This book provides an in-depth examination of recent research advances in cloud-edge-end computing, covering theory, technologies, architectures, methods, applications, and future research directions. It aims to present state-of-the-art models and optimization methods for fusing and integrating clouds, edges, and devices. Cloud-edge-end computing provides users with low-latency, high-reliability, and cost-effective services through the fusion and integration of clouds, edges, and devices. As a result, it is now widely used in various application scenarios. The book introduces the background and fundamental concepts of clouds, edges, and devices, and details the evolution, concepts, enabling technologies, architectures, and implementations of cloud-edge-end computing. It also examines different types of cloud-edge-end orchestrated systems and applications and discusses advanced performance modeling approaches, as well as the latest research on offloading and scheduling policies. It also covers resource management methods for optimizing application performance on cloud-edge-end orchestrated systems. The intended readers of this book are researchers, undergraduate and graduate students, and engineers interested in cloud computing, edge computing, and the Internet of Things. The knowledge of this book will enrich our readers to be at the forefront of cloud-edge-end computing.
This book introduces the theory and applications of metaheuristic algorithms. It also provides methods for solving practical problems in such fields as software engineering, image recognition, video networks, and in the oceans. In the theoretical section, the book introduces the information feedback model, learning-based intelligent optimization, dynamic multi-objective optimization, and multi-model optimization. In the applications section, the book presents applications of optimization algorithms to neural architecture search, fuzz testing, oceans, and image processing. The neural architecture search chapter introduces the latest NAS method. The fuzz testing chapter uses multi-objective optimization and ant colony optimization to solve the seed selection and energy allocation problems in fuzz testing. In the ocean chapter, deep learning methods such as CNN, transformer, and attention-based methods are used to describe ENSO prediction and image processing for marine fish identification, and to provide an overview of traditional classification methods and deep learning methods. Rich in examples, this book will be a great resource for students, scholars, and those interested in metaheuristic algorithms, as well as professional practitioners and researchers working on related topics.
This book will serve as a guide in understanding workflow scheduling techniques on computing systems such as Cluster, Supercomputers, Grid computing, Cloud computing, Edge computing, Fog computing, and the practical realization of such methods. It offers a whole new perspective and holistic approach in understanding computing systems’ workflow scheduling. Expressing and exposing approaches for various process-centric cloud-based applications give a full coverage of most systems’ energy consumption, reliability, resource utilization, cost, and application stochastic computation. By combining theory with application and connecting mathematical concepts and models with their resource management targets, this book will be equally accessible to readers with both Computer Science and Engineering backgrounds. It will be of great interest to students and professionals alike in the field of computing system design, management, and application. This book will also be beneficial to the general audience and technology enthusiasts who want to expand their knowledge on computer structure.
This book focuses on scheduling algorithms for parallel applications on heterogeneous distributed systems, and addresses key scheduling requirements – high performance, low energy consumption, real time, and high reliability – from the perspectives of both theory and engineering practice. Further, it examines two typical application cases in automotive cyber-physical systems and cloud systems in detail, and discusses scheduling challenges in connection with resource costs, reliability and low energy. The book offers a comprehensive and systematic treatment of high-performance, low energy consumption, and high reliability issues on heterogeneous distributed systems, making it a particularly valuable resource for researchers, engineers and graduate students in the fields of computer science and engineering, information science and engineering, and automotive engineering, etc. The wealth of motivational examples with figures and tables make it easy to understand.
It has long been recognized that there are fascinating connections between cod ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the program committee. Thus, it was de cided to call on all invited speakers and presenters of accepted contributed talks to submit their manuscripts for publication in the present volume. Altogether, 39 submissions were received and subjected to another round of refereeing. After care ful scrutiny, 28 papers were accepted for publication.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.