default search action
10th CBD 2022: Guilin, China
- Tenth International Conference on Advanced Cloud and Big Data, CBD 2022, Guilin, China, November 4-5, 2022. IEEE 2022, ISBN 979-8-3503-0971-3
- Lin Shen, Mengyang Liu, Caishan Weng, Jinghui Zhang, Fang Dong, Fa Zheng:
ColorByte: A real time MOT method using fast appearance feature based on ByteTrack. 1-6 - Jingtao Xue, Chunyu Wu, Bin Zhao, Ying Hu:
Collective Spatial Keyword Query on Time Dependent Road Networks. 7-12 - Jining Chen, Weitu Chong, Siyu Yu, Zhun Xu, Chaohong Tan, Ningjiang Chen:
TCN-based Lightweight Log Anomaly Detection in Cloud-edge Collaborative Environment. 13-18 - Jingwu Wang, Weijun Wang, Haipeng Dai, Lanlan Li, Guihai Chen:
PEACE: Towards Optimizing Monitoring Utility of Unmanned Aerial Vehicles with Adverse Effect Constraints. 13-18 - Xiaomin Liu, Xiaolan Xie, Qiang Guo:
Research on Cloud Computing load forecasting based on LSTM-ARIMA combined model. 19-23 - Jiaren Yu, Shan Huang, Guoyuan Yuan, Dezun Dong:
Reservoir: Enhance the Burst-flow Tolerance in Datacenter Networks. 24-29 - Yazeed AlZahrani, Jun Shen, Jun Yan:
Multi-Layer Efficient Data Classification Methods for Enterprise Business Applications. 30-35 - Lijuan Shen, Yingchi Mao, Zibo Wang, Hua Nie, Jianxin Huang:
DNN Training Optimization with Pipelined Parallel Based on Feature Maps Encoding. 36-41 - Jiaang Bao, Chao Yang, Nu Xia, Dian Shen:
Long-Term Workload Forecasting in Grid Cloud using Deep Ensemble Model. 42-47 - Ying Yuan, Yichen Yang, Cong Wang:
Virtual Network Embedding with Virtual Nodes Ranking and Multi Points Sampling. 48-53 - Qiliang Zhu, Yaoqin Zhu, Jin Sun, Zebin Wu:
A Spark-Based Parallel Implementation of Compressed Hyperspectral Image Reconstruction and Anomaly Detection. 54-59 - Zhe Chen, Hangyu Shao, Yuping Li, Hongru Lu, Jiahui Jin:
Policy-Based Access Control System for Delta Lake. 60-65 - Changjiang Cui, Yifei Lu, Shuren Li, Jingqi Li, Zeqi Ruan:
DASH+: Download Multiple Video Segments with Stream Multiplexing of QUIC. 66-72 - Ruoxi Sun, Jun Yan, Fenghui Ren:
A Knowledge Graph-based Interactive Recommender System Using Reinforcement Learning. 73-78 - Zhen Wu, Jingya Zhou, Jie Wang, Xigang Sun:
Wb-MSF: A Large-scale Multi-source Information Diffusion Dataset for Social Information Diffusion Prediction. 79-84 - Xiao Zheng, Qiuyue Zhang, Xuan Tang, Xiujun Wang, Chunlai Du:
Efficient Online and Privacy-preserving Medical Pre-diagnosis Based on Growing Learning Vector Quantization. 85-90 - Chengyu Du, Xiaoxuan Gou, Yuxiang Wang, Xiaoliang Xu:
Efficient and Effective Expert Finding based on Community Search: A Demonstration. 91-97 - Jingyu Yang, Liang Zhao, Jianwu Dang, Yangping Wang, Biao Yue, Zongliang Gu:
A Semantic Segmentation Method for High-resolution Remote Sensing Images Based on Encoder-Decoder. 98-103 - Xiang Li, Zhuoming Xu, Qi Xu, Yan Tang:
Unsupervised Semantic Segmentation with Feature Enhancement for Few-shot Image Classification. 104-109 - Hailan Wang, Xiaolan Xie, Jili Chen, Yarong Liu:
Weighted Fuzzy Clustering Algorithm Based on Max-Min Distance Criterion and Jeffrey Divergence. 110-115 - Xiaoqian Zeng, Qin Qin, Chao Tan, Genlin Ji:
Label Enhancement with Sample Correlation via Sparse Representation. 116-121 - Zhe Zhang, Yuhao Chen, Huixue Wang, Yunzhe Wang, Qiming Fu, You Lu:
A Multivariate Time Series Anomaly Detection Model Based on Graph Attention Mechanism in Energy Consumption of Intelligent Buildings. 122-127 - Yuqun Wu, Yongzhong Li, Bo Xu:
A Personalized Scenic Spot Recommendation Algorithm Based on Improved TrustSVD Model. 128-132 - Xiaofang Mu, Zhenyu Liu, Jiaji Liu, Hao Li, Yue Li, Yikun Li:
DC3D: A Video Action Recognition Network Based on Dense Connection. 133-138 - Zhuo Zhang, Haifu Guo, Sheng Ren, Kehua Guo:
Learning Inter-Frame Information for Space-Time Video Super-Resolution. 139-144 - Hui Lv, Fenfang Li, Yatao Liang, La Duo, Jun Shen, Yan Li, Qingguo Zhou:
Text classification based on machine learning for Tibetan social network. 145-150 - Rui Zhu, Xiaoqing Wu, Yanna Hu, Yize Chen, Bo Liu:
OEIS: Knowledge Graph based Intelligent Search System in Ocean Engineering. 151-156 - Dongbo Li, Xiangyu Liu, Yuxuan Shao, Yuchen Sun, Siyao Cheng, Jie Liu:
Autoencoder-based OFDM for Agricultural Image Transmission. 157-162 - Peng Yuan, Qiuxia Chen, Zhifeng Wang, Jinfeng Yang:
Personalized tourism recommendation algorithm integrating tag and emotional polarity analysis. 163-168 - Peiying Wu, Xiaohui Li, Junfeng Wang:
A Customized Protocol Cluster Analysis Method based on Reinforcement Learning. 169-177 - Tian Tian, Jianchao Jia, Ran Jia, Shenggang Yan:
A Batching Method For Complex Emitters Based On Frequency Agility Pattern Mining. 178-183 - Qian Huang, Jie Ma, Zhou Xu, Xiaodan Gu, Ming Yang:
A Staging Prediction Model for COVID-19 Pandemic Under Strong Public Health Interventions. 184-189 - Ming Li, Xingwang Han, Hua Sheng, Lin Ma, Hanzhang Kong, Weite Liu, Bo Mao:
A Novel RNN Model with Enhanced Behavior Semantic for Network User Profile. 190-193 - Zhigeng Han, Yuanzhe Fan, Geng Chen, Ting Zhou:
TeCNTS: A Robust Collaborative Filtering Recommendation Scheme Based on Time-effective Close Neighbor Trusted Selection Strategy. 194-199 - Weiwei Wang, Liting Wei, Yun Li, Yi Zhu, Bin Li, Lejun Zhang:
Attentional Meta-path Contrastive Graph Convolutional Networks for Knowledge Concept Recommendation. 200-205 - Shang WanXin, Tao Wu, Yang Fei, Xi Chen, Jingjue Chen, Zhenxia Yu:
CUDA Acceleration of Worst-Case Execution Time Analysis Based On Model Checking. 206-211 - Yihang Song, Li Lu, Jiqing Gu, Chong Zhang:
Realizing Power-efficient Encryption Communication for Computational RFID Tags. 212-218 - Yaqiong Guo, Peng Zhou, Xin Lu, Wangshu Sun, Jiasai Sun:
A Fuzzy Multi-Identity Based Signature. 219-223 - Yansheng Qu, Hua Huang, Lin Chen, Lina Zhao, Yuxiang Zhao, Jie Zhang, Bo Mao:
Semantic Integration based User Behavior Monitoring Framework in Zero Trust Network. 224-227 - Penghui Su, Yan Gao, Ming Chen:
A Novel Firewalls ConFigure Fault and Its Repair Method. 228-233 - Tamara Abdulmunim Abduljabbar, Xiaohui Tao, Ji Zhang, Jianming Yong, Xujuan Zhou:
Decentralized Blockchain Network. 234-239 - Danish Khan, Xujuan Zhou, Jianming Yong:
The Threat of Distributed Denial-of-Service Attack for User Equipment in 5G Networks. 240-245 - Zhe Li, Xiao Jing, Shanshan Cao, Tianfan Zhang, Zhiang Wu:
Detecting Key Offenders from Crime Incidents via Attributed Heterogeneous Network Learning. 246-251 - Shuang Qiao, Chenhong Cao, Haoquan Zhou, Wei Gong:
Space-efficient logging for Supply Chain Traceability based on blockchain. 252-257 - Yaogang Ge, Xiaomeng Shen, Bingfeng Xu, Gaofeng He:
A Hybrid Attack Graph Analysis Method based on Model Checking. 258-263 - Guanjun Zhao, Lizhong Jia, Jie Xu, Chang Liu, Weijun Hu, Chunpei Li:
Scheme of Peer-to-Peer Trade in Multi-Microgrid Based on Blockchain. 264-269 - Junjie Zhao, Bingfeng Xu, Xinkai Chen, Bo Wang, Gaofeng He:
Analysis Method of Security Critical Components of Industrial Cyber Physical System based on SysML. 270-275 - Jing Wen, Chaohong Tan, Jining Chen, Qin Zhao, Sen Li, Fei Zhou:
The Application of RNN-based API Data Security Detection in Government Cloud Service. 276-281 - Zehua Nie, Can Su, Yichen Mao, Kaigui Bian:
IoTPass: IoT Data Management System for Processing Time-series Data. 288-293 - Ziwen Sheng, Yingchi Mao, Jiajun Wang, Hua Nie, Jianxin Huang:
Request-Aware Task Offloading in Mobile Edge Computing via Deep Reinforcement Learning. 294-299 - Chenyu Lu, Zhaowu Huang, Caishan Weng, Feng Jiao, Xiaolin Guo, Fang Dong:
A Kubernetes-Oriented Edge Network Orchestrator for Heterogeneous Environment. 300-305 - Jianwei Liu, Guozheng Yang, Cheng Zang, Jiajun Chen, Xianming Hu, Jingzhi Zhang, Yinghui He, Jinsong Han, Kui Ren:
Device-free Crowd Density Estimation with Off-the-shelf WiFi Traffic. 306-311 - Yuhao Chen, Yunzhe Wang, Zhe Zhang, Qiming Fu, Huixue Wang, You Lu:
Deep Reinforcement Learning for Task Scheduling in Intelligent Building Edge Network. 312-317 - Naixuan Guo, Zhaofeng Chen, Heyang Xu, Zhechun Zhao, Yu Liu, Sen Xu:
WMLink: Wearable Smart Devices and Mobile Phones Linking through Passive Sniffing BLE and WiFi Signals. 318-323
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.