Computing and Combinatorics: 30th International Conference, COCOON 2024, Shanghai, China, August 23–25, 2024, Proceedings, Part II

Author:   Yong Chen ,  Xiaofeng Gao ,  Xiaoming Sun ,  An Zhang
Publisher:   Springer Nature Switzerland AG
Volume:   15162
ISBN:  

9789819610921


Pages:   567
Publication Date:   20 February 2025
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $181.10 Quantity:  
Add to Cart

Share |

Computing and Combinatorics: 30th International Conference, COCOON 2024, Shanghai, China, August 23–25, 2024, Proceedings, Part II


Add your own review!

Overview

Full Product Details

Author:   Yong Chen ,  Xiaofeng Gao ,  Xiaoming Sun ,  An Zhang
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Volume:   15162
ISBN:  

9789819610921


ISBN 10:   9819610923
Pages:   567
Publication Date:   20 February 2025
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

.- VOABE: An Efficient Verifiable Outsourced Attribute-Based Encryption for Healthcare Systems. .- Topological network-control games played on graphs. .- FAIR: Accurate Data Acquisition for Mobile Crowdsensing. .- The Hybrid Diagnosability of Hypercube Under the HMM* (Hybrid MM*) Model. .- Sponsored Search Auction Design Beyond Single Utility Maximization. .- An On-orbit Data Balancing Online Algorithm For LEO Satellite Cluster: A Repeated Stochastic Game Approach. .- Resource-limited Network Security Games with General Contagious Attacks. .- HR-tree: A Hybrid PMem-DRAM and Write-Optimized R-tree for Spatial Data Storage. .- A Dstributed Computation Offloading Scheme Based on Stackelberg Game in MEC. .- Target Influence Maximization Against Overexposure under Threshold Dependent Model in Online Social Networks. .- A Partition-and-Merge Algorithm for Solving the Steiner Tree Problem in Large Graphs. .- Analyzing the Vulnerabilities of Targets in Clean-Label Data Poisoning Attack. .- An Approach to Tight I/O Lower Bounds for Algorithms with Composite Procedures. .- Hedonic Games for Federated Learning with Model Sharing Data. .- K-Division Framework Enhances GNNs’ Expressive Power. .- An Innovative Irregular Nesting Algorithm for Flaw Avoidance. .- Efficient Partitioning Algorithms for Optimizing Big Graph Computation. .- Distributed generalized Deutsch-Jozsa algorithm. .- Average AoI Optimization at Wireless-Powered Network Edge with Stochastic Arrivals. .- Proactive Bi-objective Multi-Path Planning for Wireless Sensor Networks. .- TCFNet: Temporal-Correlated Feature Fused Network for Multivariate Time Series Classification. .- Strong chromatic index of graphs with small girth. .- A Space Efficient Algorithm for Multiset Multicover with Multiplicity Constraints Problem via Algebraic Method. .- Generative Flow Networks for Influence Maximization in Social Networks. .- Construction Algorithm of Vertex-Disjoint Paths in Circulant-Based Recursive Networks. .- Enumerating Floorplans with Any Set of Columns. .- Streaming algorithm for balance gain and cost with cardinality constraint on the integer lattice. .- Enhancing Crowding Event Detection on Campus with Multidimensional Logs: A Meta-Heuristic Search Approach. .- Construction of Binary Cooperative MSR Codes with Multiple Repair Degrees. .- Opportunistic Routing using Q-Learning with Context Information. .- A combinatorial view of Holant problems on higher domains. .- Labor: Adaptive Lazy Compaction for Learned Index in LSM-Tree. .- A Distributed Algorithm for Rumor Blocking on Social Networks. .- Convex-area-wise Linear Regression and Algorithms for Data Analysis. .- Approximating Continuous Multi-Agent Contracts with Lyapunov Function Methods. .- Privacy-preserving Byzantine-robust Federated learning via Multiparty Homomorphic Encryption. .- Perfect Indistinguishability Obfuscation for Boolean Polynomial Vector Spaces via Learning. .- IterLara: A Concise General-purpose Algebraic Model. .- The Voronoi Diagram of Weakly Smooth Planar Point Sets in $O(\log n)$ Deterministic Rounds on the Congested Clique. .- Binary Jumbled Pattern Matching: Suffix tree indexing. .- GraphDHV: Graph Neural Network with Dual Hybrid View on Imbalanced Node Classification. .- Accelerating Topic-Sensitive PageRank by Exploiting the Query History. .- Extracting Representative Co-location Patterns Considering Distributions of Spatial Features and Instances. .- Parallel Truss Maintenance Algorithms for Dynamic Hypergraphs. .- Topological Vulnerability-based Imperceptible Node Injection Attack against Dynamic Graph Neural Network.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

RGJUNE2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List