default search action
19th PDCAT 2018: Jeju Island, South Korea
- Jong Hyuk Park, Hong Shen, Yunsick Sung, Hui Tian:
Parallel and Distributed Computing, Applications and Technologies, 19th International Conference, PDCAT 2018, Jeju Island, South Korea, August 20-22, 2018, Revised Selected Papers. Communications in Computer and Information Science 931, Springer 2019, ISBN 978-981-13-5906-4
Networking and Architectures
- Xiaochun Wang, Yidong Li, Yi Jin, Wei Wang:
Spectrum-Centric Differential Privacy for Hypergraph Spectral Clustering. 3-14 - Zhansheng Chen, Hong Shen, Xiaofan Zhao, Tingmei Wang:
Efficient Scheduling Strategy for Data Collection in Delay-Tolerant Wireless Sensor Networks with a Mobile Sink. 15-27 - Huaiwen He, Hong Shen:
Green vs Revenue: Data Center Profit Maximization Under Green Degree Constraints. 28-40 - Lei Liu, Mingzheng Li, Lei Mei, Ye Tian:
Design and Implementation of a Novel SDN-Based Architecture for Wi-Fi Networks. 41-49 - Jiyoung Lim, Sanghyun Lim:
Location Based One-Time Conference Protocol Without Personal Information. 50-55 - Chenxi Luo, Zhu Wang, Tiejian Luo:
Evaluation for Two Bloom Filters' Configuration. 56-62 - Jiajia Jiao, Dezhi Han:
A Fast Global AVF Calculation Methodology for Multi-core Reliability Assessment. 63-72 - Tinglei Zhao, Jianzhong Qiao, Shukuan Lin, Yanhua Wang:
Adaptive Control and Optimization on Dynamic Load Balancing Model. 73-83 - Kyung-Soo Lim, Seoung-Hyeon Lee, Jong Wook Han, Geon Woo Kim:
Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing. 84-89 - Xizi Wang, Li Wang:
Investment Intention Towards Online Peer-to-Peer Platform: A Data Mining Approach Based on Perceived Value Theory. 90-99 - Enes Bajrovic, Siegfried Benkner, Jirí Dokulil:
Pipeline Patterns on Top of Task-Based Runtimes. 100-110 - Yue Lu, Hui Tian, Jiajia Yin:
A Real-Time Routing Protocol in Wireless Sensor-Actuator Network. 111-120 - Yue Lu, Hui Tian, Hong Shen, Dongdong Xu:
Privacy Preserving Classification Based on Perturbation for Network Traffic. 121-132 - Farzin Piltan, Jong-Myon Kim:
Fault Diagnosis of a Wireless Sensor Network Using a Hybrid Method. 133-142 - Seung-Mo Je, Jun-Ho Huh:
An Optimization Theory of Home Occupants' Access Data for Determining Smart Grid Service. 143-152 - Changmin Jeong, Mirim Ahn, Haengho Lee, Younggiu Jung:
Automatic Classification of Transformed Protocols Using Deep Learning. 153-158 - Jaeheon Kwak, Jinkyu Lee:
Covert Timing Channel Design for Uniprocessor Real-Time Systems. 159-168
Algorithms and Applications
- Hethini Ribeiro, Roberta Spolon Ulson, Aleardo Manacero Jr., Renata Spolon Lobato:
Parallelization of the DIANA Algorithm in OpenMP. 171-176 - YiAn Zuo, ZhiXun Zheng, De Li:
Flash Animation Watermarking Algorithm Based on SWF Tag Attributes. 177-187 - Asma Hassani, Sonia Ayachi Ghannouchi:
Analysis of Massive E-learning Processes: An Approach Based on Big Association Rules Mining. 188-199 - Seunghyun Lee, Minseop Kim, Inwhee Joe:
SGNet: Design of Optimized DCNN for Real-Time Face Detection. 200-209 - Cong Thuan Do, Min Goo Moon, Jong-Myon Kim, Cheol Hong Kim:
A Study on L1 Data Cache Bypassing Methods for High-Performance GPUs. 210-219 - Hong Jun Choi, Dong Oh Son, Cheol Hong Kim:
Memory Contention Aware Power Management for High Performance GPUs. 220-229 - Gwang Bok Kim, Jong-Myon Kim, Cheol Hong Kim:
Dynamic Selective Warp Scheduling for GPUs Using L1 Data Cache Locality Information. 230-239 - Songyuan Li, Hong Shen, Yingpeng Sang:
An Efficient Model and Algorithm for Privacy-Preserving Trajectory Data Publishing. 240-249 - Xizi Wang, Li Wang:
What Makes Charitable Crowdfunding Projects Successful: A Research Based on Data Mining and Social Capital Theory. 250-260 - Cristina Georgiana Calancea, Lenuta Alboaie, Andrei Panu:
A SwarmESB Based Architecture for an European Healthcare Insurance System in Compliance with GDPR. 261-267 - Jeong Seok Oh:
A Study on Deriving and Simulating Pre-risk on Complex Gas Facilities for Preventing Accidents. 268-273 - Intissar Khalifa, Ridha Ejbali, Mourad Zaied:
Body Gesture Modeling for Psychology Analysis in Job Interview Based on Deep Spatio-Temporal Approach. 274-284 - Yatu Ji, Hongxu Hou, Ying Lei, Zhong Ren:
An Optimized Regularization Method to Enhance Low-Resource MT. 285-295 - Ugiwyeon Lee, Jeong Seok Oh:
A Development of Architecture for Risk Area Prediction System. 296-303 - Chungin Lee, Doyeon Kim, Sujeong Kim, Yunsick Sung:
Design of SNS-Based English Word Learning System for Daily Study. 304-312 - Eunhee Park, Namgwang Ryu, Jisun Lee, Yunsick Sung:
Study of Real Toy Tank-Based Mixed Reality Contents. 313-321 - Nhan Tran Van, Hoanh-Su Le:
Smart Grid an Advanced Method for Saving Energy in Vietnam. 322-328 - Jeonghoon Kwak, Sang-Geol Lee, Yunsick Sung:
Autonomous Flight Control Method of Drones for Enforcement of Traffic Law Violation. 329-334 - Yechan Yu, HoJin Kim, Jinjoo Ha, Daewoo Kim, Kang Yi:
Cost-Performance Comparison of Various Accelerator Implementation Platforms for Deep Convolutional Neural Network. 335-344 - Jungseok Cho, Jeongdoo Lee, Doosan Cho:
A Prediction Method of Solar Power Generator using Machine Learning Techniques. 345-352 - Ga-Yeon Kim, Jeong-Yong Byun:
A Glyph Reduction Evaluation of Combined Jeongeum-Fonts. 353-358
Software Systems and Technologies
- Mouna Jouini, Latifa Ben Arfa Rabai, Ridha Khédri:
Software Requirements for an Ultra Large Scale System to Compute Multi Dimension Mean Failure Cost. 361-370 - Yeong-Seok Seo, Hyun-Soo Jang:
A Study of an Automated Software Effort Measurement Method. 371-380 - Taoufik Sakka Rouis, Mohamed Tahar Bhiri, Mourad Kmimech, Layth Sliman:
A Generic Approach for the Verification of Static and Dynamic Behavioral Properties of SCDL/WS-BPEL Service-Component Architectures. 381-389 - Nesrine Missaoui, Sonia Ayachi Ghannouchi:
Pattern-Based Approaches for Business Process Improvement: A Literature Review. 390-400
Security and Privacy
- Shan Yang, Liang Chen, De Li:
Research on Image Content Authentication Algorithm of Semi-fragile Watermarking for Adaptive Embedding Based on Characteristic of Image. 403-413 - Gimin Bae, Sunggyun Jang, Minseop Kim, Inwhee Joe:
Autoencoder-Based on Anomaly Detection with Intrusion Scoring for Smart Factory Environments. 414-423 - Ioana Stanescu, Lenuta Alboaie, Andrei Panu:
Blockchain and Smart-Contracts Modeled in a SwarmESB Ecosystem. 424-432 - Jehn-Ruey Jiang, Hanas Subakti, Ching-Chih Chen, Kazuya Sakai:
PINUS: Indoor Weighted Centroid Localization with Crowdsourced Calibration. 433-443 - Seongkyu Kim, Hyun-Taek Kwon, Young-Kun Kim, Yong-Pil Park, Dae-Won Keum, Ung-Mo Kim:
A Study on Application Method for Automation Solution Using Blockchain dApp Platform. 444-458 - Manish Singh, Yichen Han:
Towards a Two Factor Authentication Method Using Zero-Knowledge Protocol in Online Banking Services. 459-472 - Jinyeong Kang, Inwhee Joe:
Security Vulnerability Analysis of Wi-Fi Connection Hijacking on the Linux-Based Robot Operating System for Drone Systems. 473-482
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.