default search action
41st IPCCC 2022: Austin, TX, USA
- IEEE International Performance, Computing, and Communications Conference, IPCCC 2022, Austin, TX, USA, November 11-13, 2022. IEEE 2022, ISBN 978-1-6654-8018-5
- Tyler Holmes, Charlie McLarty, Yong Shi, Patrick Bobbie, Kun Suo:
Energy Efficiency on Edge Computing: Challenges and Vision. 1-6 - Kun Suo, Tu N. Nguyen, Yong Shi, Jing Selena He, Chih-Cheng Hung:
Keep Clear of the Edges : An Empirical Study of Artificial Intelligence Workload Performance and Resource Footprint on Edge Devices. 7-16 - Pawissakan Chirupphapa, Md Delwar Hossain, Hiroshi Esaki, Hideya Ochiai:
Unsupervised Anomaly Detection in RS-485 Traffic using Autoencoders with Unobtrusive Measurement. 17-23 - Kefeng Wu, Chunlei Xu, Mingming Zhang, Xiongfeng Hu, Yibo Jin, Zhuzhong Qian:
RCM: Residue-aware Consolidation for Heterogeneous MLaaS Cluster. 24-31 - Yahan Hu, Kewei Lv, Jie Ma, Bin Qi:
Privacy-Preserving Closest Point Determination Based on Ciphertext Comparison. 32-40 - Justus Renkhoff, Wenkai Tan, Alvaro Velasquez, William Yichen Wang, Yongxin Liu, Jian Wang, Shuteng Niu, Lejla Begic Fazlic, Guido Dartmann, Houbing Song:
Exploring Adversarial Attacks on Neural Networks: An Explainable Approach. 41-42 - Shulin Sun, Lijun Sun, Xinran Ma, Zhenzhen Pan, Hongxin Jin:
A Trusted Distributed Crowdsourcing Framework Based on User Preferences. 43-48 - Ming Xu, Baoming Zhang, Meng Cao, Hualei Yu, Chongjun Wang:
LSEGNN: Encode Local Topology Structure in Graph Neural Networks. 49-56 - Wenxuan Yu, Minghui Xu, Dongxiao Yu, Xiuzhen Cheng, Qin Hu, Zehui Xiong:
zk-PCN: A Privacy-Preserving Payment Channel Network Using zk-SNARKs. 57-64 - Zenan Sun, Jingyi Su, Donghyun Jeon, Alvaro Velasquez, Houbing Song, Shuteng Niu:
Reinforced Contrastive Graph Neural Networks (RCGNN) for Anomaly Detection. 65-72 - Shuaicong Yu, Changqing An, Tao Yu, Ziyi Zhao, Tianshu Li, Jilong Wang:
Phishing Detection Based on Multi-Feature Neural Network. 73-79 - Shuaili Liu, Licheng Zhang, Peifa Sun, Yingshuo Bao, Lizhi Peng:
Video traffic identification with a distribution distance-based feature selection. 80-86 - Yuxi Sun, Wang Yang, Lihuan Hui:
Eliminating Communication Bottlenecks in Consensus Protocols using NDN. 87-93 - Jacob Cleveland, Robert Short, Alan Hylton:
Tropical Geometric Route Decision-Making in Simulated Lunar Gateway Communications. 94-100 - Sabur Baidya, Sumit K. Das, Mohammad Helal Uddin, Chase Kosek, Chris Summers:
Digital Twin in Safety-Critical Robotics Applications: Opportunities and Challenges. 101-107 - Xiaofeng He, Yuchao Zhang, Xiaotian Wang:
A Scalable Nested Blockchain Framework with Dynamic Node Selection Approach for IoT. 108-113 - Yuxin Chen, Dongyang Wang, Gang Lu, Junhong Ye, Feng Jin, Zhiqiang He, Bei Hua:
DTS: A Dual Transport Switching Scheme for RDMA-based Applications. 114-119 - Chen Chen, Yingwen Chen, Zhaoyun Chen, Jianchen Han, Guangtao Xue:
PickyMan: A Preemptive Scheduler for Deep Learning Jobs on GPU Clusters. 120-129 - A. B. M. Mohaimenur Rahman, Pu Wang, Weichao Wang, Yu Wang:
PaWLA: PPG-based Weight Lifting Assessment. 130-137 - Vishal Deep, Mathew L. Wymore, Daji Qiao, Henry Duwe:
Toward a Shared Sense of Time for a Network of Batteryless, Intermittently-powered Nodes. 138-146 - Qing Cao, Weisheng Si:
PECS: A Pareto-efficient and Envy-free Cloud Resource Scheduler. 147-152 - Qing Cao, Haoran Niu:
Higher-order Markov Graph based Bug Detection in Cloud-based Deployments. 153-160 - Chen Lou, Yu-e Sun, He Huang, Yang Du, Shigang Chen, Guoju Gao, Hongli Xu:
An Efficient Adaptive Denoising Sketch for Per-flow Traffic Measurement. 161-168 - Yongxin Chen, Yongjun Wang, Lumming Yang, Yuchuan Luo, Mantun Chen:
TForm-RF: An Efficient Data Augmentation for Website Fingerprinting Attack. 169-178 - Qiaojie Lu, Nan Wang, Kun Li:
MFIP: Multi-Factor Interlinked Point-of-Interest Recommendation in Location-Based Social Network. 179-184 - Ashkan Gholamhosseinian, Jochen Seitz:
Empirical Estimation of ETSI ITS-G5 Performance Over an IPv6-based Platform. 185-193 - Xuewei Ma, Wenyuan Yang, Yuesheng Zhu, Zhiqiang Bai:
A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing. 194-201 - Junhua Wong, Qingxue Zhang:
Deep Convolutional Autoencoder for Energy-efficient Smart Health Wearables In the Era of Big Data. 202-206 - Kushan Sudheera Kalupahana Liyanage, Tian Zixu, Dinil Mon Divakaran, Mun Choon Chan, Mohan Gurusamy:
APEX: Characterizing Attack Behaviors from Network Anomalies. 207-216 - Betis Baheri, Jacob Tronge, Bo Fang, Ang Li, Vipin Chaudhary, Qiang Guan:
MARS: Malleable Actor-Critic Reinforcement Learning Scheduler. 217-226 - Liqing Shan, Ming Chen, Fenghui Zhang, Yuntao Hu, Aici Wei:
A Novel Approach to Energy Efficiency Optimization in NOMA-Aided V2X Networks. 227-232 - Lizong Zhang, Yutao Jiang, Bei Hui, Zhe Liu, Guisong Liu:
An Enhanced Representation Method for Pedestrian Trajectory Prediction based on Adaptive GCN. 233-239 - Yaliang Shi, Xiwen Huang, Qihang Jiang, Qiuling Yang:
A Multi-Controllers Architecture for Software-Defined Underwater Acoustic Sensor Networks. 240-245 - Xingong Guo, Longlong Zhu, Dong Zhang, Chunming Wu:
Libra: A Stateful Layer-4 Load Balancer with Fair Load Distribution. 246-253 - Hao Xu, Long Peng, Xiaodong Liu, Menglin Zhang, Jun Ma, Jie Yu, Zibo Yi:
KylinTune: DQN-based Energy-efficient Model for Browser in Mobile Devices. 254-262 - Xueqing Wang, Liang Wang, Zhiwen Yu, Zichuan Xu, Yao Zhang, Weibo Chu:
Pricing in the Open Market of Crowdsourced Video Edge Caching: A Newcomer Perspective. 263-268 - Jonathan Bader, Fabian Lehmann, Alexander Groth, Lauritz Thamsen, Dominik Scheinert, Jonathan Will, Ulf Leser, Odej Kao:
Reshi: Recommending Resources for Scientific Workflow Tasks on Heterogeneous Infrastructures. 269-274 - Yuxin Yuan, Xiao Shi, Zhengyu Lei, Xiaohong Wang, Xiaofang Zhao:
SMPI: Scalable Serverless MPI Computing. 275-282 - Wenrui Mu, Ying Mao, Long Cheng, Qingle Wang, Weiwen Jiang, Pin-Yu Chen:
Iterative Qubits Management for Quantum Index Searching in a Hybrid System. 283-289 - Yicheng Zeng, Jiaqian Peng, Zhihui Zhao, Zhanwei Song, Hongsong Zhu, Limin Sun:
SIFOL: Solving Implicit Flows in Loops for Concolic Execution. 290-297 - Peng Zhou, Zhenyu Wang, Wen Xia, Haotong Zhang:
UltraCDC:A Fast and Stable Content-Defined Chunking Algorithm for Deduplication-based Backup Storage Systems. 298-304 - Jiayao Wang, Ziling Wei, Baosheng Wang, Jincheng Zhong, Shuhui Chen:
FATSS: Filter-Assisted Tuple Space Search for Packet Classification. 305-312 - Jianpo Li, Kun Liu, Jun Wang:
Data Query Routing Algorithm with Cluster Bridge for Wireless Sensor Network. 313-318 - Hao Zhang, Yuandong Min, Sanya Liu, Hang Tong, Yaopeng Li:
MODLSTM: A Method to Recognize DoS Attacks on Modbus/TCP. 319-324 - Mingxi Liu, Yongcheng Liu, Zhifei Ma, Zachary Porter, Jae Chung, Saahil Claypool, Feng Li, Jacob Tutlis, Mark Claypool:
The Effects of a Performance Enhancing Proxy on TCP Congestion Control over a Satellite Network. 325-331 - Shafayat Mowla Anik, Byeong Kil Lee:
Trace Characterization based Cache Replacement Policy. 332-337 - Amani Benamor, Oussama Habachi, Inès Kammoun, Jean-Pierre Cances:
NOMA-based Power Control for Machine-Type Communications: A Mean Field Game Approach. 338-343 - Derun Zou, Xusheng Liu, Lintan Sun, Jian-Hui Duan, Ruichen Li, Yeting Xu, Wenzhong Li, Sanglu Lu:
FedMC: Federated Reinforcement Learning on the Edge with Meta-Critic Networks. 344-351 - Qinyu Xia, Shi Dong, Tao Peng:
An Abnormal Traffic Detection Method for IoT Devices Based on Federated Learning and Depthwise Separable Convolutional Neural Networks. 352-359 - Ismail Ataie, Tania Taami, Sadoon Azizi, Md Mainuddin, Daniel Schwartz:
D2FO: Distributed Dynamic Offloading Mechanism for Time-Sensitive Tasks in Fog-Cloud IoT-based Systems. 360-366 - Hadi Sahin, Kemal Akkaya, Sukumar Ganapati:
Optimal Incentive Mechanisms for Fair and Equitable Rewards in PoS Blockchains. 367-373 - Baisong Li, Wenlong Tian, Ruixuan Li, Weijun Xiao, Zhongming Fu, Xuming Ye, Renjiao Duan, Yusheng Li, Zhiyong Xu:
Cross-domain Resemblance Detection based on Meta-learning for Cloud Storage. 374-379 - Xiaohui Wei, Xiukun Wei, Xingwang Wang, Yundi Wang, Yan Niu:
HRCache: Edge-End Collaboration for Mobile Deep Vision Based on H.264 and Approximated Reuse. 380-388 - Xijia Lu, Xingwei Wang, Jie Jia, Xue Wang, Min Huang:
Max-Min Fairness based Scheduling Optimization Mechanism on Switches. 389-396 - Ripon Patgiri, Malaya Dutta Borah:
HEX-BLOOM: An Efficient Method for Authenticity and Integrity Verification in Privacy-preserving Computing. 397-403 - Xiaoqing Sun, Jiahai Yang:
HetGLM: Lateral Movement Detection by Discovering Anomalous Links with Heterogeneous Graph Neural Network. 404-411 - Jui Mhatre, Ahyoung Lee:
Dynamic Reinforcement Learning based Scheduling for Energy-Efficient Edge-Enabled LoRaWAN. 412-413 - Yuqi Fu, Naseem Machlovi, Ying Mao, Jiayin Wang, Long Cheng, Qingzhi Liu:
Performance Evaluation of Resource Management Schemes for Cloud Native Platforms with Computing Containers. 414-415 - Shuhan Chen, Congqi Shen, Chunming Wu, Yi Shen:
DeepThrottle: Deep Reinforcement Learning for Router Throttling to Defend Against DDoS Attack in SDN. 416-417 - Amin Sarihi, Michael A. Schoenfelder, Abdel-Hameed A. Badawy:
Performance Evaluation of an Out-of-Order RISC-V CPU: A SPEC INT 2017 Study. 418-419
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.