default search action
ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: Melbourne, Australia
- Jinjun Chen, Laurence T. Yang:
IEEE International Conference on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018, Melbourne, Australia, December 11-13, 2018. IEEE 2018, ISBN 978-1-7281-1141-4
IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2018)
- Ying Qin, Yan Ding, Yusong Tan, Qingbo Wu:
Solution Space Adjustable CNF Obfuscation for Privacy-Preserving SAT Solving. 1-8 - Jiugen Shi, Ji Wang, Huawei Huang, Lulu Shen, Jin Zhang, Hao Xu:
Joint Optimization of Stateful VNF Placement and Routing Scheduling in Software-Defined Networks. 9-14 - Baicheng Yan, Yi Zhou, Limin Xiao, Zhang Yang, Hongyu Wu, Bing Wei:
A Low Cost Method for Determining the Entire Network Path Bandwidths of Indirect High-Performance Computer Networks. 15-22 - Xinyu Chen, Hansheng Wei, Xin Ye, Li Hao, Yanhong Huang, Jianqi Shi:
Efficient Parallel CTL Model-Checking for Pushdown Systems. 23-30 - Wenhao Zhu, Wu Zhang, Bohan Ding, Kangle Xu:
Acoustics Simulation on Sunway TaihuLight Based on Solving the Integral of Ffowcs Williams-Hawkings Equation. 31-38 - Rui-dong Qi, Jian-Tao Zhou, Xiaoyu Song:
An Effective Clustering Method for Finding Density Peaks. 39-46 - Wenming Li, Xiaochun Ye, Da Wang, Hao Zhang, Dongdong Wu, Zhimin Zhang, Dongrui Fan:
WEAVER: An Energy Efficient, General-Purpose Acceleration Architecture for String Operations in Big Data Applications. 47-54 - Germán Ceballos, Erik Hagersten, David Black-Schaffer:
Tail-PASS: Resource-Based Cache Management for Tiled Graphics Rendering Hardware. 55-63 - Yu Qiao, Yi Gu, Jun Wu, Lei Zhang, Chongjun Wang:
A Truthful Profit-Oriented Mechanism for Mobile Crowdsensing. 64-71 - Yu Qiao, Yue Song, Nan Wang, Jun Wu, Lei Zhang, Chongjun Wang:
A False-Name-Proof Protocol for Multicast Routing Auctions. 72-79 - Lianpeng Li, Jian Dong, Decheng Zuo, Jiaxi Liu:
SLA-Aware and Energy-Efficient VM Consolidation in Cloud Data Centers Using Host States Naive Bayesian Prediction Model. 80-87 - Hansheng Wei, Xinyu Chen, Xin Ye, Neng Fu, Yanhong Huang, Jianqi Shi:
Parallel Model Checking on Pushdown Systems. 88-95 - Erzhou Zhu, Peng Wen, Binbin Zhu, Feng Liu, Futian Wang, Xuejun Li:
Effective Clustering Analysis Based on New Designed Clustering Validity Index and Revised K-Means Algorithm for Big Data. 96-102 - Junfeng Zhao, Zhimei Zhao, Hongji Yang:
Distributed Parallelizability Analysis of Legacy Code. 103-110 - Hongli Lu, Guangping Xu, Bo Tang, Shengli Li, Mian Zhou:
Efficient Online Stream Deduplication for Network Block Storage. 111-119 - Hui Xie, Kun Lv, Changzhen Hu:
A Partition Matching Method for Optimal Attack Path Analysis. 120-126 - Sang Nguyen, Zoran Salcic, Xuyun Zhang:
Big Data Processing in Fog - Smart Parking Case Study. 127-134 - Jianhui Zhou, Yongmei Lei:
Asynchronous Group-Based ADMM Algorithm under Efficient Communication Structure. 135-140 - Deqing Bu, Yaobin Wang, Ling Li, Zhiqin Liu, Wenxin Yu, Manasah Musariri:
Exploring Parallelism in MiBench with Loop and Procedure Level Speculation. 141-146 - Hiba Ouni, Kais Klai, Chiheb Ameur Abid, Belhassen Zouari:
Reducing Time and/or Memory Consumption of the SOG Construction in a Parallel Context. 147-154 - Haolei Ye, Eric McCreath:
FLAC Decoding Using GPU Acceleration. 155-162 - Ahmad Lashgar, Ehsan Atoofian, Amirali Baniasadi:
Loop Perforation in OpenACC. 163-170 - Yuma Sakakibara, Yuta Tokusashi, Shin Morishima, Hiroki Matsutani:
Accelerating Blockchain Transfer System Using FPGA-Based NIC. 171-178 - Dongchao Ma, Hongchao Li, Xingguo Sun, Li Ma, Chengan Zhao:
An Energy and Robustness Adjustable Optimization Method of File Distribution Services. 179-186 - Yue Yang Yang, Wangqiaohong Wang, Yangjing Yang, Zhangjianpei Zhang, Maxiaoyang Ma:
Subgroup Discovery Method Based on User Behavior Analysis. 187-192 - Youze Zhu, Yanqin Yang, Wenchao Xu:
Neighboring and Non-Neighboring Features for Pedestrian Detection. 193-198 - Xuehai Tang, Qiuyang Liu, Yangchen Dong, Jizhong Han, Zhiyuan Zhang:
Fisher: An Efficient Container Load Prediction Model with Deep Neural Network in Clouds. 199-206 - Shigan Yu, Zhimin Tang, Xiaochun Ye, Zhimin Zhang, Dongrui Fan, Zhiying:
High-Performance and Energy-Efficient Fault Tolerance Scheduling Algorithm Based on Improved TMR for Heterogeneous System. 207-214 - Tianqi Liu, Xuefeng Yan, Cen Shenzhi:
Site-Effect-Based Semi-Synchronous Label Propagation Algorithm for Community Detection. 215-222 - Qi Zha, Xuefeng Yan, Yong Zhou:
Adaptive Centre-Weighted Oversampling for Class Imbalance in Software Defect Prediction. 223-230 - Wenbin Yao, Yuanhao Ding, Xiaoyong Li:
LogoPhish: A New Two-Dimensional Code Phishing Attack Detection Method. 231-236 - Xirong Xu, Huifeng Zhang, Pir Soomro:
Fault-Tolerant Edge-Pancyclicity of Möbius Cube MQ_n. 237-243 - Shin Morishima, Hiroki Matsutani:
Acceleration of Anomaly Detection in Blockchain Using In-GPU Cache. 244-251 - Shengbo Song, Lelai Deng, Jun Gong, Hanmei Luo:
Gaia Scheduler: A Kubernetes-Based Scheduler Framework. 252-259 - Qing Zhou, Qingjie Zhao, Li Zhou, Junshe An, Changbin Xue, Yuyin Tan, Jianing Rao:
Design of a Compact and Reconfigurable Onboard Data Handling System. 260-264 - Huaping Yuan, Zhenguo Yang, Xu Chen, Yukun Li, Wenyin Liu:
URL2Vec: URL Modeling with Character Embeddings for Fast and Accurate Phishing Website Detection. 265-272 - Feiran Wang, Yiping Wen, Tianhang Guo, Jinjun Chen, Buqing Cao:
Personalized Commodity Recommendations of Retail Business Using User Feature Based Collaborative Filtering. 273-278 - Najet Hamdi, Walid Chainbi, Mohamed Ali Mahjoub:
A Transition State Cost Sensitive Virtual Machines Consolidation. 279-286 - Zifan Liu, Haipeng Dai, Bingchuan Tian, Wajid Rafique, Wanchun Dou:
Efficient Coflow Scheduling of Multi-Stage Jobs with Isolation Guarantee. 287-294 - Xianfeng Li, Jianfeng Li, Jie Chen:
Effective Cooperative UAV Searching Using Adaptive STGM Mobility Model in a FANET. 295-301 - Tao Sun, Wenjie Zhong:
A Data Related Behaviors Automatic Detection Method for Parallel Software Testing. 302-307 - Wenda Tang, Xuan Zhao, Wajid Rafique, Wanchun Dou:
A Blockchain-Based Offloading Approach in Fog Computing Environment. 308-315 - Amir Javadpour, Guojun Wang, Xiaofei Xing:
Managing Heterogeneous Substrate Resources by Mapping and Visualization Based on Software-Defined Network. 316-321 - Xinzhou Dong, Beihong Jin, Bo Tang, Hongyin Tang:
On Real-Time Monitoring on Data Stream for Traffic Flow Anomalies. 322-329 - Yang Zhang, Dan Feng, Zhipeng Tan, Jingning Liu, Wei Tong, Chengning Wang:
Asymmetric-ReRAM: A Low Latency and High Reliability Crossbar Resistive Memory Architecture. 330-337 - Qiongjie Yao, Xiaofei Liao, Hai Jin:
Hierarchical Attention Based Recurrent Neural Network Framework for Mobile MOBA Game Recommender Systems. 338-345 - Yang Yang, Xiaolin Chang, Zhen Han, Lin Li:
Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework. 346-353 - Yuhan Gao, Liwei Chen, Gang Shi, Fei Zhang:
A Comprehensive Detection of Memory Corruption Vulnerabilities for C/C++ Programs. 354-360 - Xiao Shi, Detian Hu, Hongwei Tang, Xiaohui Zheng, Xiaofang Zhao:
Using Centralized I/O Scheduling Service (CISS) to Improve Cloud Object Storage Performance. 361-368 - Weichao Mao, Jian Cao, Guangtao Xue, Jiadi Yu, Yanmin Zhu, Minglu Li, Wenjuan Li, Shiyou Qian:
Adjusting Matching Algorithm to Adapt to Dynamic Subscriptions in Content-Based Publish/Subscribe Systems. 369-376 - Qi Yu, Libo Huang, Hui Guo, Cheng Qian, Sheng Ma, Zhiying Wang:
Improving Branch Prediction Accuracy on Multi-Core Architectures for Big Data. 377-382 - Heng Guo, Zuoning Chen, Xin Liu:
AALB: Adaptive Algorithm of Load Balance for CAM Physics on Sunway TaihuLight Supercomputer. 383-390 - Jingli Wang, Wei Zhou, Jiacheng Li, Zhou Yan, Jizhong Han, Songlin Hu:
An Online Sockpuppet Detection Method Based on Subgraph Similarity Matching. 391-398 - Jie Xu, Jingyu Wang, Qi Qi, Jianxin Liao:
Proportion Scheduler to Improve the Mismatched Locality in YARN. 399-406 - Yizhe Yang, Qingni Shen, Wu Xin, Wenjun Qian, Yahui Yang, Zhonghai Wu:
Memory Cache Attacks on Alluxio Impede High Performance Computing. 407-414 - Miguel Areias, Ricardo Rocha:
On Extending a Fixed Size, Persistent and Lock-Free Hash Map Design to Store Sorted Keys. 415-422 - Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Shuhong Chen:
Wi-Fi Radar Placement for Coverage in Collapsed Structures. 423-430 - Tao Sun, Yangyang Liu:
A Hierarchical CPN Model Automatically Generating Method Aiming at Multithreading Program Algorithm Error Detection. 431-437 - Meng Sun, Haopeng Chen:
Heuristic Prefetching Caching Strategy to Enhance QoE in Edge Computing. 438-445 - Tao Sun, Ting Zhang, Xin Guo:
Parallel Software Testing Sequence Generation Method Based on State Pruning. 446-453 - Jun Chen, Haopeng Chen:
A Topology-Based Approach to Pattern Recognition on Graph-Structured Data. 454-461 - Bing Shi, Han Yuan, Rongjian Shi:
Pricing Cloud Resource Based on Multi-Agent Reinforcement Learning in the Competing Environment. 462-468 - Jing Gu, Shengbo Song, Ying Li, Hanmei Luo:
GaiaGPU: Sharing GPUs in Container Clouds. 469-476 - Yongnan Li:
A Revised DNA Computing Model of Inversion and Division over Finite Field GF (2^n). 477-484 - Yayu Guo, Fang Lin, Yi Liu, Depei Qian:
Re-Running Large-Scale Parallel Programs Using Two Nodes. 485-492 - Xuguang Bao, Lizhen Wang:
A Co-Location-Based Approach for Business Site Selection Using Ontologies. 493-500 - Jingyuan Hu, Xiaokuang Bai, Sai Sha, Yingwei Luo, Xiaolin Wang, Zhenlin Wang:
Working Set Size Estimation with Hugepages in Virtualization. 501-508 - Xiangping Zhang, Jianxun Liu, Buqing Cao, Qiaoxiang Xiao, Yiping Wen:
Web Service Recommendation via Combining Doc2Vec-Based Functionality Clustering and DeepFM-Based Score Prediction. 509-516 - Wenbin Yao, Lijuan Zhang, Xiaoyong Li:
Maximizing Influence Propagation in Networks by User-Relational Iterative Ranking Algorithm. 517-524 - Ke Zhan, Lili Xu, Zimu Yuan, Weijuan Zhang:
Performance Optimization of Large Files Writes to Ceph Based on Multiple Pipelines Algorithm. 525-532 - Qinghan Yu, Tian Wang, Xibin Zhao, Hai Wang, Yue Gao, Chenyang Lu, Ming Gu:
Fast Real-Time Scheduling for Ethernet-Based Train Control Networks. 533-540 - Muhammad Hassan, Haopeng Chen, Yutong Liu:
DEARS: A Deep Learning Based Elastic and Automatic Resource Scheduling Framework for Cloud Applications. 541-548 - Yiping Teng, Jinyan Liu, Xiaoting Liu, Guohui Ding, Chunlong Fan:
Secure Spatial Network Queries on Cloud Platform. 549-556 - Bo Zhao, Xiaoyan Xu, Peng Liu, Yingying Li, Rongcai Zhao, Ramin Yahyapour:
A Demand-Driven Pointer-Range Analysis Technique for Data Transmission Optimization. 557-564 - Guolin Tan, Peng Zhang, Qingyun Liu, Xinran Liu, Chunge Zhu, Li Guo:
MalFilter: A Lightweight Real-Time Malicious URL Filtering System in Large-Scale Networks. 565-571 - Xinhui Tian, Biwei Xie, Jianfeng Zhan:
Cymbalo: An Efficient Graph Processing Framework for Machine Learning. 572-579 - Kishwar Ahmed, Jesse Bull, Jason Liu:
Contract-Based Demand Response Model for High Performance Computing Systems. 580-589 - Zhibin Wang, Yiping Wen, Jinjun Chen, Buqing Cao, Feiran Wang:
Towards Energy-Efficient Scheduling with Batch Processing for Instance-Intensive Cloud Workflows. 590-596 - Wang Xiong, Yijie Wang, Li Cheng:
Fisher Discriminant Analysis Random Forest for Online Class Incremental Learning. 597-604 - Zengxiao Zhang, Zhongzhi Luan, Chongyang Xu, Ming Gong, Shun Xu:
Accelerating Lattice QCD on Sunway Many-Core Processor. 605-612 - Yuchen Wong, Qingni Shen:
Secure Virtual Machine Placement and Load Balancing Algorithms with High Efficiency. 613-620 - Xiaohui Luo, Danfeng Shan, Tong Zhang, Hao Zhang, Xunli Fan, Fengyuan Ren:
PacketCache: Improving OS Stacks for Streaming with Identical Contents. 621-628 - Omar Ben Maaouia, Hazem Fkaier, Christophe Cérin, Mohamed Jemni:
Energy-Efficient Strategy for Placement of Online Services on Dynamic Availability Resources in Volunteer Cloud. 629-636 - Emna Hammami, Yosr Slama:
Optimizing Tiled Matrix-Matrix Product According to Cache Performance Enhancement. 637-644 - Wenbin Yao, Yuanhao Ding, Xiaoyong Li:
Deep Learning for Phishing Detection. 645-650 - Xiaohui Luo, Dong Liu, Xing Wu, Xunli Fan, Fengyuan Ren:
Making Userspace TCP Stacks Transparent to Applications. 651-658 - Wenqi Li, Dehua Chen, Jiajin Le:
Robot Patrol Path Planning Based on Combined Deep Reinforcement Learning. 659-666 - Fereydoun Farrahi Moghaddam, Wubin Li, Abdelouahed Gherbi:
DataFall: A Policy-Driven Algorithm for Decentralized Placement and Reorganization of Replicated Data. 667-675 - Zhaohua Zhang, Naiyong Ao, Gang Wang, Xiaoguang Liu:
An Extensible Search Engine Platform for Efficiency Research. 676-683 - Pritish Mishra, Mayank Tiwary, Laurence T. Yang, Deepak Puthal:
S2R: Service Trading Based Response Time Optimization in Mobile Edge Computing. 684-691 - Tianye Yang, Dezun Dong, Cunlu Li, Liquan Xiao:
CRSP: Network Congestion Control through Credit Reservation. 692-699 - Liangfeng Cheng, Yuchong Hu, Wei Wei, Renzhi Xiao:
Enhanced Self-Coding for Available Memcached. 700-707 - Mingyi Chen, Yepeng Yao, Junrong Liu, Bo Jiang, Liya Su, Zhigang Lu:
A Novel Approach for Identifying Lateral Movement Attacks Based on Network Embedding. 708-715 - Lei Wang, Yu Deng, Rui Gong, Wei Shi, Zhenyu Zhao, Qiang Dou:
A Parallel Algorithm for Instruction Dependence Graph Analysis Based on Multithreading. 716-721 - Yuan Cai, Dong Xiang, Xiang Ji:
Deadlock-Free Adaptive Routing Based on the Repetitive Turn Model for 3D Network-on-Chip. 722-728 - Qing Qin, Jie Ren, Jialong Yu, Hai Wang, Ling Gao, Jie Zheng, Yansong Feng, Jianbin Fang, Zheng Wang:
To Compress, or Not to Compress: Characterizing Deep Learning Model Compression for Embedded Inference. 729-736 - Ruichao Gao, Xuebin Ma:
Dynamic Data Histogram Publishing Based on Differential Privacy. 737-743 - Shu Gao, Zilong Jiang, Yunhui Shi, Guanyu Wang, Liangchen Chen, Abdoulaye Sidibé:
A CTR Prediction Approach for Advertising Based on Embedding Model and Deep Learning. 744-750 - Likun Liu, Jiantao Shi, Hongli Zhang, Xiangzhan Yu:
Tearing Down the Face of Algorithmic Complexity Attacks for DPI Engines. 751-758 - Erzhou Zhu, Dong Liu, Chengcheng Ye, Feng Liu, Xuejun Li, Hui Sun:
Effective Phishing Website Detection Based on Improved BP Neural Network and Dual Feature Evaluation. 759-765 - Erzhou Zhu, Binbin Zhu, Peng Wen, Feng Liu, Xuejun Li, Futian Wang:
Effective Clustering Analysis Based on New Designed CVI and Improved Clustering Algorithms. 766-772 - Wenan Wang, Chuang Zhang, Xiaojun Chen, Zhao Li, Hong Ding, Xin Wen:
An On-the-Fly Scheduling Strategy for Distributed Stream Processing Platform. 773-780 - Erzhou Zhu, Chengcheng Ye, Dong Liu, Feng Liu, Futian Wang, Xuejun Li:
An Effective Neural Network Phishing Detection Model Based on Optimal Feature Selection. 781-787 - Peng Zhang, Yan Li, Hailun Lin, Jianwu Wang, Chuang Zhang:
A Periodic Task-Oriented Scheduling Architecture in Cloud Computing. 788-794 - Mingzhu Li, Xuebin Ma:
Bayesian Networks-Based Data Publishing Method Using Smooth Sensitivity. 795-800 - Chunhua Li, Jinbiao He, Cheng Lei, Chan Guo, Ke Zhou:
Achieving Privacy-Preserving CP-ABE Access Control with Multi-Cloud. 801-808 - Yingjie Zhang, Liang Zeng, Ying Zhang, Jie Meng:
2D Otsu Segmentation Algorithm Improvement Based on FOCPSO. 809-815 - Xin Li, Zhen Lian, Xiaolin Qin, Jemal H. Abawajy:
Delay-Aware Resource Allocation for Data Analysis in Cloud-Edge System. 816-823 - Guangqiang Luan, Yuebin Bai, Chunyang Wang, Junfang Zeng, Qingbin Chen:
An Efficient Checkpoint and Recovery Mechanism for Real-Time Embedded Systems. 824-831 - Hammad Qaiser, Gao Shu:
Efficient VM Selection Heuristics for Dynamic VM Consolidation in Cloud Datacenters. 832-839 - Peng Zhang, Lichao Xing, Ninggou Yang, Guolin Tan, Qingyun Liu, Chuang Zhang:
Redis++: A High Performance In-Memory Database Based on Segmented Memory Management and Two-Level Hash Index. 840-847 - Weijia Jia, Hanwu Wang:
An Optimized Assisted Hybridcast Transmission Scheme in Mobile Wireless Networks. 848-855 - Xianfeng Li, Jie Chen, Jianfeng Li:
FATES: A Framework with Adaptive Track-Explore Strategy for Moving Targets Search by a FANET. 856-861 - Congwu Li, Jingqiang Lin, Quanwei Cai, Bo Luo:
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines. 862-869 - Yuanyuan Sun, Lele Xu, Ye Li, Lili Guo, Zhongsong Ma, Yongming Wang:
Utilizing Deep Architecture Networks of VAE in Software Fault Prediction. 870-877 - Runze Yang, Baoqi Huang, Jian Song, Bing Jia, Wuyungerile Li:
An Energy Efficient Smartphone Pedometer Based on an Auto-Correlation Analysis. 878-885 - Adel Nadjaran Toosi, Rajkumar Buyya:
Acinonyx: Dynamic Flow Scheduling for Virtual Machine Migration in SDN-Enabled Clouds. 886-894 - Mehdi Gheisari, Guojun Wang, Shuhong Chen, Ali Seyfollahi:
A Method for Privacy-Preserving in IoT-SDN Integration Environment. 895-902 - Ting Chen, Jianxun Liu, Buqing Cao, Zhenlian Peng, Yiping Wen, Run Li:
Web Service Recommendation Based on Word Embedding and Topic Model. 903-910 - Ario Sadafi, Martin Radolko, Iosif Serafeimidis, Steffen Hadlak:
Red Blood Cells Segmentation: A Fully Convolutional Network Approach. 911-914 - Hamid Arabnejad, João Bispo, Jorge G. Barbosa, João M. P. Cardoso:
An OpenMP Based Parallelization Compiler for C Applications. 915-923 - Daniele Apiletti, Claudia Barberis, Tania Cerquitelli, Alberto Macii, Enrico Macii, Massimo Poncino, Francesco Ventura:
iSTEP, an Integrated Self-Tuning Engine for Predictive Maintenance in Industry 4.0. 924-931 - Kennedy A. Torkura, Muhammad I. H. Sukmana, Anne V. D. M. Kayem:
A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures. 932-939 - Santonu Sarkar, Sreekrishnan Venkateswaran:
Best-Fit Containerization as a Brokered Service. 940-947 - Gargi Alavani, Kajal Varma, Santonu Sarkar:
Predicting Execution Time of CUDA Kernel Using Static Analysis. 948-955 - Bo Wang, Jie Tang, Rui Zhang, Wei Ding, Deyu Qi:
LCRC: A Dependency-Aware Cache Management Policy for Spark. 956-963 - Yibin Xu, Yangyu Huang:
MWPoW - Multi-Winner Proof of Work Consensus Protocol: An Immediate Block-Confirm Solution and an Incentive for Common Devices to Join Blockchain. 964-971 - Sai Sha, Yingwei Luo, Zhenlin Wang, Xiaolin Wang:
A Neural Network Model for Cache and Memory Prediction of Neural Networks. 972-978 - Hugo Meyer, Uraz Odyurt, Simon Polstra, Evangelos Paradas, Ignacio Gonzalez Alonso, Andy D. Pimentel:
On the Effectiveness of Communication-Centric Modelling of Complex Embedded Systems. 979-986 - Heena Wadhwa, Rajni Aron:
Fog Computing with the Integration of Internet of Things: Architecture, Applications and Future Directions. 987-994 - Issam Raïs, Hélène Coullon, Laurent Lefèvre, Christian Pérez:
Automatic Energy Efficient HPC Programming: A Case Study. 995-1002 - Zechao Liu, Zoe Lin Jiang, Xuan Wang, Yulin Wu, Siu-Ming Yiu:
Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices. 1003-1008 - Arthur Silitonga, Florian Schade, Guanru Jiang, Jürgen Becker:
HLS-Based Performance and Resource Optimization of Cryptographic Modules. 1009-1016 - Zainab Abbas, Thorsteinn Thorri Sigurdsson, Ahmad Al-Shishtawy, Vladimir Vlassov:
Evaluation of the Use of Streaming Graph Processing Algorithms for Road Congestion Detection. 1017-1025 - Gang Xu, Xiaoxiao Li, Guojun Yuan, Zhan Wang, Guangming Tan, Xuejun An:
Routing and Spectrum Allocation for Time Varying Traffic by Artificial Bee Colony Algorithm in Elastic Optical Networks. 1026-1033 - Xuguang Bao, Lizhen Wang:
A Business Site Selection System Using Co-Locations and Ontologies. 1034-1035 - Xue Yang, Bingyang Liu, Fei Yang, Chuang Wang:
A Blockchain Based Online Trading System for DDoS Mitigation Services. 1036-1037 - Xuejun Li, Ruimiao Ding, Xiao Liu, Wenqiang Yan, Jia Xu, Han Gao, Xi Zheng:
COMEC: Computation Offloading for Video-Based Heart Rate Detection APP in Mobile Edge Computing. 1038-1039 - Junfeng Zhao, Minjia Zhang:
Refactoring OpenMP Code Based on MapReduce Model. 1040-1041 - Junfeng Zhao, Wenmeng Wang, Hongji Yang:
Code Refactoring Based on MapReduce in Cloud Migration. 1042-1043 - Kaho Okuyama, Yuta Tokusashi, Takuma Iwata, Mineto Tsukada, Kazumasa Kishiki, Hiroki Matsutani:
Network Optimizations on Prediction Server with Multiple Predictors. 1044-1045 - Boguslaw Cyganek, Kazimierz Wiatr:
Design of a Visual Front-End for Parallel Signal Processing on Underwater Search Drone. 1046-1047
17th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2018)
- Estefania Serrano, Javier García-Blas, Jesús Carretero:
A Cloud Environment for Ubiquitous Medical Image Reconstruction. 1048-1055 - Nicolas Verstaevel, Guillaume Garzone, Thierry Monteil, Nawal Guermouche, Johan Barthélemy, Pascal Perez:
An Ontology Based Context-Aware Architecture for Smart Campus Applications. 1056-1063 - Md. Akbar Hossain:
A Technology Assisted Framework for Medical Emergencies Involving Formal and Informal Caregivers. 1064-1070
8th IEEE International Conference on Big Data and Cloud Computing (BDCloud 2018)
- Duy Nguyen Phuong, Thanh Pham Chi:
A Hybrid Indoor Localization System Running Ensemble Machine Learning. 1071-1078 - Jianjun Cao, Qibin Zheng, Nianfeng Weng, Xingchun Diao:
Low Dimensional Representation of Space Structure and Clustering of Categorical Data. 1079-1086 - Ruxia Li, Chase Q. Wu, Aiqin Hou, Yongqiang Wang, Tianyu Gao, Mingrui Xu:
On Scheduling of High-Throughput Scientific Workflows under Budget Constraints in Multi-Cloud Environments. 1087-1094 - Qianwen Ye, Chase Q. Wu, Huiyan Cao, Nageswara S. V. Rao, Aiqin Hou:
Storage-Aware Task Scheduling for Performance Optimization of Big Data Workflows. 1095-1102 - Konstantin Sozinov, Vladimir Vlassov, Sarunas Girdzijauskas:
Human Activity Recognition Using Federated Learning. 1103-1111 - Sangmi Lee Pallickara, Maxwell Roselius:
Radix: Enabling High-Throughput Georeferencing for Phenotype Monitoring over Voluminous Observational Data. 1112-1119 - Mandeep Kaur Saroa, Rajni Aron:
Fog Computing and Its Role in Development of Smart Applications. 1120-1127
11th IEEE International Conference on Social Computing and Networking (SocialCom 2018)
- Kazuki Nakajima, Kenta Iwasaki, Toshiki Matsumura, Kazuyuki Shudo:
Estimating Top-k Betweenness Centrality Nodes in Online Social Networks. 1128-1135 - Kenta Iwasaki, Kazuyuki Shudo:
Comparing Graph Sampling Methods Based on the Number of Queries. 1136-1143 - Shatha Jaradat, Nima Dokoohaki, Kim Hammar, Ummul Wara, Mihhail Matskin:
Dynamic CNN Models for Fashion Recommendation in Instagram. 1144-1151 - Meng Seng Wong, Hideki Nishimoto, Nishigaki Yasuyuki:
The Incorporation of Social Media in an Emergency Supply and Demand Framework in Disaster Response. 1152-1158 - Kaustav Basu, Chenyang Zhou, Arunabha Sen, Victoria Horan Goliber:
A Novel Graph Analytic Approach to Monitor Terrorist Networks. 1159-1166 - Sunil Choenni, Niels Netten, Mortaza Shoae-Bargh, Rochelle Choenni:
On the Usability of Big (Social) Data. 1167-1174 - Giorgos Stamatelatos, Sotirios Gyftopoulos, George Drosatos, Pavlos S. Efraimidis:
Deriving the Political Affinity of Twitter Users from Their Followers. 1175-1182 - Ericsson Marin, Mohammed Almukaynizi, Eric Nunes, Jana Shakarian, Paulo Shakarian:
Predicting Hacker Adoption on Darkweb Forums Using Sequential Rule Mining. 1183-1190 - Mathilde Hogsnes, Kjeld Hansen:
Negotiating Consumerism and Feminism on Instagram. 1191-1192
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.