default search action
ICA3PP 2015: Zhangjiajie, China
- Guojun Wang, Albert Y. Zomaya, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings. Lecture Notes in Computer Science 9532, Springer 2015, ISBN 978-3-319-27160-6
The 6th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2015)
- Meili Cao, Haizhen He, Rongming Luo, Lei Wen:
Nth-Order Multifunction Filter Employing Current Differencing Transconductance Amplifiers. 3-12 - Zheng Ma, Jin Zheng, Weijia Jia, Guojun Wang:
An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor Network. 13-23 - Yuling Liu, Zuhong Liu:
An Improved Method for Reversible Data Hiding in Encrypted Image. 24-34 - Hongyun Xu, Jun Yang, Yong Zhang, Mengzhen Xu, Jiayi Gan:
Study on Personalized Location Privacy Preservation Algorithms Based on Road Networks. 35-45 - Peixin Chen, Xiaofeng Wang, Jinshu Su:
A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups. 46-56 - Ryan K. L. Ko, Giovanni Russello, Richard Nelson, Shaoning Pang, Aloysius Cheang, Gillian Dobbie, Abdolhossein Sarrafzadeh, Sivadon Chaisiri, Muhammad Rizwan Asghar, Geoffrey Holmes:
STRATUS: Towards Returning Data Control to Cloud Users. 57-70 - Yu Zhang, Yanbing Liu, Jing Yu, Ping Liu, Li Guo:
VSEP: A Distributed Algorithm for Graph Edge Partitioning. 71-84 - Qun Liao, Shuangshuang Jiang, Qiaoxiang Hei, Tao Li, Yulu Yang:
Scheduling Stochastic Tasks with Precedence Constrain on Cluster Systems with Heterogenous Communication Architecture. 85-99 - Weixiang Zhang, Bo Wei, Huisen Du:
An Output-Oriented Approach of Test Data Generation Based on Genetic Algorithm. 100-108
The 5th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-15)
- Chengcheng Xu, Shuhui Chen, Xiaofeng Wang, Jinshu Su:
An Efficient Pre-filter to Accelerate Regular Expression Matching. 111-119 - Li-e Wang, Xianxian Li:
A Hybrid Optimization Approach for Anonymizing Transactional Data. 120-132 - Mingwu Zhang, Biwen Chen, Hua Shen:
Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption. 133-142 - Jinkun Geng, Daren Ye, Ping Luo:
Predicting Severity of Software Vulnerability Based on Grey System Theory. 143-152 - Huikang Hao, Zhoujun Li, Yueying He, Jinxin Ma:
Characterization of Android Applications with Root Exploit by Using Static Feature Analysis. 153-165 - Yufeng Wang, Xiaohong Chen, Qun Jin, Jianhua Ma:
LIP3: A Lightweighted Fine-Grained Privacy-Preserving Profile Matching Mechanism for Mobile Social Networks in Proximity. 166-176 - Luyan Nie, Chuanzhi Xie, Yujun Yin, Xin Li:
Context-Aware QoS Assurance for Smart Grid Big Data Processing with Elastic Cloud Resource Reconfiguration. 177-186 - Enrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli:
Continuous User Identity Verification for Trusted Operators in Control Rooms. 187-200 - Leyou Zhang, Zhuanning Wang, Qing Wu:
Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model. 201-210 - Qingxin Xia, Yuqing Lan, Limin Xiao:
Scheduling Resource of IaaS Clouds for Energy Saving Based on Predicting the Overloading Status of Physical Machines. 211-221 - Jean Fortin, Frédéric Gava:
Towards Mechanised Semantics of HPC: The BSP with Subgroup Synchronisation Case. 222-237 - Huiming Yu, Kenneth Williams, Xiaohong Yuan:
Cloud Computing Threats and Provider Security Assessment. 238-250 - Marcin Gorawski, Zacheusz Siedlecki, Anna Gorawska:
Collaborative Multiparty Association Rules Mining with Threshold Homomorphic Encryption. 251-263 - Wenjuan Tang, Yang Xu, Guojun Wang, Yaoxue Zhang:
An Illegal Indirect Access Prevention Method in Transparent Computing System. 264-275 - Hongling Xiao, Hong Song, Weiping Wang:
EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks. 276-289
The 3rd International Workshop on Network Optimization and Performance Evaluation (NOPE 2015)
- Xiaojie Zhang, Nao Wang, Xin Zheng, Gaocai Wang, Dongmei Bin:
Energy Saving Mechanism Analysis Based on Dynamic Resource Scaling for Cloud Computing. 293-301 - Xiaolong Gong, Gaocai Wang, Nao Wang:
An Optimal Rate Adaptive Video Streaming Scheme to Improve QoE of Dash. 302-310 - Dongmei Bin, Ying Peng, Gaocai Wang:
Community-Based Energy-Aware Routing Protocol in Mobile Social Networks. 311-321 - Ming Liu, Xiaoling Yang, Fanling Huang, Yanming Fu:
Research of CMABC Algorithm in Intrusion Detection. 322-332 - Zheng Xu, Buyang Cao:
A Parallel Tabu Search Algorithm with Solution Space Partition for Cohesive Clustering Problems. 333-343 - Guiyun Liu, Jing Yao, Hongbin Chen, Han Zhang, Dong Tang:
Symmetric Game for Distributed Estimation in Energy Harvesting Wireless Sensor Networks with Selfish Sensors. 344-352 - Limin Xiao, Qiaoling Zhong, Zhisheng Huo, Ang Li, Li Ruan, Kelong Liu, Yuanyuan Zang, Zheqi Lu:
File Creation Optimization for Metadata-Intensive Application in File Systems. 353-363 - Shicong Ma, Baosheng Wang, Xianming Gao, Xiaozhe Zhang:
A Sharing-Memory Based Ring Framework. 364-369 - Binji Mo, Yang Xu, Guojun Wang:
Streaming Computing Technology for Android Applications: Design Model and Case Study. 370-381 - Lifang Liu, Xiaogang Qi, Gengzhong Zheng, Mande Xie:
An Energy-Efficient Aggregation and Collection Algorithm for Heterogeneous Wireless Sensor Network. 382-392 - Ronghua Shi, Kun Tang, Jian Dong, Wentai Lei, Chunhua Peng, Yunxiang Jiang:
TDD-Based Massive MIMO Systems: Overview and Development. 393-402
The 2nd International Symposium on Sensor-Cloud Systems (SCS 2015)
- Zeyu Sun, Weiguo Wu, Xiaofei Xing, Chuanfeng Li, Yalin Nie, Yangjie Cao:
A Hierarchical Shared Key Algorithm in Wireless Sensor Networks. 405-412 - Yangjie Cao, Huimin Lu, Xiaodong Shi, Pengsong Duan:
Evaluation Model of the Cloud Systems Based on Queuing Petri Net. 413-423 - Liu Yang:
MTCPP: Multi-targets K-Coverage Preservation Protocol in Wireless Sensor Networks. 424-432
The 2nd Workshop on Security and Privacy Protection in Computer and Network Systems (SPPCN 2015)
- Chun-Ta Li, Cheng-Chi Lee, Chun-Cheng Wang, Tzu-Hui Yang, Song-Jhih Chen:
Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments. 435-444 - Rajeswary Ravi, Greeshma N. Gopal:
Privacy Preserving Personalization in Probabilistic Search. 445-453 - Yang Yu, Qi Dong, Zhipeng Luo, Hao Chen, Jun Deng, Wei Guan:
A Security-Critical Task Management Method for Distributed Real-Time Systems. 454-464 - Chengye Li, Yangyue Xiang, Jiangyong Shi:
A Model of Dynamic Malware Analysis Based on VMI. 465-475 - Roshni Kadeparambil Raphel, Muhammed Ilyas H., Janu R. Panicker:
Multiple Secret Sharing Using Natural Language Letter Based Visual Cryptography Scheme. 476-486 - Qun Li, Lei Zhang, Shifeng Hou, Zhenxiang Chen, Hongbo Han:
Reconstruction of Android Applications' Network Behavior Based on Application Layer Traffic. 487-496 - Shanshan Wang, Shifeng Hou, Lei Zhang, Zhenxiang Chen, Hongbo Han:
Android Malware Network Behavior Analysis at HTTP Protocol Packet Level. 497-507 - Deepa S. Nair, Muhammed Ilyas H.:
Energy Efficient Encryption Scheme for Network-Coded Mobile Ad Hoc Networks. 508-517
The 1st International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2015)
- Changji Wang, Jing Liu:
Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks. 521-530 - Zhen Peng, Tian Wang, Md. Zakirul Alam Bhuiyan, Xiaoqiang Wu, Guojun Wang:
Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks. 531-540 - Dacheng Wang, Hong Song, Yun Xu, Wenhao Zhang, Jianxin Wang:
A Web-Based Resource Management Platform for Transparent Computing. 541-550 - Xia Wei, Wen-Xiang Li, Cong Ran, Chunchun Pi, Ya-Jie Ma, Yuxia Sheng:
Architecture and Scheduling Method of Cloud Video Surveillance System Based on IoT. 551-560 - Wei Shi, Gaofeng Lv, Zhigang Sun, Zhenghu Gong:
HiTrans: An FPGA-Based Gateway Design and Implementation in HPC Environments. 561-571 - Christian Esposito, Aniello Castiglione, Francesco Palmieri:
Dealing with Reliable Event-Based Communications by Means of Layered Multicast. 572-581 - Jin B. Hong, Chun-Jen Chung, Dijiang Huang, Dong Seong Kim:
Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. 582-592 - Peixin Chen, Xiaofeng Wang, Baokang Zhao, Jinshu Su, Ilsun You:
Removing Key Escrow from the LW-HIBE Scheme. 593-605 - Hui Li, Nengjun Qiu, Mei Chen, Hongyuan Li, Zhenyu Dai, Ming Zhu, Menglin Huang:
FASTDB: An Array Database System for Efficient Storing and Analyzing Massive Scientific Data. 606-616 - Sheng Xu, Binzhang Fu, Mingyu Chen, Lixin Zhang:
An Effective Correlation-Aware VM Placement Scheme for SLA Violation Reduction in Data Centers. 617-626 - Jemal H. Abawajy, Mohammad Mehedi Hassan:
Reliability-Aware Distributed Computing Scheduling Policy. 627-632 - Peixin Chen, Xiaofeng Wang, Jinshu Su:
An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage. 633-647 - Adil Amjad Sheikh, Ahmed Lbath, Ehsan Ullah Warriach, Emad A. Felemban:
A Predictive Data Reliability Method for Wireless Sensor Network Applications. 648-658 - Liu Chen, Wei Zhou:
A Cycle-Time-Analysis Model for Byzantine Fault Tolerance. 659-668 - Adrian Johannes, Priyadarsi Nanda, Xiangjian He:
Resource Utilization Based Dynamic Pricing Approach on Cloud Computing Application. 669-677 - Wei Zhou, Yang Xu, Lijuan Yang, Guojun Wang:
Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications. 678-690 - Haihe Ba, Huaizhe Zhou, Zhiying Wang, Jiangchun Ren, Tie Hong, Yiming Li:
Application-Assisted Dynamic Attestation for JVM-Based Cloud. 691-700 - Fang Qi, Xin Tang, Quanyun Wei:
New Escrow-Free Scheme for Hierarchical Identity-Based Encryption. 701-713 - Marcin Gorawski, Miroslaw Skrzewski, Michal Gorawski, Anna Gorawska:
Neural Networks in Petrol Station Objects Calibration. 714-723 - Silvia Grampone, Witold Litwin, Thomas J. E. Schwarz:
A Dependable, Scalable, Distributed, Virtual Data Structure. 724-735 - Zhen Wang, Jianhui Jiang:
Effect of Bias Temperature Instability on Soft Error Rate. 736-745 - Taehoon Eom, Jin B. Hong, Jong Sou Park, Dong Seong Kim:
Security Modeling and Analysis of a SDN Based Web Service. 746-756 - Anjana P. Das, Sabu M. Thampi:
Single Anchor Node Based Localization in Mobile Underwater Wireless Sensor Networks. 757-770 - Tao Lin, Jianhua Gao, Xue Fu, Yan Lin:
A Novel Bug Report Extraction Approach. 771-780 - Xin Zhou, Hui Li, Xiao Zhang, Shan Wang, Yanyu Ma, Ke-yan Liu, Ming Zhu, Menglin Huang:
ABR-Tree: An Efficient Distributed Multidimensional Indexing Approach for Massive Data. 781-790 - Zhihai Wang, Weidong Chen:
A Simple Local Search Algorithm for Minimizing Interference in Wireless Sensor Networks. 791-799 - Fengli Zhang, Junjiao Zhang, Hongchuan Zhou:
Unknown Bit Stream Protocol Message Discovery with Zero Knowledge. 800-809 - Yanzhu Liu, Zhi Li, Yuxia Sun:
Distributed Authentication in the Cloud Computing Environment. 810-818 - Mahnaz Malekzadeh, Iain Bate:
Influential Nuisance Factors on a Decision of Sufficient Testing. 819-828 - Jun Xu, Yong Tang:
Research of Improved Particle Swarm Optimization Based on Genetic Algorithm for Hadoop Task Scheduling Problem. 829-834 - Yang Liu, Liang Deng:
Acceleration of CFD Engineering Software on GPU and MIC. 835-848
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.