Date : 2024-07-29 DOI: 10.1007/s11227-024-06342-z
Qifan Zhang, Shuming Zhou, Lulu Yang
{"title":"Link fault tolerability of 3-ary n-cube based on g-good-neighbor r-component edge-connectivity","authors":"Qifan Zhang, Shuming Zhou, Lulu Yang","doi":"10.1007/s11227-024-06342-z","DOIUrl":"https://doi.org/10.1007/s11227-024-06342-z","url":null,"abstract":"<p>High-performance computing relies heavily on parallel and distributed systems, which promptes us to establish both qualitative and quantitative criteria to assess the fault tolerability and vulnerability of the system’s underlying interconnection networks. Consider the scenario in which large-scale link failures split the interconnection network into several components and each processor has multiple good neighboring processors. In this scenario, the fault tolerability of the system can be measured by <i>g</i>-good-neighbor <i>r</i>-component edge-connectivity, denoted by <span>(lambda _{g,r}(G))</span>, which is defined as the minimum number of edges whose removal results in a disconnected network with at least <i>r</i> connected components and each vertex has at least <i>g</i> good neighbors. It combines the strategies of <i>g</i>-good-neighbor edge-connectivity and component edge-connectivity. In this paper, the <i>g</i>-good-neighbor <span>((r+1))</span>-component edge-connectivity of 3-ary <i>n</i>-cube is investigated. This work is the first attempt enhancing link fault tolerability for 3-ary <i>n</i>-cube under double constraints in the presence of the large-scale faulty links, which breaks down the inherent idea that poses one limitation on the resulting network. In addition, our results cover the work of Xu et al. (IEEE Trans Reliab, 71(3):1230–1240, 2022) and Li et al. (J Parallel Distrib Comput, 27:104886, 2024). Finally, the compared results reveal that the <i>g</i>-good-neighbor <span>((r+1))</span>-component edge-connectivity is almost <i>r</i> times the size of <i>g</i>-good-neighbor edge-connectivity and much larger than <span>((r+1))</span>-component edge-connectivity in 3-ary <i>n</i>-cube.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141868158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic service provisioning in heterogeneous fog computing architecture using deep reinforcement learning 利用深度强化学习在异构雾计算架构中动态提供服务
The Journal of Supercomputing Pub Date : 2024-07-29 DOI: 10.1007/s11227-024-06379-0
Yaghoub Alizadeh Govarchinghaleh, Masoud Sabaei
{"title":"Dynamic service provisioning in heterogeneous fog computing architecture using deep reinforcement learning","authors":"Yaghoub Alizadeh Govarchinghaleh, Masoud Sabaei","doi":"10.1007/s11227-024-06379-0","DOIUrl":"https://doi.org/10.1007/s11227-024-06379-0","url":null,"abstract":"<p>The exponential growth of IoT devices and the surge in the data volume, coupled with the rise of latency-sensitive applications, has led to a heightened interest in fog computing to meet user demands. In this context, the service provisioning problem consists of dynamically selecting desirable fog computing nodes and routing user traffic to these nodes. Given that the fog computing layer is composed of heterogeneous nodes, which vary in resource capacity, availability, and power sources, the service provisioning problem becomes challenging. Existing solutions, often using classical optimization approaches or heuristic algorithms due to the NP-hardness of the problem, have struggled to address the issue effectively, particularly in accounting for the heterogeneity of fog nodes and uncertainty of the ad hoc fog nodes. These techniques show exponential computation times and deal only with small network scales. To overcome these issues, we are motivated to replace these approaches with deep reinforcement learning (DRL) techniques, specifically employing the proximal policy optimization (PPO) algorithm to understand the dynamic behavior of the environment. The main objective of the proposed DRL-based dynamic service provisioning (DDSP) algorithm is minimizing service provisioning costs while considering service delay constraints, the uncertainty of ad hoc fog nodes, and the heterogeneity of both ad hoc and dedicated fog nodes. Extensive simulations demonstrate that our approach provides a near-optimal solution with high efficiency. Notably, our proposed algorithm selects more stable fog nodes for service provisioning and successfully minimizes cost even with uncertainty regarding ad hoc fog nodes, compared to heuristic algorithms.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141868113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sustainable edge computing with mobile crowd computing: a proof-of-concept with a smart HVAC use case 利用移动人群计算实现可持续边缘计算:智能暖通空调用例的概念验证
The Journal of Supercomputing Pub Date : 2024-07-29 DOI: 10.1007/s11227-024-06364-7
Pijush Kanti Dutta Pramanik, Saurabh Pal, Moutan Mukhopadhyay, Prasenjit Choudhury
{"title":"Sustainable edge computing with mobile crowd computing: a proof-of-concept with a smart HVAC use case","authors":"Pijush Kanti Dutta Pramanik, Saurabh Pal, Moutan Mukhopadhyay, Prasenjit Choudhury","doi":"10.1007/s11227-024-06364-7","DOIUrl":"https://doi.org/10.1007/s11227-024-06364-7","url":null,"abstract":"<p>The widespread adoption of utility-based real-time applications has placed the necessity of widescale deployment of edge computing infrastructure. Crowdsourced edge computing is deemed a suitable way out. On the other hand, a collection of today’s powerful smart mobile devices (SMDs) can cumulatively offer high-performance computing. The public-owned SMDs are utilized opportunistically to form a dynamic ad-hoc computing grid known as mobile crowd computing (MCC). This paper aspires to establish a proof-of-concept for the feasibility and use of MCC as a sustainable edge computing solution (MCC-edge). A typical smart HVAC system of an office building has been considered for the experiment case. We aim to process the HVAC data in real-time using the MCC-edge setup within the building for auto adjustment of the AC controller and error notifications. To maintain the ideal comfort level of the occupants, we present an extensive calculation using the dew point and heat index of the room. A high-level layered architecture of the MCC-edge for HVAC is presented along with a general framework of the MCC-edge. We report the module-wise design and implementation procedures with exhaustive details. The performance of MCC-edge is statistically compared with the commercial edge and cloud computing solutions in terms of cost, energy consumption, latency, and environmental impact, showing a significant advantage over the two. Every procedural detail of each module's design, development, and implementation is meticulously presented, which would aid interested readers and researchers in rebuilding such an application.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141868199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mscnet: Mask stepwise calibration network for camouflaged object detection Mscnet:用于伪装物体检测的掩码逐步校准网络
The Journal of Supercomputing Pub Date : 2024-07-27 DOI: 10.1007/s11227-024-06376-3
Haishun Du, Minghao Zhang, Wenzhe Zhang, Kangyi Qiao
{"title":"Mscnet: Mask stepwise calibration network for camouflaged object detection","authors":"Haishun Du, Minghao Zhang, Wenzhe Zhang, Kangyi Qiao","doi":"10.1007/s11227-024-06376-3","DOIUrl":"https://doi.org/10.1007/s11227-024-06376-3","url":null,"abstract":"<p>Camouflaged object detection (COD) aims to accurately segment camouflaged objects blending into the environment and is a challenging task. Most existing deep learning-based COD methods do not explicitly enhance the region information of camouflaged objects, nor do they use the region information for mask calibration. To solve this issue, we propose a novel mask stepwise calibration network (MSCNet) for camouflaged object detection, which achieves high-precision detection of camouflaged objects. Specifically, MSCNet consists of a region information enhancement encoder and a mask stepwise calibration decoder. In the encoder, we first utilize a PVT backbone network to extract different levels of features from camouflaged images. Then, we design a region information enhancement module to enhance the region information of camouflaged objects while suppressing the interference of background information by mining, embedding, and aggregating the region information in different levels of features. In the decoder, we first design a coarse mask generation module to generate coarse prediction masks of camouflaged objects by directly cross-fusing different levels of features extracted by the backbone. In addition, we also design a mask calibration module to calibrate coarse prediction masks of camouflaged objects using the region information of different levels of camouflaged objects as a guide. Extensive experimental results on four benchmark datasets show that our method effectively identifies camouflaged objects and surpasses most state-of-the-art COD methods.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive PUF design to authenticate and evaluate heterogeneous IPs in edge computing 自适应 PUF 设计用于验证和评估边缘计算中的异构 IP
The Journal of Supercomputing Pub Date : 2024-07-26 DOI: 10.1007/s11227-024-06371-8
S. Hemavathy, J. Kokila, V. S. Kanchana Bhaaskaran
{"title":"Adaptive PUF design to authenticate and evaluate heterogeneous IPs in edge computing","authors":"S. Hemavathy, J. Kokila, V. S. Kanchana Bhaaskaran","doi":"10.1007/s11227-024-06371-8","DOIUrl":"https://doi.org/10.1007/s11227-024-06371-8","url":null,"abstract":"<p>Edge computing has become quintessential in commercial, healthcare, and industrial applications. It enables real-time data processing at the edge device, thus reducing the data traffic to the cloud and increasing the processing time efficiency. As an edge device, modern System-on-Chips (SoCs) provide scalability, security, and development in an integrated platform. Intellectual Property (IP) core reuse is a boon in SoCs that bridges the gap between integrated circuit design and fabrication. Such edge devices modeled by vendors are bound to ensure high security to avoid piracy. The proposed architecture provides a two-step authentication utilizing a Finite State Machine (FSM) with a secured key obtained from the newly structured Physical Unclonable Function (PUF) within the same edge device, with the primary goal of verifying several heterogeneous IPs to achieve the least power and energy. Two PUF designs, Anderson Arbiter PUF (AA-PUF) and Balanced AA-PUF, have been proposed for two different placements taking advantage of SoC-based architecture. The PUF characteristics have been experimentally validated with and without majority voting and demonstrate their proximity close to the desired value in ZedBoard. The proposed design is a strong PUF with less than 15% area overhead and power dissipation of 1.982 W for a 64-bit response. The experimental validation has evaluated that the power and energy consumptions are 2.56 W and 2.17 J for 52 heterogeneous IPs.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic flow prediction with multi-feature spatio-temporal coupling based on peak time embedding 基于高峰时间嵌入的多特征时空耦合交通流预测
The Journal of Supercomputing Pub Date : 2024-07-26 DOI: 10.1007/s11227-024-06378-1
Siwei Wei, Dingbo Hu, Feifei Wei, Donghua Liu, Chunzhi Wang
{"title":"Traffic flow prediction with multi-feature spatio-temporal coupling based on peak time embedding","authors":"Siwei Wei, Dingbo Hu, Feifei Wei, Donghua Liu, Chunzhi Wang","doi":"10.1007/s11227-024-06378-1","DOIUrl":"https://doi.org/10.1007/s11227-024-06378-1","url":null,"abstract":"<p>Traffic flow prediction plays a crucial role in intelligent transportation systems (ITS), offering applications across diverse domains. However, current deep learning models face significant challenges. Real-world traffic conditions, especially during peak hours, exhibit complex spatio-temporal dynamics and intricate nonlinear relationships. Existing studies often overlook variations in traffic flow across different time periods, locations, and scenarios, resulting in prediction models lacking robustness and accuracy across diverse contexts. Furthermore, simplistic models struggle to accurately forecast traffic flow during peak periods, as they typically focus on isolated features such as traffic speed, flow rate, or occupancy rate, neglecting crucial interdependencies with other relevant factors. This paper introduces a novel approach, the peak hour embedding-based multi-feature spatio-temporal coupled traffic flow prediction model (PE-MFSTC), to address these challenges. The PE-MFSTC model incorporates peak time embedding within a multirelational synchronization graph attention network structure. The peak time-based embedding involves mapping daily, weekly, and morning/evening peak periods into low-dimensional time representations, facilitating the extraction of nonlinear spatio-temporal features. The network framework employs a multirelational synchronized graph attention network, integrating multiple traffic features and spatio-temporal sequences for learning. Additionally, a spatio-temporal dynamic fusion module (STDFM) is introduced to model correlations and dynamically adjust node weights, enhancing the model’s sensitivity. Experimental evaluations on four real-world public datasets consistently demonstrate the superior performance of the PE-MFSTC model over seven state-of-the-art deep learning models. These results highlight the efficacy of the proposed model in addressing the complexities of traffic flow prediction across various scenarios.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Community detection based on influential nodes in dynamic networks 基于动态网络中有影响力节点的社群检测
The Journal of Supercomputing Pub Date : 2024-07-26 DOI: 10.1007/s11227-024-06367-4
Mahdi Kherad, Meimanat dadras, Marjan Mokhtari
{"title":"Community detection based on influential nodes in dynamic networks","authors":"Mahdi Kherad, Meimanat dadras, Marjan Mokhtari","doi":"10.1007/s11227-024-06367-4","DOIUrl":"https://doi.org/10.1007/s11227-024-06367-4","url":null,"abstract":"<p>Communities in a network are groups of nodes that are more strongly connected to each other. This article proposes a novel method for community detection in dynamic networks, focusing on influential nodes and overlapping communities. The method, named community detection based on adaptive multi-centrality aggregation (CDAMA), tackles two key challenges identifying influential nodes and overlapping communities. CDAMA introduces the Adaptive multi-centrality aggregation (AMCA) approach to identify influential nodes. AMCA integrates multiple centrality measures. The adaptive overlap control and merging (AOC-CM) approach addresses overlapping communities. AOC-CM utilizes structural, temporal, and semantic factors to strategically merge communities while preserving those with minimal overlap. CDAMA consists of five phases: receiving network snapshots, selecting influential nodes, launching communities, checking overlap and merging communities, and updating communities. Evaluation on three benchmark datasets demonstrates that CDAMA outperforms existing state-of-th-art methods in terms of Newman modularity, Modularity with split penalty and density modularity and Execution time. This suggests CDAMA is a valuable tool for tasks like viral marketing, information diffusion analysis, and network resilience studies.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APPAs: fast and efficient approximate parallel prefix adders and multipliers APPAs:快速高效的近似并行前缀加法器和乘法器
The Journal of Supercomputing Pub Date : 2024-07-24 DOI: 10.1007/s11227-024-06356-7
Bahram Rashidi
{"title":"APPAs: fast and efficient approximate parallel prefix adders and multipliers","authors":"Bahram Rashidi","doi":"10.1007/s11227-024-06356-7","DOIUrl":"https://doi.org/10.1007/s11227-024-06356-7","url":null,"abstract":"<p>In this paper, the approximate parallel prefix adders with minimizing hardware and timing complexities are proposed. Moreover, an approximate multiplier based on these adders is designed. The approximate structures include two approximate Sklansky adders, one approximate Ladner-Fischer adder, and one approximate Kogge-Stone adder. The proposed adders are free from carry rippling. The main strategy for approximate design is primarily based on rearranging and deleting sub-blocks and secondary reducing the critical path delay and area in the adders. In this case, we have a trade-off between accuracy, delay, and area. The proposed approximate multiplier has a serial structure that is designed based on using one approximate parallel prefix adder. The proposed approximate adders and multiplier are compared from hardware and accuracy point of view such as gate count, delay, area delay product, error rate, mean error distance, mean relative error distance, and normalized error distance. The efficacy of proposed structures in image processing applications such as image smoothing (low-pass filter) and image multiplication is performed using MATLAB. The results show the proposed approximate structures are comparable in terms of area, delay, PSNR, and mean structural similarity index metric parameters with other works.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
YOLO-based microglia activation state detection 基于 YOLO 的小胶质细胞活化状态检测
The Journal of Supercomputing Pub Date : 2024-07-24 DOI: 10.1007/s11227-024-06380-7
Jichi Liu, Wei Li, Houkun Lyu, Feng Qi
{"title":"YOLO-based microglia activation state detection","authors":"Jichi Liu, Wei Li, Houkun Lyu, Feng Qi","doi":"10.1007/s11227-024-06380-7","DOIUrl":"https://doi.org/10.1007/s11227-024-06380-7","url":null,"abstract":"<p>Recognition of microglia activation state is required in the research of problems such as brain neurological diseases. In this paper, a novel recognition network based on YOLOv5 is proposed for microglia activation state recognition. Firstly, the decoupled head is integrated into the head network, and secondly, novel feature extraction modules containing DenseNet are introduced: the DenseNet-C2f module and the DenseNet-SimCSPSPPF module. Subsequently, Wise-IoU is employed as the loss function, and the parameters therein are discussed. The network performance was evaluated using the microglia dataset. The experimental results show that the average precision of the enhanced network increases from 59.6 to 65.6%. In addition, the recall was improved from 56.3 to 71.5%. These improvements resulted in more efficient detection performance, which better meets the requirements of the medical field for identifying microglia activation states.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of Cuttlefish optimization-based contention control in Wireless Rechargeable Sensor Network 无线充电传感器网络中基于墨鱼优化的争用控制性能评估
The Journal of Supercomputing Pub Date : 2024-07-24 DOI: 10.1007/s11227-024-06335-y
T. Siron Anita Susan, B. Nithya
{"title":"Performance evaluation of Cuttlefish optimization-based contention control in Wireless Rechargeable Sensor Network","authors":"T. Siron Anita Susan, B. Nithya","doi":"10.1007/s11227-024-06335-y","DOIUrl":"https://doi.org/10.1007/s11227-024-06335-y","url":null,"abstract":"<p>Wireless rechargeable sensor network (WRSN) is one of the most important networks in today’s world for extending network lifetime. To ensure a collision-free contention in WRSN, this paper proposes the Contention Window Optimization using the Cuttlefish Algorithm (CWO-CA) and addresses existing issues such as the capture effect, the fairness problem, and the queue hike. For safe channel access, the fitness function of CWO-CA is proposed using the retransmission count, queue size, and residual energy of the sensor node. The proposed algorithm divides the Contention Window interval into two halves based on the fitness function, and the nodes are assigned in either half to guarantee service differentiation. The fitness function among groups of the proposed algorithm constitutes the best fitness value. By selecting the best fitness value, the proposed algorithm facilitates adaptive contention management by dynamically balancing resource utilization of the network with the optimal result. The nodal behavior of CWO-CA has been modeled using a discrete Markov model and also simulated to measure throughput, packet delivery ratio, packet loss ratio, average queue size, residual energy, and delay. These results confirm that the proposed CWO-CA algorithm attained better performance than other existing algorithms.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信