default search action
ICA3PP 2015: Zhangjiajie, China
- Guojun Wang, Albert Y. Zomaya, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part III. Lecture Notes in Computer Science 9530, Springer 2015, ISBN 978-3-319-27136-1
Applications of Parallel and Distributed Computing
- Wenbin Hu, Liping Yan, Huan Wang, Bo Du:
On Exploring a Virtual Agent Negotiation Inspired Approach for Route Guidance in Urban Traffic Networks. 3-16 - Weihao Liang, Hong An, Feng Li, Yichao Cheng:
Optimization of Binomial Option Pricing on Intel MIC Heterogeneous System. 17-29 - Chunjiang Li, Yushan Dong, Kuan Li:
Stencil Computations on HPC-oriented ARMv8 64-Bit Multi-Core Processor. 30-43 - Chuangen Gao, Hua Wang, Fangjin Zhu, Linbo Zhai, Shanwen Yi:
A Particle Swarm Optimization Algorithm for Controller Placement Problem in Software Defined Network. 44-54 - Lei Li, Yonghua Xiong, Shufan Guo, Keyuan Jiang, Yongbing Tang:
A Streaming Execution Method for Multi-services in Mobile Cloud Computing. 55-67 - Qian Li, Weiguo Wu, Zeyu Sun, Lei Wang, Jianhang Huang:
Economy-Oriented Deadline Scheduling Policy for Render System Using IaaS Cloud. 68-78 - Qiang Lan, Namit Gaur, Johannes Langguth, Xing Cai:
Towards Detailed Tissue-Scale 3D Simulations of Electrical Activity and Calcium Handling in the Human Cardiac Ventricle. 79-92 - Yizhuo Wang, Weixing Ji, Xu Chen, Sensen Hu:
Task Parallel Implementation of Matrix Multiplication on Multi-socket Multi-core Architectures. 93-104 - Yang Zhang, Dongwen Zhang, Weixing Ji, Yizhuo Wang:
Refactoring for Separation of Concurrent Concerns. 105-118 - Zhenchun Huang, Guoqing Li:
Exploiting Scalable Parallelism for Remote Sensing Analysis Models by Data Transformation Graph. 119-133 - Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Tian Wang, Xiangyong Liu:
Resource-Efficient Vibration Data Collection in Cyber-Physical Systems. 134-147 - Wenbin Jiang, Zhiwei Lu, Hai Jin, Ye Chi:
A New Approach for Vehicle Recognition and Tracking in Multi-camera Traffic System. 148-161 - Yunxiang Zhao, Wanxin Zhang, Dongsheng Li, Zhen Huang:
DFIS: A Scalable Distributed Fingerprint Identification System. 162-175 - Runshui Zhu, Hua Wang, Yanqing Gao, Shanwen Yi, Fangjin Zhu:
Energy Saving and Load Balancing for SDN Based on Multi-objective Particle Swarm Optimization. 176-189 - Chen Yang, Jie Tang, Heng Gao, Gangshan Wu:
Pre-stack Kirchhoff Time Migration on Hadoop and Spark. 190-202 - Jen-Chieh Chang, Ting-Hsuan Chien, Rong-Guey Chang:
A Cyber Physical System with GPU for CNC Applications. 203-212 - Shuai Liu, Hua Wang, Shanwen Yi, Fangjin Zhu:
NCPSO: A Solution of the Controller Placement Problem in Software Defined Networks. 213-225 - Jiangang Wu, Chang Feng, Peihuan Gao, Shizhong Liao:
Parallel Column Subset Selection of Kernel Matrix for Scaling up Support Vector Machines. 226-239 - Lianyu Cao, Penghui Juan, Yinghua Zhang:
Real-Time Deconvolution with GPU and Spark for Big Imaging Data Analysis. 240-250 - Chao Li, Yida Wang, Changhai Zhao, Haihua Yan, Jianlei Zhang:
Parallel Kirchhoff Pre-Stack Depth Migration on Large High Performance Clusters. 251-266 - Shuai Pang, Rebecca J. Stones, Mingming Ren, Gang Wang, Xiaoguang Liu:
MrBayes for Phylogenetic Inference Using Protein Data on a GPU Cluster. 267-280 - Shijin Yuan, Yiwen Qian, Bin Mu:
Paralleled Continuous Tabu Search Algorithm with Sine Maps and Staged Strategy for Solving CNOP. 281-294
Service Dependability and Security in Distributed and Parallel Systems
- Chi Lin, Kun Liu, Bo Xu, Jing Deng, Chang-Wu Yu, Guowei Wu:
VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs. 297-310 - Xiaojun Guo, Guang Cheng, Wubin Pan, Truong Dinhtu, Yixin Liang:
A Novel Search Engine-Based Method for Discovering Command and Control Server. 311-322 - Jian Cao, Qiang Fu, Qiang Li, Dong Guo:
Leveraging Behavior Diversity to Detect Spammers in Online Social Networks. 323-336 - Xinpu Ji, Yuxiang Ma, Rui Ma, Peng Li, Jingwei Ma, Gang Wang, Xiaoguang Liu, Zhongwei Li:
A Proactive Fault Tolerance Scheme for Large Scale Storage Systems. 337-350 - Jue Chen, Jinbang Chen, Fei Xu, Min Yin, Wei Zhang:
When Software Defined Networks Meet Fault Tolerance: A Survey. 351-368 - Jie Wang, Xiaoxian He:
A Novel Signature Generation Approach for Polymorphic Worms. 369-382 - Jing Wang, Chuanhe Huang, Jinhai Wang:
Scalable Access Policy for Attribute Based Encryption in Cloud Storage. 383-402 - Chi Lin, Guowei Wu, Xiaochen Lai, Tie Qiu:
Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks. 403-416 - Shaobo Zhang, Qin Liu, Guojun Wang:
Deviation-Based Location Switching Protocol for Trajectory Privacy Protection. 417-428 - Chonghua Wang, Xiao-chun Yun, Zhiyu Hao, Lei Cui, Yandong Han, Qingxin Zou:
Exploring Efficient and Robust Virtual Machine Introspection Techniques. 429-448 - Teng Li, Jianfeng Ma, Cong Sun:
CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks. 449-462 - Entao Luo, Qin Liu, Guojun Wang:
NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks. 463-474 - Nianyuan Bao, Jie Tang, Xiaoyu Zhang, Gangshan Wu:
A New Data Replication Scheme for PVFS2. 475-491 - Fang Qi, Wenbo Wang:
Efficient Private Matching Scheme for Friend Information Exchange. 492-503 - Hongbo Han, Zhenxiang Chen, Qiben Yan, Lizhi Peng, Lei Zhang:
A Real-time Android Malware Detection System Based on Network Traffic Analysis. 504-516 - Houwu Chen, Jiwu Shu:
Sky: Opinion Dynamics Based Consensus for P2P Network with Trust Relationships. 517-531 - Chun-hua Li, Ronglei Wei, Zebang Wu, Ke Zhou, Cheng Lei, Hao Jin:
Adopting Multi-mode Access Control for Secure Data Sharing in Cloud. 532-546 - Zheng Yan, Wenxiu Ding, Haiqi Zhu:
A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud. 547-561 - Xuhui Liu, Qin Liu, Tao Peng, Jie Wu:
HCBE: Achieving Fine-Grained Access Control in Cloud-Based PHR Systems. 562-576 - Lei Cui, Zhiyu Hao, Lun Li, Haiqiang Fei, Zhenquan Ding, Bo Li, Peng Liu:
Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications. 577-596 - Sheng Huo, Dafang Zhang, Yanbiao Li:
Fast and Scalable Regular Expressions Matching with Multi-Stride Index NFA. 597-610 - Jian Zhang, Ya-Wei Zhang, Jian-Biao He, Ou Jin:
A Robust and Efficient Detection Model of DDoS Attack for Cloud Services. 611-624 - GuanJun Liu, Changjun Jiang:
Secure Bisimulation for Interactive Systems. 625-639 - Shiming He, Weini Zeng, Kun Xie:
Privacy Preserving for Network Coding in Smart Grid. 640-654 - Xiaoyu Zhu, Qin Liu, Guojun Wang:
Verifiable Dynamic Fuzzy Search Over Encrypted Data in Cloud Computing. 655-666 - Hui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Qin Liu, Yupeng Hu, Huigui Rong:
A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data. 667-681 - Guangquan Xu, Yuanyuan Ren, Bin Liu, Gaoxu Zhang, Xiaohong Li, Zhiyong Feng:
PEM4RFID: Privacy Enhancement Model for RFID Systems. 682-694 - Xin Liao, Guoyong Chen, Qi Li, Jun Liu:
Improved WOW Adaptive Image Steganography Method. 695-702 - Lu Shen, Shifang Feng, Jinjin Sun, Zhongwei Li, Gang Wang, Xiaoguang Liu:
CloudS: A Multi-cloud Storage System with Multi-level Security. 703-716 - Robert Schadek, Oliver E. Theel:
Crossing - A Highly Available Quorum Protocol for Arbitrary Planar Topologies. 717-728 - Masayuki Arai, Shingo Inuyama, Kazuhiko Iwasaki:
Note on Fast Bridge Fault Test Generation Based on Critical Area. 729-740 - Yuan Yao, Pan He, Zhihao Zheng, Chun Tan, Yue Yuan:
Joint Redundancy and Inspection-Based Maintenance Optimization for Series-Parallel System. 741-755 - Zahra Shirmohammadi, Seyed Ghassem Miremadi:
Addressing NoC Reliability Through an Efficient Fibonacci-Based Crosstalk Avoidance Codec Design. 756-770 - Yung-Li Hu, Yuo-Yu Cho, Wei-Bing Su, David S. L. Wei, Yennun Huang, Jiann-Liang Chen, Ing-Yi Chen, Sy-Yen Kuo:
A Programming Framework for Implementing Fault-Tolerant Mechanism in IoT Applications. 771-784 - Sridhar Adepu, Aditya Mathur, Jagadeesh Gunda, Sasa Z. Djokic:
An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems. 785-798
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.