𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Distributed Computer and Communication Networks: 25th International Conference, DCCN 2022, Moscow, Russia, September 26–29, 2022, Revised Selected ... in Computer and Information Science)

✍ Scribed by Vladimir M. Vishnevskiy (editor), Konstantin E. Samouylov (editor), Dmitry V. Kozyrev (editor)


Publisher
Springer
Year
2023
Tongue
English
Leaves
391
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the 25th International Conference on Distributed Computer and Communication Networks, DCCN 2022, held in Moscow, Russia, in September 2022.
The 27 full papers and 2 short papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical sections as follows: Distributed Systems Applications, Computer and Communication Networks, Analytical Modeling of Distributed Systems.

✦ Table of Contents


Preface
Organization
Contents
Distributed Systems Applications
A Survey of the Implementations of Model Inversion Attacks
1 Introduction
2 A Brief Description of MI-Attacks
3 On Known Implementations of Attacks
3.1 Attacks by Fredrikson et al.
3.2 AIJack
3.3 Privacy Raven
3.4 Adversarial Robustness Toolbox
4 On Comparison of Implementations
5 On Known MI Attack Implementations
6 Analysis of Comparison Results and Possible Future Work
References
Multidimensional Information System Metadata Description Using the Data Vault'' Methodology 1 Introduction 2 Modeling Multidimensional Metadata 3 The Use of Classification Schemes in the Cluster Method 4 Semantic Aspects of the Application of Classification Schemes 5 Using theData Vault'' Methodology to Generate Metadata
6 Adding a Description of a Data Cube
7 Conclusions
References
Application of Convolutional Neural Networks for Image Detection and Recognition Based on a Self-written Generator
1 Introduction
2 The Difference Between Image Detection and Classification
3 Processing and Classification of Images Using Convolutional Neural Networks
3.1 Convolutional Neural Network for Image Classification
3.2 Image Processing with Convolutional Neural Network
4 Practical Example: Classification of an Image from the Zalando Database
4.1 Neural Network Training Based on Training and Test Data from the Zalando Database
4.2 Improving Classification Accuracy with the Help of a Reasoned Data Generator
5 Conclusions
References
Estimating a Polyhedron Method Informativeness in the Problem of Checking the Automaton by the Statistical Properties of the Input and Output Sequences
1 Introduction. Formulation of the Problem
2 Description of the Proposed Approach
3 Calculations for Three Classes of Automata
3.1 Shift Register
3.2 Shift Register with Internal XOR
3.3 Generalized Shift Register
4 Conclusion
References
Visual Question Answering for Response Synthesis Based on Spatial Actions
1 Introduction
1.1 The VQA Task
1.2 VQA Models Overview
1.3 VQA as Part of Bigger Systems
1.4 End-Product
2 Results
2.1 CLEVR Dataset
2.2 Testing Oscar on CLEVR Dataset
2.3 Result Analysis
3 Creating Own Dataset
3.1 RL Method
3.2 Scene Generation
3.3 Further Work
4 Conclusion
References
Application of the Piecewise Linear Approximation Method in a Hardware Accelerators of a Neural Networks Based on a Reconfigurable Computing Environments
1 Introduction
2 Reconfigurable Computing Environments
3 Hardware Accelerator Architecture
4 Implementation of Piecewise Linear Approximation with Uniform Step Using RCE
5 Implementation of an Approximation with an Irregular Step
6 Models Simulation
7 Conclusion
References
Boosting Adversarial Training in Adversarial Machine Learning
1 Introduction
2 Boosting Fast AT with Learnable Adversarial Initialization
3 Smooth Adversarial Training
4 Conclusion
References
Computer andΒ Communication Networks
On Effectiveness of the Adversarial Attacks on the Computer Systems of Biomedical Images Classification
1 Introduction
2 Background Information and Related Work
2.1 Adversarial Attacks Models
2.2 Algorithms for Adversarial Attacking Images Generation
3 Adversarial Attacks on Deep Models Effectiveness Exploration
4 Conclusion
References
Multipath Transmission of Heterogeneous Traffic in Acceptable Delays with Packet Replication and Destruction of Expired Replicas in the Nodes that Make Up the Path
1 Introduction
2 Variants of Communication Between Sources and Data Receiver in Multipath Transmissions
3 Model of Redundant Transmissions of Heterogeneous Traffic Through Series-Connected Switching Nodes with the Destruction of Expired Packets
4 Examples of Evaluating the Timeliness of Transmissions
5 A Generalized Criterion that Establishes the Influence of the Probability of Delivery of Heterogeneous Traffic Packets in a Given Time on the Economic Efficiency of Multipath Transmissions
6 Conclusion
References
The Probability of Timely Redundant Service in a Two-Level Cluster of a Flow of Requests that is Heterogeneous in Functionality and Allowable Delays
1 Introduction
2 The Structure of a Cluster of Two-Level Computer Nodes Equipped with Functionally Oriented Servers
3 Timeliness of Servicing a Heterogeneous Flow in Clusters with Servers Combined into Two-Level Nodes
4 Redundant Servicing of a Functionally Heterogeneous Flow
5 Timely Maintenance in Two-Tier Clusters Without Merging Servers into Cluster Nodes
6 An Example of Estimating the Probability of Timely Service of Functional Requests
7 Conclusion
References
Characterizing the Effects of Base Station Variable Capacity on 5G Network Slicing Performance
1 Introduction
2 System Model
2.1 Radio Channel Assumptions
2.2 Assumptions About Slices
2.3 Resource Allocation Among Slices
3 Simulation Setup
3.1 Scenario
3.2 Performance Criteria
4 Numerical Results
5 Conclusion
References
On Waiting Time Maxima in Queues with Exponential-Pareto Service Times
1 Introduction
2 Tail Asymptotic of Waiting Times
3 The Extreme Behavior of Stationary Waiting Times
4 Extremal Index
5 Numerical Experiments
5.1 Convergence to Frechet Distribution
5.2 Extremal Index Estimation
6 Conclusion
References
Simulation of Multimedia Traffic Delivery in WLAN
1 Introduction
2 Modeling Multimedia Traffic in WLAN Using NS-3
3 Analytical Model of WLAN with Multimedia Traffic
4 Conclusion
References
A Model for 5G Millimeter Wave Service Rate Abstraction
1 Introduction
2 System Model
2.1 Deployment Model
2.2 Mobility and Blockage Models
2.3 Propagation Model
2.4 Resource Allocation Model
3 The Proposed Approximation
3.1 System Level Simulations
3.2 Approximate Model
4 Numerical Results
4.1 Statistical Characteristics of the Cell Rate Process
4.2 Approximation Accuracy
5 Conclusions
References
Cybersecurity System with State Observer and K-Means Clustering Machine Learning Model
1 Introduction
2 Related Work
3 State Observer Architecture for Cybersecurity of Industrial Network
3.1 Discrete-Time System Mathematical Definition
3.2 State System Observer Control Scheme
4 Methodology of Machine Learning Algorithm Design
5 Experiment
6 Conclusion
References
Collision Provenance Using Decentralized Ledger
1 Introduction
1.1 Blockchain
1.2 Hashgraph
2 Related Works
3 Architecture
3.1 Network of DLT
3.2 Smart Contracts
4 Experiment
4.1 Factory Contract
4.2 Child GPS Contract
4.3 Router Contract
5 Conclusion
References
A First-Priority Set of Telepresence Services and a Model Network for Research and Education
1 Introduction
2 End-to-End Latency and Reliability Requirements
3 Model Network for Research and Education in the Field of Telepresence Services
4 Results of the First Tests on the Model Network
5 Conclusion
References
Analytical Modeling ofΒ Distributed Systems
Computational Analysis of a Service System with Non-replenish Queue
1 Introduction
2 Service Process by One Server
3 Service Process for Many Servers
4 Analysis of the Final Transient Period
5 Linearization for a Big Data
6 Numerical Example
7 Conclusion
References
Neuro-Fuzzy Model Based on Multidimensional Membership Function
1 Introduction
2 Neuro-fuzzy Model Based on Multidimensional Membership Function
3 Approach to the Application of Algorithms for Identifying the Coefficients of Linear Equations
3.1 Recurrent Least Squares
3.2 Kaczmarz Algorithm
3.3 Generalized Adaptive Identification Algorithms
4 Application of a Fuzzy System in the Problem of Modeling a Linear Function
5 Building a Fuzzy Neural Model to Predict the Exchange Rate
6 Conclusion
References
Controlled Markov Queueing Systems Under Uncertainty
1 Introduction
2 Related Works
3 Multichannel QS with Switching of Channels
4 Simulation of a Markovian Process for Channel Switching Decisions
5 Channel Switching Decisions Under Uncertainty: Q-learning Method
6 Statistical Evaluation of the Markov Chain Matrix
7 Systems of Higher Dimension
8 Summary
References
Fuzzy Classification Model Based on Genetic Algorithm with Practical Example
1 Introduction and Literature Review
2 Methodology
3 Example and Discussion
4 Conclusion
References
Preparing Traffic to Analyze the Dynamics of Its States by Method of Partial Correlations*-4pt
1 Introduction
2 Network Traffic Collection
3 Network Traffic Cooking
4 Algorithm for Forming Partial Correlations
5 Expanding the Scope Partial Correlation Method
6 Conclusion
References
On Approximation of the Time-Probabilistic Measures of a Resource Loss System with the Waiting Buffer
1 Introduction
2 Mathematical Model
2.1 Description of the Model
2.2 Simplification Approach
2.3 Performance Metrics of Interest
3 Numerical Results
4 Conclusion
References
A Unified Regenerative Stability Analysis of Some Non-conventional Queueing Models
1 Introduction
2 Exponential Retrial Times for Large Orbits
3 .28em plus .1em minus .1emA State-Dependent System with the Assistance Servers
4 A Batch-Arrival and Batch-Size-Dependent Service
5 Simulation
6 Conclusion
References
Speed-Up Simulation for Reliability Analysis of Wiener Degradation Process with Random Failure Threshold
1 Introduction
2 Preliminaries
3 Regenerative Structure of Degradation Process
3.1 The Case of Nonnegative Random Failure Threshold
3.2 The Case of Random Threshold from Finite Interval
4 Reliability Simulation Procedures
5 Conclusion
References
Optimization and Stability of Some Discrete-Time Risk Models
1 Introduction
2 Discrete-Time Model with Reinsurance and Bank Loans
2.1 Model Description
2.2 Optimization Problem
2.3 Model's Stability
3 Model with Investment in a Non-risky Asset
3.1 Model Description
3.2 Algorithm for Ruin Probability Calculation
4 Model with Investment in Risky and Non-risky Assets Combined with Reinsurance
4.1 Model Description
4.2 Optimal Investment Strategy
4.3 Survival Probability
5 Conclusion and Further Research Directions
References
The Markov Model of the Needham-Schroeder Protocol
1 Needham-Schroeder Protocol for Public Key Authentication on Sample
2 Protocol ``Alice Bob"2
3 Message Transferring Methods Between the Sender and the Receiver of Messages
3.1 Development of the General Case of Models with Places in AESD Phases
3.2 Development of the General Case of Models with Places in SEAD Phase)
4 Three-Phase Model of the Presented Interaction of the Considered Objects
5 Closed Stochastic Model of the Needham-Schroeder Algorithm
6 Conclusion
References
Analysis of Functioning Photonic Switches in Next-Generation Networks Using Queueing Theory and Simulation Modeling
1 Introduction
2 The Analytical Model of 44 - Photonic Switch
3 The Simulation Models of 44 and 1616 Photonic Switches
4 Numerical Results
5 Conclusion
References
Two-Way Communication Retrial Queue with Markov Modulated Poisson Input and Multiple Types of Outgoing Calls
1 Introduction
2 Mathematical Model
3 Asymptotic Diffusion Method
3.1 First Step of Diffusion Analysis
3.2 Second Step of Diffusion Analysis
4 Calculation Algorithm
5 Numerical Example
6 Conclusion
References
Author Index


πŸ“œ SIMILAR VOLUMES


Distributed Computer and Communication N
✍ Vladimir M. Vishnevskiy (editor), Konstantin E. Samouylov (editor), Dmitry V. Ko πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<span>This book constitutes the refereed post-conference proceedings of the 25th International Conference on Distributed and Computer and Communication Networks, DCCN 2022, held in Moscow, Russia, in September 26–29, 2022. <br>The 31 revised full papers and 2 revised short papers were carefully revi

Distributed Computer and Communication N
✍ Vladimir M. Vishnevskiy (editor), Konstantin E. Samouylov (editor), Dmitry V. Ko πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span>This book constitutes the refereed post-conference proceedings of the 24th International Conference on Distributed and Computer and Communication Networks, DCCN 2021, held in Moscow, Russia, in September 2021. The 26 revised full papers and 3 revised short papers were carefully reviewed and se

Distributed Computer and Communication N
✍ Vladimir M. Vishnevskiy (editor), Konstantin E. Samouylov (editor), Dmitry V. Ko πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<span>This book constitutes revised selected papers from the 24th International Conference on Distributed and Computer and Communication Networks, DCCN 2021, held in Moscow, Russia, in September 2021. Due to the COVID-19 pandemic the conference was held online. </span><p><span>The 31 full papers alo

Distributed Computer and Communication N
✍ Vladimir M. Vishnevskiy, Konstantin E. Samouylov, Dmitry V. Kozyrev πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span>This book constitutes the refereed proceedings of the 23rd International Conference on Distributed and Computer and Communication Networks, DCCN 2020, held in Moscow, Russia, in September 2020. Due to the COVID-19 pandemic the conference was held online.Β </span><p><span>The 43 papersΒ  were car

Distributed Computer and Communication N
✍ Vladimir M. Vishnevskiy (editor), Konstantin E. Samouylov (editor), Dmitry V. Ko πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span>This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Distributed and Computer and Communication Networks, DCCN 2020, held in Moscow, Russia, in September 2020.</span><p><span>The 54 revised full papers and 1 revised short paper were carefully r

Distributed computer and communication n
✍ Kozyrev, Dmitry V.; Samouylov, Konstantin E.; Vishnevskiy, Vladimir M πŸ“‚ Library πŸ“… 2017 πŸ› Springer 🌐 English

<p>This book constitutes the refereed proceedings of the 20th International Conference on Distributed and Computer and Communication Networks, DCCN 2017, held in Moscow, Russia, in September 2017.<p></p><p>The 39 full papers and the two short papers were carefully reviewed and selected from 176 subm