default search action
BigCom 2015: Taiyuan, China
- Yu Wang, Hui Xiong, Shlomo Argamon, Xiang-Yang Li, Jianzhong Li:
Big Data Computing and Communications - First International Conference, BigCom 2015, Taiyuan, China, August 1-3, 2015, Proceedings, 1st Edition. Lecture Notes in Computer Science 9196, Springer 2015, ISBN 978-3-319-22046-8
Wireless Communication and Networks
- Yi-hua Zhu, Chaoran Zhu, Xianzhong Tian:
A Novel Markov Chain Model to Derive the Expected Contention Window Size and Backoff Counter for IEEE 802.11 WLAN Nodes. 3-13 - Feng Tian, Di Li, Shuyu Li, Lei Wang, Naigao Jin, Liang Sun:
RTDA: A Novel Reusable Truthful Double Auction Mechanism for Wireless Spectrum Management. 14-27 - Nan Jing, Lin Wang:
Dynamic Sparse Channel Estimation Using \ell _0 -constrained Kalman Filter in OFDM Systems. 28-42 - Ping Li, Panlong Yang, Yubo Yan, Lei Shi:
FOAM: Frequency-Offset Aware Multiple Client Selection for Cooperative Packet Recovery System. 43-52
Database and Big Data
- Meng Huang, Xiaofeng Qiu, Shufang Li, Daowei Liu:
Research on Light-Weight Compression Schemes Based on Simulative Column-Store. 55-68 - Jiewei Lan, Xiyun Liu, Hong Luo, Peng Li:
Study of Constructing Data Supply Chain Based on PROV. 69-78 - Lin Wang, Ammar Hawbani, Xingfu Wang:
Focused Deep Web Entrance Crawling by Form Feature Classification. 79-87 - Taeho Jung, Xiang-Yang Li, Junze Han:
A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm. 88-102 - Weigang Hou, Pengxing Guo, Lei Guo:
Networking Big Data: Definition, Key Technologies and Challenging Issues of Transmission. 103-112
Smart Phone and Sensing Application
- Yilei Wang, Yuanyang Tang, Jun Ma, Zhen Qin:
Gender Prediction Based on Data Streams of Smartphone Applications. 115-125 - Xiaopu Wang, Yan Xiong, Wenchao Huang:
Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones. 126-140 - Tong Qin, Huadong Ma, Dong Zhao, Tianyuan Li, Jianwei Chen:
Crowdsourcing Based Event Reporting System Using Smartphones with Accurate Localization and Photo Tamper Detection. 141-151 - Chao Wu, Bin Xu, Qi Li:
Parallel Accurate Localization from Cellular Network. 152-166 - Zusheng Zhang, Tiezhu Zhao, Huaqiang Yuan:
A Vehicle Speed Estimation Algorithm Based on Wireless AMR Sensors. 167-176
Security and Privacy
- Yudong Zhao, Ke Xu, Rashid Mijumbi, Meng Shen:
Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks. 179-192 - Dajiang Chen, XuFei Mao, Zhen Qin, Weiyi Wang, Xiang-Yang Li, Zhiguang Qin:
Wireless Device Authentication Using Acoustic Hardware Fingerprints. 193-204 - Zhiguang Qin, Shikun Wu, Hu Xiong:
Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing. 205-216 - Jing Su, Ying Long, Xiaofeng Qiu, Shufang Li, Daowei Liu:
Anomaly Detection of Single Sensors Using OCSVM_KNN. 217-230 - Zhiqiang Zhang, Yue Sun, Xiaoqin Xie, Haiwei Pan:
An Efficient Method on Trajectory Privacy Preservation. 231-240
Architecture and Applications
- Chengjian Liu, Kai Ouyang, Xiaowen Chu, Hai Liu, Yiu-Wing Leung:
R-Memcached: A Reliable In-Memory Cache System for Big Key-Value Stores. 243-256 - Bo Zhao, Wei Gao, Rongcai Zhao, Lin Han, Huihui Sun, Yingying Li:
Performance Evaluation of NPB and SPEC CPU2006 on Various SIMD Extensions. 257-272 - Yingyu Li, Yifang Zhu, Wotao Yin, Yang Liu, Guangming Shi, Zhu Han:
Prediction of High Resolution Spatial-Temporal Air Pollutant Map from Big Data Sources. 273-282 - Benika Hall, Andrew Quitadamo, Xinghua Shi:
A Graph Community Approach for Constructing microRNA Networks. 283-293
Sensor Networks and RFID
- Goutham Kamath, Lei Shi, Edmond Chow, Wen-Zhan Song:
Distributed Multigrid Technique for Seismic Tomography in Sensor Networks. 297-310 - Qian Ma, Yu Gu, Tiancheng Zhang, Fangfang Li, Ge Yu:
Energy-Efficient and Smoothing-Sensitive Curve Recovery of Sensing Physical World. 311-324 - Mingyue Cui, Chunhong Zhang, Yuewen Su, Yang Ji:
Feedback-Based Reduplicate Complex Event Processing in IoT. 325-336 - Litian Duan, Zizhong John Wang, Fu Duan:
An Identification Algorithm in Grouping and Paralleling for Data-Intensive RFID Systems. 337-346 - Ju-Min Zhao, Na Li, Deng-ao Li:
I Know When to Do the Replenishment. 347-359
Social Networks and Recommendation
- Ping Yang, Yan Song, Yang Ji:
Tag-Based User Interest Discovery Though Keywords Extraction in Social Network. 363-372 - Yan Song, Ping Yang, Chunhong Zhang, Yang Ji:
Implicit Feedback Mining for Recommendation. 373-385 - Hongyi Su, Xianfei Lin, Bo Yan, Hong Zheng:
The Collaborative Filtering Algorithm with Time Weight Based on MapReduce. 386-395 - Yuewen Su, Mingyue Cui, Yang Ji, Yunxu Yuan:
Recommendation Specially for Fanatic Fans in SNS. 396-406
Signal Processing and Pattern Recognition
- Tiezhu Qiao, Yanfei Duan, Yusong Pang:
In-Line Monitoring of Belt Transport with Adaptive Bandwidth Mean-Shift Hazard. 409-420 - Dengao Li, Yanfei Bai, Jumin Zhao:
A Method for Automated J Wave Detection and Characterisation Based on Feature Extraction. 421-433 - Yi Tang, Haitao Zhang, Bin Xu:
Metadata Organization and Retrieval with Attribute Tree for Large-Scale Traffic Surveillance Videos. 434-443 - Zhenji Wang, Dan Tao, Pingping Liu:
Development and Challenges of Crowdsourcing Quality of Experience Evaluation for Multimedia. 444-452 - Dengao Li, Xuebo Liu, Jumin Zhao:
An Approach for J Wave Auto-Detection Based on Support Vector Machine. 453-461
Routing and Resource Management
- Liang Shi, Xintong Guo, Lailong Luo, Yudong Qin:
Green and Fault-Tolerant Routing in Data Centers. 465-478 - Shuai Liu, Fan Li, Qian Zhang, Meng Shen:
A Markov Chain Prediction Model for Routing in Delay Tolerant Networks. 479-490 - Weiyang Lin, Cuibo Yu, Xu Zhang:
RAM: Resource Allocation in Mobility for Device-to-Device Communications. 491-502 - Jin Xu, Lan Yao, Fuxiang Gao:
Group Signature Based Trace Hiding in Web Query. 503-511
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.