


default search action
27th ICPADS 2021: Beijing, China
- 27th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2021, Beijing, China, December 14-16, 2021. IEEE 2021, ISBN 978-1-6654-0878-3

- Lin Li, Lei Wang, Bin Han, Xinxin Lu, Zhiyi Zhou, Bingxian Lu:

Subdomain Adaptive Learning Network for Cross-Domain Human Activities Recognition Using WiFi with CSI. 1-7 - Wenping Yu

, Jianzhong Zhang, Junyu Cai, Jingdong Xu:
A Novel iBeacon Deployment Scheme for Indoor Pedestrian Positioning. 8-17 - Yingling Mao

, Xiaojun Shang, Yuanyuan Yang:
Near-Optimal Resource Allocation and Virtual Network Function Placement at Network Edges. 18-25 - Zhigang Dai, Wenjun Lyu, Yi Ding

, Yiwei Song:
OPTI: Order Preparation Time Inference for On-demand Delivery. 26-33 - Xinlin Li, Shuqi Liu

, Xinyi Zhang, Linqi Song
:
Predicting Downside in Stock Market Using Knowledge and News Data. 34-41 - Yiting Huang, Zhiwen Wang, Yuguo Li, Junlang Huang, Dingding Li, Yong Tang, Deze Zeng:

IObrain: An Intelligent Lightweight I/O Recommendation System based on Decision Tree. 42-49 - Yao Xiao, Jiangang Shu

, Xiaohua Jia, Hejiao Huang:
Clustered Federated Multi-Task Learning with Non-IID Data. 50-57 - Yu Jiang, Xiaolong Xu, Kunda Lin, Weihua Duan:

TSC-ECFA: A Trusted Service Composition Scheme for Edge Cloud. 58-65 - Jiale Chen

, Duc Van Le
, Rui Tan, Daren Ho:
Split Convolutional Neural Networks for Distributed Inference on Concurrent IoT Sensors. 66-73 - Wei Yuan, Teng Tian

, Huawen Liang, Xi Jin:
A Gather Accelerator for GNNs on FPGA Platform. 74-81 - Zhen Han, Mingjun Xiao, Haisheng Tan, Guoju Gao:

Two-Layer Traffic Signal Optimization: A Edge-assisted Pressure Balance Approach Based on Cooperative Game. 82-89 - Wenquan Li, Siqi Feng, Fuqi Jin, Lanju Kong, Qingzhong Li:

NFT Content Data Placement Strategy in P2P Storage Network for Permissioned Blockchain. 90-97 - Penghui Li, Xianliang Jiang

, Guang Jin, Yan Yu, Zhijun Xie:
ALSTM: An Attention-based LSTM Model for Multi-Scenario Bandwidth Prediction. 98-105 - Botong Chang, Jiahe Zhang, Chi Harold Liu

:
Passenger Payment Willingness Prediction by Static and Dynamic Multi-dimensional Ticket Attributes Fusion. 106-113 - Zhaokang Wang, Junhong Li, Yifan Qi, Guanghui Zhu, Chunfeng Yuan, Yihua Huang:

UniGPS: A Unified Programming Framework for Distributed Graph Processing. 114-121 - Hisham Siddique, Miguel C. Neves, Carson Kuzniar, Israat Haque:

Towards Network-accelerated ML-based Distributed Computer Vision Systems. 122-129 - Hessam Moeini, I-Ling Yen, Farokh B. Bastani:

Decentralized Service Discovery and Composition in Dynamic IoT Systems. 130-137 - Shangsen Li, Lailong Luo, Deke Guo, Yawei Zhao:

Stable Cuckoo Filter for Data Streams. 138-145 - Xueyan Yin, Feifan Li, Genze Wu, Pengfei Wang, Yanming Shen, Heng Qi, Baocai Yin:

STNN: A Spatial-Temporal Graph Neural Network for Traffic Prediction. 146-152 - Yihao Wang

, Ling Gao, Jie Ren, Rui Cao
, Hai Wang, Jie Zheng, Quanli Gao:
ATO-EDGE: Adaptive Task Offloading for Deep Learning in Resource-Constrained Edge Computing Systems. 153-160 - Qing Yang, Tianzhang Xing, Zhiping Jiang, Xinhua Fu, Jingyi He:

WiRN: Real-Time and Lightweight Gesture Detection System on Edge Device. 161-168 - Zhuoyang Shi, Chaohao Li, Zizhi Jin, Weinong Sun, Xiaoyu Ji, Wenyuan Xu:

Anti-Replay: A Fast and Lightweight Voice Replay Attack Detection System. 169-176 - Chaojie Gu, Jiale Chen, Rui Tan, Linshan Jiang:

An Electromagnetic Covert Channel based on Neural Network Architecture. 177-184 - Xiaoyu Ma, Hui He, Hui Zhang, Wei Xi, Zuhao Chen, Jizhong Zhao:

Measuring and Modeling Multipath of Wi-Fi to Locate People in Indoor Environments. 185-192 - James R. Clavin, Yue Huang, Xin Wang

, Pradeep M. Prakash, Sisi Duan, Jianwu Wang, Sean Peisert
:
A Framework for Evaluating BFT. 193-200 - Ziyang Zhang, Feng Li, Changyao Lin, Shihui Wen, Xiangyu Liu, Jie Liu:

Choosing Appropriate AI-enabled Edge Devices, Not the Costly Ones. 201-208 - Yao Tong, Shuli Zhu, Qinkun Zhong, Ruipeng Gao, Chi Li, Lei Liu:

Smartphone-based Vehicle Tracking without GPS: Experience and Improvements. 209-216 - Zejun Wu, Chao Ma, Xiaochuan Shi, Libing Wu, Dian Zhang, Yutian Tang

, Milos Stojmenovic:
BRNN-GAN: Generative Adversarial Networks with Bi-directional Recurrent Neural Networks for Multivariate Time Series Imputation. 217-224 - Zhao Ming

, Xiuhua Li, Chuan Sun, Qilin Fan, Xiaofei Wang, Victor C. M. Leung:
Dependency-Aware Hybrid Task Offloading in Mobile Edge Computing Networks. 225-232 - Weijia Feng, Zhenfu Cao, Jiachen Shen, Xiaolei Dong:

RTPoW: A Proof-of-Work Consensus Scheme with Real-Time Difficulty Adjustment Algorithm. 233-240 - Kun Li, Nan Wang, Xinyu Liu:

Sensitivity loss training based implicit feedback. 241-248 - Zhuang Han, Jianfeng Guan

, Yanan Yao, Su Yao:
Adaptive Convolutional Neural Network Structure for Network Traffic Classification. 249-256 - Qifeng Shao, Zhao Zhang, Cheqing Jin, Aoying Zhou:

Trusted Sliding-Window Aggregation over Blockchains. 257-265 - Xiuxian Guan

, Zekai Sun, Shengliang Deng, Shixiong Zhao, Tianxiang Shen, Tsz On Li, Yuexuan Wang, Rui Wang, Heming Cui:
MVSAS: Semantic-Aware Scheduling for Low Latency and High Precision in Wireless Multi-View Application. 266-273 - Yicheng Fang, Chunping Wang, Zhe Sun, Hongbing Cheng:

Jyane: Detecting Reentrancy vulnerabilities based on path profiling method. 274-282 - Felippe Vieira Zacarias, Paul M. Carpenter, Vinicius Petrucci:

Improving HPC System Throughput and Response Time using Memory Disaggregation. 283-290 - Lifang Lin, Yuhui Deng

, Yi Zhou:
Improving Restore Performance of Deduplication Systems via a Greedy Rewriting Scheme. 291-298 - Zhongyang Wang, Yijie Wang, Hongzuo Xu, Yongjun Wang:

Effective Anomaly Detection Based on Reinforcement Learning in Network Traffic Data. 299-306 - Shenghui Xu, He Huang, Yu-E Sun, Yang Du, Guoju Gao, Xiaoyu Wang, Shiping Chen:

An Efficient Adaptive Noise Correction Framework for Size Measurement over Data Streams. 307-315 - Tingpei Huang, Hu Zhu, Shibao Li, Jianhang Liu:

M-UPS: A multi-user Pairing Scheme for NOMA-enabled Backscatter Communication Networks. 316-323 - Simeng Wang, Xing Chen

, Fei Tong, Yujian Zhang:
RSU-Aided Authentication for VANET Based on Consortium Blockchain. 324-331 - Chuanhao Dong, Zhiqiang Lv

, Jianbo Li:
A Forecasting Method of Dual Traffic Condition Indicators Based on Ensemble Learning. 332-339 - Yitong Zhou, Bowen Peng, Jingmian Wang, Weiwei Miao, Zeng Zeng, Yibo Jin, Sheng Zhang, Zhuzhong Qian:

TRAN: Task Replication with Guarantee via Multi-armed Bandit. 340-347 - Yanhong Qi, Xindong Liu, Li-Ping Wang:

A New Code-based Blind Signature in Rank Metric. 348-355 - Yuanhe Shu, Jingwei Wang, Linghe Kong

, Jiadi Yu, Guisong Yang, Yueping Cai, Zhen Wang, Muhammad Khurram Khan
:
WiBWi: Encoding-based Bidirectional Physical-Layer Cross-Technology Communication between BLE and WiFi. 356-363 - Ziyu Wang, Cong Sun, Qingsong Yao, Duo Ding, Jianfeng Ma:

Delica: Decentralized Lightweight Collective Attestation for Disruptive IoT Networks. 364-371 - Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu:

Byzantine-robust Federated Learning through Spatial-temporal Analysis of Local Model Updates. 372-379 - Cristian Rusu, Paul Irofti

:
Efficient and Parallel Separable Dictionary Learning. 380-386 - Rajorshi Biswas, Jie Wu:

Protecting Resources Against Volumetric and Non-volumetric Network Attacks. 387-395 - Jun Gu

, Heng Zhang, Zhikun Zhang, Jian Zhang
, Hongran Li:
Iris Protection with Verisimilar Feature Structure. 396-401 - Yihui Lu, Weidong Liu, Chentao Wu, Jia Wang, Xiaoming Gao, Jie Li, Minyi Guo:

Spring Buddy: A Self-Adaptive Elastic Memory Management Scheme for Efficient Concurrent Allocation/Deallocation in Cloud Computing Systems. 402-409 - Xuemeng Li, Xiaojun Zhu, Chao Dong:

Planning Paths for UAVs to Collect Data from Disconnected Sensor Networks. 410-417 - Jianhua Gao

, Weixing Ji, Jie Liu, Senhao Shao, Yizhuo Wang, Feng Shi:
AMF-CSR: Adaptive Multi-Row Folding of CSR for SpMV on GPU. 418-425 - Xinyu Li, Bin Guo, Sicong Liu, Chen Qiu, Yunji Liang, Zhiwen Yu:

JointCS: Joint Search for Deep Model Compression and Segmentation on Heterogeneous IoT Devices. 426-433 - Xuechao Jia, Laiping Zhao:

RAEF: Energy-efficient Resource Allocation through Energy Fungibility in Serverless. 434-441 - Kang Yang, Rongyu Cao, Yueyuan Zhou, Jiawei Zhang, En Shao, Guangming Tan:

Deep Reinforcement Agent for Failure-aware Job scheduling in High-Performance Computing. 442-449 - Hao Yan, Qianzhen Zhang, Junjie Xie, Ziyue Lu, Sheng Chen, Deke Guo:

An Intelligent Game Theory Framework for Detecting Advanced Persistent Threats. 450-457 - Xiaolun Liang, Hao Zhou, Wangqiu Zhou, Xiang Cui, Zhi Liu

, Xiang-Yang Li:
Onion: Dependency-Aware Reliable Communication Protocol for Magnetic MIMO WPT System. 458-465 - Rulin Huang, Kaixin Huang, Jingyu Wang, Yuting Chen:

Reno: An RDMA-Enabled, Non-Volatile Memory-Optimized Key-Value Store. 466-473 - Ziyi Zhou, Baoshen Guo, Cao Zhang:

DoseGuide: A Graph-based Dynamic Time-aware Prediction System for Postoperative Pain. 474-481 - Yangfei Lin, Jie Li, Shigetomo Kimura, Yongbing Zhang, Yusheng Ji, Yang Yang:

Blockchain based Public Auditing Outsourcing for Cloud Storage. 482-489 - Tao Wu, Xiaochen Fan, Yuben Qu, Panlong Yang:

MobiEdge: Mobile Service Provisioning for Edge Clouds with Time-varying Service Demands. 490-497 - Hongsheng Hao, Liang Wang, Zenggang Xia, Zhiwen Yu, Jianhua Gu, Ning Fu:

Traffic Congestion Prediction: A Spatial-Temporal Context Embedding and Metric Learning Approach. 498-505 - Lirui Zhao, Jipeng Zhang

, Junhao Huang
, Zhe Liu, Gerhard P. Hancke:
Efficient Implementation of Kyber on Mobile Devices. 506-513 - Liang Dong, Xinjun Cai, Zheng Yang:

Gain Without Pain: Enabling Real-time Environmental Perception on 2x Mobile Devices in Multiplayer Augmented Reality. 514-521 - Qiang Hu, Lixian Ma, En Shao, Guangming Tan:

Building Agile Workflow Microservice System for HPC Applications Based on Fast-start OSv. 522-529 - Zhengjun Zhang, Yanqiang Liu, Jiangtao Chen, Zhengwei Qi, Yifeng Zhang, Huai Liu

:
Performance Analysis of Open-Source Hypervisors for Automotive Systems. 530-537 - Ruohong Jiao, Zhe Liu, Liang Liu, Chunpeng Ge, Gerhard P. Hancke:

Multi-Level IoT Device Identification. 538-547 - Ping Zhong, Bo Wang, Anning Wang, Yiming Zhang, Shengyun Liu, Qikai Zhong, Xuping Tu:

IAP: Instant Auditing Protocol for Anonymous Payments. 548-555 - Aibo Song, Bowen Peng, Jingyi Qiu, Yingying Xue, Mingyang Du:

BSDP: A Novel Balanced Spark Data Partitioner. 556-566 - Meng Zhou, Bowen Zhou, Huitian Wang, Fang Dong, Wei Zhao:

Dynamic Path Based DNN Synergistic Inference Acceleration in Edge Computing Environment. 567-574 - Jing Yang, Zhenqiang Xu, Jiliang Wang:

FerryLink: Combating Link Degradation for Practical LPWAN Deployments. 575-582 - Yafang Yang, Bin Guo, Yunji Liang, Zhiwen Yu:

Detection of Behavior Aging from Keystroke Dynamics. 583-590 - Zhaoxing Yang

, Guiyun Fan, Haiming Jin:
Constrained Multi-Agent Reinforcement Learning for Managing Electric Self-Driving Taxis. 591-598 - Ziyi Han, Ruiting Zhou, Jinlong Pang, Yue Cao

, Haisheng Tan:
Online Scheduling Unbiased Distributed Learning over Wireless Edge Networks. 599-606 - Yuqi Zhang, Hengfeng Wei, Yu Huang:

Remove-Win: a Design Framework for Conflict-free Replicated Data Types. 607-614 - Minghao Zhao, Jian Chen, Zhenhua Li:

Enabling Conflict-free Collaborations with Cloud Storage Services. 615-621 - Junfeng Zhao, Lu Liu, Feng Liu:

Access Control and Anti-copy Scheme of Cloud Storage Data Based on Blockchain. 622-628 - Jin Zhang, Chennan Zhang, Xiangyu Liu, Yuncheng Wang, Wenrui Diao, Shanqing Guo:

ShadowDroid: Practical Black-box Attack against ML-based Android Malware Detection. 629-636 - Fan Dang, Lingkun Li, Jiajie Chen

:
xRSA: Construct Larger Bits RSA on Low-Cost Devices. 637-643 - Yi Zhang, Dhrubajyoti Goswami:

Efficient Asynchronous GCN Training on a GPU Cluster. 644-651 - Filip Krakowski, Fabian Ruhland, Michael Schöttner:

Infinileap: Modern High-Performance Networking for Distributed Java Applications based on RDMA. 652-659 - Tao Li, Xu Cao, Haisong Liu, Chenqi Shi, Pengpeng Chen:

MTPGait: Multi-person Gait Recognition with Spatio-temporal Information via Millimeter Wave Radar. 660-666 - Shiwei Xu, Ao Sun, Xiaowen Cai, Zhengwei Ren, Yizhi Zhao, Jianying Zhou:

Post-Quantum User Authentication and Key Exchange Based on Consortium Blockchain. 667-674 - Kuan Feng, Yanmin Zhu:

Review-Based Hierarchical Attention Model Trained with Random Back-Transfer for Cross-Domain Recommendation. 675-682 - Chengyu Zhu, Yanmin Zhu, Xuansheng Lu:

Modeling User Interest Changes with Dynamic Differential Graphs for Item Recommendation. 683-690 - Xudong Yang, Ling Gao, Hai Wang, Yan Li, Jie Zheng, Jipeng Xu, Yuhui Ma:

A User-related Semantic Location Privacy Protection Method In Location-based Service. 691-698 - Xiao Wang

, Sheng Zhang, Yi Pan, Zeyu Lin:
STGE: Sensor Topology and Graph Embedding Learning with Heterogeneous Smart Environment. 699-706 - Mingwei Xu, Yu Zhou, Yuanyuan Qiao, Kai Xu, Yu Wang, Jie Yang:

ECRaft: A Raft Based Consensus Protocol for Highly Available and Reliable Erasure-Coded Storage Systems. 707-714 - Qian Zhang, Sheng Cao, Xiaosong Zhang:

Enabling Auction-based Cross-Blockchain Protocol for Online Anonymous Payment. 715-722 - Shaolin Yu, Jihong Zhu

, Jiali Yang:
Efficient Two-Dimensional Self-Stabilizing Byzantine Clock Synchronization in WALDEN. 723-730 - Shaolin Yu, Jihong Zhu

, Jiali Yang, Yulong Zhan:
Boosting Byzantine Protocols in Large Sparse Networks with High System Assumption Coverage. 731-738 - Shaolin Yu, Jihong Zhu

, Jiali Yang, Yue Ma:
Simulating Authenticated Broadcast in Networks of Bounded Degree. 739-746 - Han Zheng, Yan Zhang, Lan Zhang, Hao Xia, Shaojie Bai, Guobin Shen, Tian He, Xiangyang Li:

GraFin: An Applicable Graph-based Fingerprinting Approach for Robust Indoor Localization. 747-754 - Yinan Zhu, Chunhui Duan, Xuan Ding, Zheng Yang:

B-AUT: A Universal Architecture for Batch RFID Tags Authentication. 755-762 - Zhanjun Hao, Daiyang Zhang

, Yu Duan
, Xiaochao Dang:
Indoor sneezing and coughing detection based on COTS wireless device. 763-772 - Li Zhang, Yi Xu

, Jinhui Bao, Qiuyu Wang, Jingao Xu, Danyang Li, Yaodong Yang, Min Zhang:
Multi-Region Indoor Localization Based on WVP System. 773-779 - Hao Yuan, Qiang Ma, Zhe Hu, Xiaoxiang Li, Xu Wang, Zheng Yang:

LinkStream: A Liquidity Modeling System on Large-Scale Video Stream in Oilfield. 780-787 - Cong Liu, Anli Yan, Zhenxiang Chen, Haibo Zhang

, Qiben Yan, Lizhi Peng, Chuan Zhao:
IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles. 788-795 - Hao Chen, Qiang Ma, Shenghong Chen, Xin Miao:

VSpace: Vehicle Spatially-Aware Sensing via Acoustic Doppler Effect. 796-803 - Leyi Sun, Yifan Zhuo, Olivier Marin:

Simple yet Efficient Deployment of Scientific Applications in the Cloud. 804-811 - Christian Siebert:

Highly Scalable Parallel Checksums. 812-818 - Iryanto Jaya, Yusen Li, Wentong Cai:

Minimizing Play Request Rejection through Workload Splitting in Edge-Cloud Gaming. 819-826 - Delu Ma, Zhou Lei, Shengbo Chen, Peng Wang:

Load Balancing Optimization for Transformer in Distributed Environment. 827-834 - Yu Tian, Jiankun Wang, Zenghua Zhao:

Wi-Fi Fingerprint Update for Indoor Localization via Domain Adaptation. 835-842 - Qianwu Chen, Xianjin Xia, Zhigang Li, Yuanqing Zheng:

Collaborative Transmission over Intermediate Links in Duty-Cycle WSNs. 843-850 - Haipeng Du, Danfu Yuan

, Weizhan Zhang, Qinghua Zheng:
Dynamic Push for HTTP Adaptive Streaming with Deep Reinforcement Learning. 851-858 - Xu Wang, Hanjiang Luo, Yuting Yang, Rukhsana Ruby, Kaishun Wu:

Underwater Real-time Video Transmission via Optical Channels with Swarms of AUVs. 859-866 - Han Zhou, Ji Zhao, Yi Gao, Wei Dong:

RGC: Reliable Gesture Classification via Wearables Using GANs-Based Data Augmentation. 867-874 - Pankaj Khanchandani, Jan Schäppi, Ye Wang, Roger Wattenhofer:

On Consensus Number 1 Objects. 875-882 - Yichao Li, Li Wang, Fanfan Cheng, Ji Wu, Yiyun Zhang, Yiming Zhang:

IndigoStore: Latency Optimized Distributed Storage Backend for Cloud-Scale Block Storage. 883-890 - Jialuo Du, Chenning Li

, Zhenge Guo, Zhichao Cao:
SRPeek: Super Resolution Enabled Screen Peeking via COTS Smartphone. 891-898 - Jianyu Yao, Boqian Shi, Chunyang Xiang, Haipeng Jia, Chendi Li

, Hang Cao, Yunquan Zhang:
IAAT: A Input-Aware Adaptive Tuning framework for Small GEMM. 899-906 - Yu Zhang, Guoqiang Zhang, Wenjuan Zhao, Md Shazarul Alam, Ruiheng Xie:

Energy Efficient Wi-Fi Tethering through Fast Convergent Transmission Power Adaptation. 907-914 - Nan Jing, Bowen Zhang, Guannan Liu, Liu Yang, Lin Wang:

Anchor-Free Self-Positioning in Wireless Sensor Networks via Cross-Technology Communication. 915-922 - Ye Li, Haitao Zhang, Wei Tian, Huadong Ma:

Joint Optimization of Auto-Scaling and Adaptive Service Placement in Edge Computing. 923-930 - Jiannan Zheng, Haitao Zhang, Yilin Jin, Huadong Ma:

Collaborative Framework of Cloud Transcoding and Distribution Supporting Cost-Efficient Crowdsourced Live Streaming. 931-938

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














