default search action
39th IPCCC 2020: Austin, TX, USA
- 39th IEEE International Performance Computing and Communications Conference, IPCCC 2020, Austin, TX, USA, November 6-8, 2020. IEEE 2020, ISBN 978-1-7281-9829-3
- Yiding Wang, Zhenyi Wang, Chenghao Li, Yilin Zhang, Haizhou Wang:
A Multimodal Feature Fusion-Based Method for Individual Depression Detection on Sina Weibo. 1-8 - Chengtao Xu, Kai Zhang, Houbing Song:
UAV Swarm Communication Aware Formation Control via Deep Q Network. 1-2 - Jiawei Wan, Shijie Jia, Limin Liu, Yang Zhang:
Supporting Efficient Dynamic Update in Public Integrity Verification of Cloud Data. 1-12 - Fan zhang, Jizhou Wu, Yingli Nie, Lihua Jiang, Ailian Zhou, Nengfu Xie:
Research of Knowledge Graph Technology and its Applications in Agricultural Information Consultation Field. 1-4 - Muhammad Mudussir Ayub, Franz Kreupl:
A Modular and Distributed Setup for Power and Performance Analysis of Multi-Processor System-on-Chip at Electronic System Level. 1-8 - Dongxiao Yu, Xinpeng Duan, Feng Li, Yi Liang, Huan Yang, Jiguo Yu:
Distributed Scheduling Algorithm for Optimizing Age of Information in Wireless Networks. 1-8 - Xianhua Liu, Chun Yang, Zixin Guan:
Efficient arithmetic expression optimization with weighted adjoint matrix. 1-8 - Lixin Wang, Jianhua Yang, Mary McCormick, Peng-Jun Wan, XiaoHua Xu:
Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering. 1-8 - Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu:
What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense. 1-8 - Yaobin Qin, David J. Lilja:
AdaEmb-Encoder: Adaptive Embedding Spatial Encoder-Based Deduplication for Backing Up Classifier Training Data. 1-8 - Pinhao Wang, Wenzhong Li, Zepeng Yu, Baoguo Lu, Sanglu Lu:
Website Recommendation with Side Information Aided Variational Autoencoder. 1-6 - Lijun Sun, Xiaojie Yu, Shicong Chen, Yang Yan:
A Dynamic Task Assignment Framework based on Prediction and Adaptive Batching. 1-8 - Joshua Eason, Chengtao Xu, Houbing Song:
Software Define Radio in Realizing the Intruding UAS Group Behavior Prediction. 1-5 - Yue Sun, Deqiang Xu, Zhuoming Huang, Honggang Zhang, Xiaohui Liang:
LIDAUS: Localization of IoT Device via Anchor UAV SLAM. 1-11 - Abdoulaye Diop, Nahid Emad, Thierry Winter:
A Unite and Conquer Based Ensemble learning Method for User Behavior Modeling. 1-8 - Yuhan Zhao, Wei Zhang, Meihong Yang, Huiling Shi:
Network Resource Scheduling For Cloud/Edge Data Centers. 1-4 - Junte Ma, Sihao Xie, Jin Zhao:
P4SFC: Service Function Chain Offloading with Programmable Switches. 1-6 - Mahsa Bayati, Harsh Roogi, Ron Lee, Ningfang Mi:
Deploying Network Key-Value SSDs to Disaggregate Resources in Big Data Processing Frameworks. 1-8 - Qingyu Xiao, Jin Ye, Chengjie Pang, Liangdi Ma, Wenchao Jiang:
Adaptive Video Streaming via Deep Reinforcement Learning from User Trajectory Preferences. 1-8 - Zenan Wang, Jiao Zhang, Haoran Wei, Tao Huang:
Hieff: Enabling Efficient VNF Clusters by Coordinating VNF Scaling and Flow Scheduling. 1-8 - Siyu Chen, Yu Zhu, Xiaoguang Niu, Zhiyong Hu:
Improved Window Segmentation for Deep Learning Based Inertial Odometry. 1-7 - Ilja Behnke, Lukas Pirl, Lauritz Thamsen, Robert Danicki, Andreas Polze, Odej Kao:
Interrupting Real-Time IoT Tasks: How Bad Can It Be to Connect Your Critical Embedded System to the Internet? 1-6 - Guoqiang Zhang, Mingwei Xu, Jiang Li:
NRV: Leveraging Secure Multi-Party Computation for Lightweight BGP Security Enhancement. 1-6 - Guéréguin Der Sylvestre Sidibé, Raphaël Bidaud, Marie-Françoise Servajean, Nadir Hakem, Michel Misson:
Evaluation of the interest of an extra-slot for a grouped polling-selecting method. 1-8 - Jiawei Sun, Yuan Zhou, Shupeng Wang, Lei Zhang, Junjiao Liu, Junteng Hou, Zhicheng Liu:
FProbe: Detecting Stealthy DGA-based Botnets by Group Activities Analysis. 1-8 - J. J. Garcia-Luna-Aceves, Abdulazaz Ali Albalawi:
A Connection-Free Reliable Transport Protocol. 1-6 - Xiaobo Cai, Ke Han, Yan Li, Xuefei Li, Jiajin Zhang, Yue Zhang:
A sensor attack detection method based on fusion interval and historical measurement in CPS. 1-4 - Boyu Sun, Wenyuan Yang, Mengqi Yan, Dehao Wu, Yuesheng Zhu, Zhiqiang Bai:
An Encrypted Traffic Classification Method Combining Graph Convolutional Network and Autoencoder. 1-8 - Guangjun Shi, Liang Liu, Fu Chen:
The Practical Application of IoT for Large-scale Instruments and Equipment Sharing Management Platform. 1-5 - Alexander Xiong, Michael Nguyen, Andrew So, Tingting Chen:
Privacy Preserving Inference with Convolutional Neural Network Ensemble. 1-6 - Chengdong Wang, Jun Fang, Zhuofeng Zhao, Bo Zhao:
Research on Power Quality Data Placement Strategy Based on Improved Particle Swarm Optimization Algorithm. 1-5 - Ricardo Lent:
Experiments with Non-Cooperative Space DTN Routing. 1-6 - Xian Zhou, Daru Pan, Hui Song, Xu Huang:
Socially-Aware D2D Pair Strategy: A Stable Matching Approach. 1-4 - Xiaotao Li, Shujuan You, Wai Chen:
Automatic Recognition of Identification Schemes for IoT Identifiers via Sequence-to-Sequence Model. 1-6 - Wenyi Tang, Xinrui Xu, Guangchun Luo, Zaobo He, Kaiming Zhan:
Budgeted Persuasion on User Opinions via Varying Susceptibility. 1-8 - Ping Liu, Shenglin Zhang, Yongqian Sun, Yuan Meng, Jiahai Yang, Dan Pei:
FluxInfer: Automatic Diagnosis of Performance Anomaly for Online Database System. 1-8 - Jin Yu, Xiaopeng Ke, Fengyuan Xu, Hao Huang:
Efficient Architecture Paradigm for Deep Learning Inference as a Service. 1-8 - Jianzhou Mao, Tathagata Bhattacharya, Xiaopu Peng, Ting Cao, Xiao Qin:
Modeling Energy Consumption of Virtual Machines in DVFS-Enabled Cloud Data Centers. 1-6 - Norah Alilwit:
Authentication Based on Blockchain. 1-6 - Xinyu Yang, Jiahao Cao, Mingwei Xu:
SEC: Secure, Efficient, and Compatible Source Address Validation with Packet Tags. 1-8 - Randeep S. Baweja, Devin B. Ridge, Harpreet S. Dhillon, William C. Headley:
FPGA Implementation of a Pseudo-Random Signal Generator for RF Hardware Test and Evaluation. 1-7 - Natalia Trojanowska, Michal Kedziora, Moataz Hanif, Houbing Song:
Secure Decentralized Application Development of Blockchain-based Games. 1-8 - Tao Lin:
Deep Learning for IoT. 1-4 - Jordan Pattee, Byeong Kil Lee:
Design Alternatives for Performance Monitoring Counter based Malware Detection. 1-2 - Joshua Groen, Peter Howell, Michael Collins:
REPROOF: Quantifying the Jam Resistance of REBUF. 1-2 - Kai Zhang, Yushan Jiang, Dahai Liu, Houbing Song:
Spatio-Temporal Data Mining for Aviation Delay Prediction. 1-7 - Ze-Li Dou, Liran Ma, Khiem Nguyen, Kien X. Nguyen:
Paradox of AlphaZero: Strategic vs. Optimal Plays. 1-9 - Alexander Bothe, Nils Aschenbruck:
BonnMotion 4 - Taking Mobility Generation to the Next Level. 1-8 - Guangjun Ye, Wuji Liu, Chase Q. Wu, Wei Shen, Xukang Lyu:
On Machine Learning-based Stage-aware Performance Prediction of Spark Applications. 1-8 - Lihua Jiang, Jiawei Yan, Nengfu Xie:
Discussion on Application of the Internet of Things in Modern Agricultural Experimental Base. 1-4 - Danlin Jia, Manoj Pravakar Saha, Janki Bhimani, Ningfang Mi:
Performance and Consistency Analysis for Distributed Deep Learning Applications. 1-8 - Yuhao Kang, Songtao Guo, Pan Li, Yuanyuan Yang:
Edge Computing Based Privacy-Preserving Data Aggregation Scheme in Smart Grid. 1-6 - Ke Han, Youyan Duan, Rui Jin, Zhicheng Ma, Hui Rong, Xiaobo Cai:
Open Framework of Gateway Monitoring System for Internet of Things in Edge Computing. 1-5 - Megan O. Moore, William H. Clark, R. Michael Buehrer, William C. Headley:
When is Enough Enough? "Just Enough" Decision Making with Recurrent Neural Networks for Radio Frequency Machine Learning. 1-7 - Mathew L. Wymore, Vishal Deep, Vishak Narayanan, Henry Duwe, Daji Qiao:
Lifecycle Management Protocols for Batteryless, Intermittent Sensor Nodes. 1-8 - Madeline Van Ness, Xin Sun:
Policy Units and Categories: Networking Models for Simplifying Security Policy Management. 1-11 - Xiaobo Cai, Ke Han, Yan Li, Huihui Wang, Jiajin Zhang, Yue Zhang:
Research on Security Estimation and Control of Cyber-Physical System. 1-5 - Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Guang Fan, Jiankuo Dong:
SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization Environment. 1-10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.