


default search action
ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: Melbourne, Australia
- Jinjun Chen, Laurence T. Yang:

IEEE International Conference on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018, Melbourne, Australia, December 11-13, 2018. IEEE 2018, ISBN 978-1-7281-1141-4
IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2018)
- Ying Qin, Yan Ding, Yusong Tan, Qingbo Wu:

Solution Space Adjustable CNF Obfuscation for Privacy-Preserving SAT Solving. 1-8 - Jiugen Shi, Ji Wang, Huawei Huang, Lulu Shen, Jin Zhang, Hao Xu:

Joint Optimization of Stateful VNF Placement and Routing Scheduling in Software-Defined Networks. 9-14 - Baicheng Yan, Yi Zhou, Limin Xiao, Zhang Yang, Hongyu Wu, Bing Wei

:
A Low Cost Method for Determining the Entire Network Path Bandwidths of Indirect High-Performance Computer Networks. 15-22 - Xinyu Chen, Hansheng Wei, Xin Ye, Li Hao, Yanhong Huang, Jianqi Shi:

Efficient Parallel CTL Model-Checking for Pushdown Systems. 23-30 - Wenhao Zhu, Wu Zhang, Bohan Ding, Kangle Xu:

Acoustics Simulation on Sunway TaihuLight Based on Solving the Integral of Ffowcs Williams-Hawkings Equation. 31-38 - Rui-dong Qi, Jian-Tao Zhou, Xiaoyu Song:

An Effective Clustering Method for Finding Density Peaks. 39-46 - Wenming Li, Xiaochun Ye, Da Wang, Hao Zhang, Dongdong Wu, Zhimin Zhang, Dongrui Fan

:
WEAVER: An Energy Efficient, General-Purpose Acceleration Architecture for String Operations in Big Data Applications. 47-54 - Germán Ceballos, Erik Hagersten, David Black-Schaffer:

Tail-PASS: Resource-Based Cache Management for Tiled Graphics Rendering Hardware. 55-63 - Yu Qiao, Yi Gu, Jun Wu, Lei Zhang, Chongjun Wang:

A Truthful Profit-Oriented Mechanism for Mobile Crowdsensing. 64-71 - Yu Qiao, Yue Song, Nan Wang, Jun Wu, Lei Zhang, Chongjun Wang:

A False-Name-Proof Protocol for Multicast Routing Auctions. 72-79 - Lianpeng Li, Jian Dong, Decheng Zuo, Jiaxi Liu:

SLA-Aware and Energy-Efficient VM Consolidation in Cloud Data Centers Using Host States Naive Bayesian Prediction Model. 80-87 - Hansheng Wei, Xinyu Chen, Xin Ye, Neng Fu, Yanhong Huang, Jianqi Shi:

Parallel Model Checking on Pushdown Systems. 88-95 - Erzhou Zhu, Peng Wen, Binbin Zhu, Feng Liu, Futian Wang, Xuejun Li:

Effective Clustering Analysis Based on New Designed Clustering Validity Index and Revised K-Means Algorithm for Big Data. 96-102 - Junfeng Zhao, Zhimei Zhao, Hongji Yang:

Distributed Parallelizability Analysis of Legacy Code. 103-110 - Hongli Lu, Guangping Xu, Bo Tang, Shengli Li, Mian Zhou

:
Efficient Online Stream Deduplication for Network Block Storage. 111-119 - Hui Xie

, Kun Lv, Changzhen Hu:
A Partition Matching Method for Optimal Attack Path Analysis. 120-126 - Sang Nguyen

, Zoran Salcic, Xuyun Zhang
:
Big Data Processing in Fog - Smart Parking Case Study. 127-134 - Jianhui Zhou, Yongmei Lei:

Asynchronous Group-Based ADMM Algorithm under Efficient Communication Structure. 135-140 - Deqing Bu, Yaobin Wang, Ling Li, Zhiqin Liu, Wenxin Yu, Manasah Musariri:

Exploring Parallelism in MiBench with Loop and Procedure Level Speculation. 141-146 - Hiba Ouni, Kais Klai, Chiheb Ameur Abid, Belhassen Zouari:

Reducing Time and/or Memory Consumption of the SOG Construction in a Parallel Context. 147-154 - Haolei Ye, Eric McCreath:

FLAC Decoding Using GPU Acceleration. 155-162 - Ahmad Lashgar, Ehsan Atoofian, Amirali Baniasadi:

Loop Perforation in OpenACC. 163-170 - Yuma Sakakibara, Yuta Tokusashi, Shin Morishima, Hiroki Matsutani:

Accelerating Blockchain Transfer System Using FPGA-Based NIC. 171-178 - Dongchao Ma, Hongchao Li, Xingguo Sun, Li Ma, Chengan Zhao:

An Energy and Robustness Adjustable Optimization Method of File Distribution Services. 179-186 - Yue Yang Yang, Wangqiaohong Wang, Yangjing Yang, Zhangjianpei Zhang, Maxiaoyang Ma:

Subgroup Discovery Method Based on User Behavior Analysis. 187-192 - Youze Zhu, Yanqin Yang, Wenchao Xu:

Neighboring and Non-Neighboring Features for Pedestrian Detection. 193-198 - Xuehai Tang, Qiuyang Liu, Yangchen Dong, Jizhong Han

, Zhiyuan Zhang:
Fisher: An Efficient Container Load Prediction Model with Deep Neural Network in Clouds. 199-206 - Shigan Yu, Zhimin Tang, Xiaochun Ye, Zhimin Zhang, Dongrui Fan

, Zhiying:
High-Performance and Energy-Efficient Fault Tolerance Scheduling Algorithm Based on Improved TMR for Heterogeneous System. 207-214 - Tianqi Liu, Xuefeng Yan, Cen Shenzhi:

Site-Effect-Based Semi-Synchronous Label Propagation Algorithm for Community Detection. 215-222 - Qi Zha, Xuefeng Yan, Yong Zhou:

Adaptive Centre-Weighted Oversampling for Class Imbalance in Software Defect Prediction. 223-230 - Wenbin Yao, Yuanhao Ding, Xiaoyong Li

:
LogoPhish: A New Two-Dimensional Code Phishing Attack Detection Method. 231-236 - Xirong Xu, Huifeng Zhang, Pir Soomro:

Fault-Tolerant Edge-Pancyclicity of Möbius Cube MQ_n. 237-243 - Shin Morishima, Hiroki Matsutani:

Acceleration of Anomaly Detection in Blockchain Using In-GPU Cache. 244-251 - Shengbo Song, Lelai Deng, Jun Gong, Hanmei Luo:

Gaia Scheduler: A Kubernetes-Based Scheduler Framework. 252-259 - Qing Zhou, Qingjie Zhao, Li Zhou, Junshe An, Changbin Xue, Yuyin Tan, Jianing Rao:

Design of a Compact and Reconfigurable Onboard Data Handling System. 260-264 - Huaping Yuan, Zhenguo Yang, Xu Chen, Yukun Li, Wenyin Liu:

URL2Vec: URL Modeling with Character Embeddings for Fast and Accurate Phishing Website Detection. 265-272 - Feiran Wang, Yiping Wen, Tianhang Guo, Jinjun Chen, Buqing Cao:

Personalized Commodity Recommendations of Retail Business Using User Feature Based Collaborative Filtering. 273-278 - Najet Hamdi, Walid Chainbi

, Mohamed Ali Mahjoub
:
A Transition State Cost Sensitive Virtual Machines Consolidation. 279-286 - Zifan Liu, Haipeng Dai

, Bingchuan Tian, Wajid Rafique
, Wanchun Dou:
Efficient Coflow Scheduling of Multi-Stage Jobs with Isolation Guarantee. 287-294 - Xianfeng Li, Jianfeng Li, Jie Chen:

Effective Cooperative UAV Searching Using Adaptive STGM Mobility Model in a FANET. 295-301 - Tao Sun, Wenjie Zhong:

A Data Related Behaviors Automatic Detection Method for Parallel Software Testing. 302-307 - Wenda Tang, Xuan Zhao, Wajid Rafique

, Wanchun Dou:
A Blockchain-Based Offloading Approach in Fog Computing Environment. 308-315 - Amir Javadpour, Guojun Wang, Xiaofei Xing:

Managing Heterogeneous Substrate Resources by Mapping and Visualization Based on Software-Defined Network. 316-321 - Xinzhou Dong, Beihong Jin, Bo Tang, Hongyin Tang:

On Real-Time Monitoring on Data Stream for Traffic Flow Anomalies. 322-329 - Yang Zhang

, Dan Feng, Zhipeng Tan, Jingning Liu, Wei Tong
, Chengning Wang
:
Asymmetric-ReRAM: A Low Latency and High Reliability Crossbar Resistive Memory Architecture. 330-337 - Qiongjie Yao, Xiaofei Liao, Hai Jin:

Hierarchical Attention Based Recurrent Neural Network Framework for Mobile MOBA Game Recommender Systems. 338-345 - Yang Yang

, Xiaolin Chang, Zhen Han, Lin Li:
Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework. 346-353 - Yuhan Gao, Liwei Chen, Gang Shi, Fei Zhang:

A Comprehensive Detection of Memory Corruption Vulnerabilities for C/C++ Programs. 354-360 - Xiao Shi, Detian Hu, Hongwei Tang, Xiaohui Zheng, Xiaofang Zhao:

Using Centralized I/O Scheduling Service (CISS) to Improve Cloud Object Storage Performance. 361-368 - Weichao Mao, Jian Cao, Guangtao Xue, Jiadi Yu, Yanmin Zhu, Minglu Li, Wenjuan Li, Shiyou Qian:

Adjusting Matching Algorithm to Adapt to Dynamic Subscriptions in Content-Based Publish/Subscribe Systems. 369-376 - Qi Yu, Libo Huang, Hui Guo, Cheng Qian, Sheng Ma, Zhiying Wang:

Improving Branch Prediction Accuracy on Multi-Core Architectures for Big Data. 377-382 - Heng Guo, Zuoning Chen, Xin Liu:

AALB: Adaptive Algorithm of Load Balance for CAM Physics on Sunway TaihuLight Supercomputer. 383-390 - Jingli Wang, Wei Zhou, Jiacheng Li, Zhou Yan, Jizhong Han

, Songlin Hu
:
An Online Sockpuppet Detection Method Based on Subgraph Similarity Matching. 391-398 - Jie Xu, Jingyu Wang

, Qi Qi, Jianxin Liao:
Proportion Scheduler to Improve the Mismatched Locality in YARN. 399-406 - Yizhe Yang, Qingni Shen, Wu Xin, Wenjun Qian, Yahui Yang, Zhonghai Wu:

Memory Cache Attacks on Alluxio Impede High Performance Computing. 407-414 - Miguel Areias

, Ricardo Rocha
:
On Extending a Fixed Size, Persistent and Lock-Free Hash Map Design to Store Sorted Keys. 415-422 - Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Shuhong Chen:

Wi-Fi Radar Placement for Coverage in Collapsed Structures. 423-430 - Tao Sun, Yangyang Liu:

A Hierarchical CPN Model Automatically Generating Method Aiming at Multithreading Program Algorithm Error Detection. 431-437 - Meng Sun, Haopeng Chen:

Heuristic Prefetching Caching Strategy to Enhance QoE in Edge Computing. 438-445 - Tao Sun, Ting Zhang, Xin Guo:

Parallel Software Testing Sequence Generation Method Based on State Pruning. 446-453 - Jun Chen, Haopeng Chen:

A Topology-Based Approach to Pattern Recognition on Graph-Structured Data. 454-461 - Bing Shi, Han Yuan, Rongjian Shi:

Pricing Cloud Resource Based on Multi-Agent Reinforcement Learning in the Competing Environment. 462-468 - Jing Gu, Shengbo Song, Ying Li, Hanmei Luo:

GaiaGPU: Sharing GPUs in Container Clouds. 469-476 - Yongnan Li:

A Revised DNA Computing Model of Inversion and Division over Finite Field GF (2^n). 477-484 - Yayu Guo, Fang Lin, Yi Liu, Depei Qian:

Re-Running Large-Scale Parallel Programs Using Two Nodes. 485-492 - Xuguang Bao, Lizhen Wang:

A Co-Location-Based Approach for Business Site Selection Using Ontologies. 493-500 - Jingyuan Hu, Xiaokuang Bai, Sai Sha, Yingwei Luo, Xiaolin Wang, Zhenlin Wang:

Working Set Size Estimation with Hugepages in Virtualization. 501-508 - Xiangping Zhang, Jianxun Liu, Buqing Cao, Qiaoxiang Xiao, Yiping Wen:

Web Service Recommendation via Combining Doc2Vec-Based Functionality Clustering and DeepFM-Based Score Prediction. 509-516 - Wenbin Yao, Lijuan Zhang, Xiaoyong Li

:
Maximizing Influence Propagation in Networks by User-Relational Iterative Ranking Algorithm. 517-524 - Ke Zhan, Lili Xu, Zimu Yuan, Weijuan Zhang:

Performance Optimization of Large Files Writes to Ceph Based on Multiple Pipelines Algorithm. 525-532 - Qinghan Yu, Tian Wang, Xibin Zhao, Hai Wang, Yue Gao, Chenyang Lu, Ming Gu:

Fast Real-Time Scheduling for Ethernet-Based Train Control Networks. 533-540 - Muhammad Hassan, Haopeng Chen, Yutong Liu:

DEARS: A Deep Learning Based Elastic and Automatic Resource Scheduling Framework for Cloud Applications. 541-548 - Yiping Teng, Jinyan Liu, Xiaoting Liu, Guohui Ding, Chunlong Fan:

Secure Spatial Network Queries on Cloud Platform. 549-556 - Bo Zhao

, Xiaoyan Xu, Peng Liu, Yingying Li, Rongcai Zhao, Ramin Yahyapour
:
A Demand-Driven Pointer-Range Analysis Technique for Data Transmission Optimization. 557-564 - Guolin Tan, Peng Zhang, Qingyun Liu, Xinran Liu, Chunge Zhu, Li Guo:

MalFilter: A Lightweight Real-Time Malicious URL Filtering System in Large-Scale Networks. 565-571 - Xinhui Tian, Biwei Xie, Jianfeng Zhan:

Cymbalo: An Efficient Graph Processing Framework for Machine Learning. 572-579 - Kishwar Ahmed

, Jesse Bull
, Jason Liu
:
Contract-Based Demand Response Model for High Performance Computing Systems. 580-589 - Zhibin Wang, Yiping Wen, Jinjun Chen, Buqing Cao, Feiran Wang:

Towards Energy-Efficient Scheduling with Batch Processing for Instance-Intensive Cloud Workflows. 590-596 - Wang Xiong, Yijie Wang, Li Cheng:

Fisher Discriminant Analysis Random Forest for Online Class Incremental Learning. 597-604 - Zengxiao Zhang, Zhongzhi Luan, Chongyang Xu, Ming Gong, Shun Xu:

Accelerating Lattice QCD on Sunway Many-Core Processor. 605-612 - Yuchen Wong

, Qingni Shen:
Secure Virtual Machine Placement and Load Balancing Algorithms with High Efficiency. 613-620 - Xiaohui Luo, Danfeng Shan, Tong Zhang, Hao Zhang, Xunli Fan, Fengyuan Ren:

PacketCache: Improving OS Stacks for Streaming with Identical Contents. 621-628 - Omar Ben Maaouia, Hazem Fkaier

, Christophe Cérin, Mohamed Jemni
:
Energy-Efficient Strategy for Placement of Online Services on Dynamic Availability Resources in Volunteer Cloud. 629-636 - Emna Hammami, Yosr Slama:

Optimizing Tiled Matrix-Matrix Product According to Cache Performance Enhancement. 637-644 - Wenbin Yao, Yuanhao Ding, Xiaoyong Li

:
Deep Learning for Phishing Detection. 645-650 - Xiaohui Luo, Dong Liu, Xing Wu, Xunli Fan, Fengyuan Ren:

Making Userspace TCP Stacks Transparent to Applications. 651-658 - Wenqi Li, Dehua Chen, Jiajin Le:

Robot Patrol Path Planning Based on Combined Deep Reinforcement Learning. 659-666 - Fereydoun Farrahi Moghaddam, Wubin Li, Abdelouahed Gherbi:

DataFall: A Policy-Driven Algorithm for Decentralized Placement and Reorganization of Replicated Data. 667-675 - Zhaohua Zhang, Naiyong Ao, Gang Wang, Xiaoguang Liu:

An Extensible Search Engine Platform for Efficiency Research. 676-683 - Pritish Mishra

, Mayank Tiwary, Laurence T. Yang, Deepak Puthal:
S2R: Service Trading Based Response Time Optimization in Mobile Edge Computing. 684-691 - Tianye Yang, Dezun Dong, Cunlu Li, Liquan Xiao

:
CRSP: Network Congestion Control through Credit Reservation. 692-699 - Liangfeng Cheng, Yuchong Hu, Wei Wei

, Renzhi Xiao:
Enhanced Self-Coding for Available Memcached. 700-707 - Mingyi Chen, Yepeng Yao, Junrong Liu, Bo Jiang, Liya Su, Zhigang Lu:

A Novel Approach for Identifying Lateral Movement Attacks Based on Network Embedding. 708-715 - Lei Wang, Yu Deng, Rui Gong, Wei Shi, Zhenyu Zhao, Qiang Dou:

A Parallel Algorithm for Instruction Dependence Graph Analysis Based on Multithreading. 716-721 - Yuan Cai, Dong Xiang, Xiang Ji:

Deadlock-Free Adaptive Routing Based on the Repetitive Turn Model for 3D Network-on-Chip. 722-728 - Qing Qin, Jie Ren, Jialong Yu, Hai Wang, Ling Gao, Jie Zheng, Yansong Feng, Jianbin Fang, Zheng Wang

:
To Compress, or Not to Compress: Characterizing Deep Learning Model Compression for Embedded Inference. 729-736 - Ruichao Gao, Xuebin Ma:

Dynamic Data Histogram Publishing Based on Differential Privacy. 737-743 - Shu Gao, Zilong Jiang, Yunhui Shi, Guanyu Wang, Liangchen Chen, Abdoulaye Sidibé:

A CTR Prediction Approach for Advertising Based on Embedding Model and Deep Learning. 744-750 - Likun Liu, Jiantao Shi

, Hongli Zhang, Xiangzhan Yu:
Tearing Down the Face of Algorithmic Complexity Attacks for DPI Engines. 751-758 - Erzhou Zhu, Dong Liu, Chengcheng Ye, Feng Liu, Xuejun Li, Hui Sun:

Effective Phishing Website Detection Based on Improved BP Neural Network and Dual Feature Evaluation. 759-765 - Erzhou Zhu, Binbin Zhu, Peng Wen, Feng Liu, Xuejun Li, Futian Wang:

Effective Clustering Analysis Based on New Designed CVI and Improved Clustering Algorithms. 766-772 - Wenan Wang, Chuang Zhang, Xiaojun Chen, Zhao Li, Hong Ding, Xin Wen:

An On-the-Fly Scheduling Strategy for Distributed Stream Processing Platform. 773-780 - Erzhou Zhu, Chengcheng Ye, Dong Liu, Feng Liu, Futian Wang, Xuejun Li:

An Effective Neural Network Phishing Detection Model Based on Optimal Feature Selection. 781-787 - Peng Zhang, Yan Li, Hailun Lin, Jianwu Wang, Chuang Zhang:

A Periodic Task-Oriented Scheduling Architecture in Cloud Computing. 788-794 - Mingzhu Li, Xuebin Ma:

Bayesian Networks-Based Data Publishing Method Using Smooth Sensitivity. 795-800 - Chunhua Li, Jinbiao He, Cheng Lei, Chan Guo, Ke Zhou:

Achieving Privacy-Preserving CP-ABE Access Control with Multi-Cloud. 801-808 - Yingjie Zhang, Liang Zeng, Ying Zhang, Jie Meng:

2D Otsu Segmentation Algorithm Improvement Based on FOCPSO. 809-815 - Xin Li, Zhen Lian, Xiaolin Qin, Jemal H. Abawajy:

Delay-Aware Resource Allocation for Data Analysis in Cloud-Edge System. 816-823 - Guangqiang Luan, Yuebin Bai, Chunyang Wang, Junfang Zeng, Qingbin Chen:

An Efficient Checkpoint and Recovery Mechanism for Real-Time Embedded Systems. 824-831 - Hammad Qaiser, Gao Shu:

Efficient VM Selection Heuristics for Dynamic VM Consolidation in Cloud Datacenters. 832-839 - Peng Zhang, Lichao Xing, Ninggou Yang, Guolin Tan, Qingyun Liu, Chuang Zhang:

Redis++: A High Performance In-Memory Database Based on Segmented Memory Management and Two-Level Hash Index. 840-847 - Weijia Jia

, Hanwu Wang:
An Optimized Assisted Hybridcast Transmission Scheme in Mobile Wireless Networks. 848-855 - Xianfeng Li, Jie Chen, Jianfeng Li:

FATES: A Framework with Adaptive Track-Explore Strategy for Moving Targets Search by a FANET. 856-861 - Congwu Li, Jingqiang Lin, Quanwei Cai, Bo Luo

:
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines. 862-869 - Yuanyuan Sun, Lele Xu, Ye Li, Lili Guo, Zhongsong Ma, Yongming Wang:

Utilizing Deep Architecture Networks of VAE in Software Fault Prediction. 870-877 - Runze Yang

, Baoqi Huang, Jian Song, Bing Jia, Wuyungerile Li:
An Energy Efficient Smartphone Pedometer Based on an Auto-Correlation Analysis. 878-885 - Adel Nadjaran Toosi

, Rajkumar Buyya
:
Acinonyx: Dynamic Flow Scheduling for Virtual Machine Migration in SDN-Enabled Clouds. 886-894 - Mehdi Gheisari

, Guojun Wang, Shuhong Chen
, Ali Seyfollahi
:
A Method for Privacy-Preserving in IoT-SDN Integration Environment. 895-902 - Ting Chen, Jianxun Liu, Buqing Cao, Zhenlian Peng, Yiping Wen, Run Li:

Web Service Recommendation Based on Word Embedding and Topic Model. 903-910 - Ario Sadafi, Martin Radolko, Iosif Serafeimidis, Steffen Hadlak:

Red Blood Cells Segmentation: A Fully Convolutional Network Approach. 911-914 - Hamid Arabnejad, João Bispo

, Jorge G. Barbosa
, João M. P. Cardoso
:
An OpenMP Based Parallelization Compiler for C Applications. 915-923 - Daniele Apiletti, Claudia Barberis, Tania Cerquitelli, Alberto Macii

, Enrico Macii, Massimo Poncino, Francesco Ventura:
iSTEP, an Integrated Self-Tuning Engine for Predictive Maintenance in Industry 4.0. 924-931 - Kennedy A. Torkura, Muhammad I. H. Sukmana

, Anne V. D. M. Kayem:
A Cyber Risk Based Moving Target Defense Mechanism for Microservice Architectures. 932-939 - Santonu Sarkar, Sreekrishnan Venkateswaran:

Best-Fit Containerization as a Brokered Service. 940-947 - Gargi Alavani

, Kajal Varma, Santonu Sarkar:
Predicting Execution Time of CUDA Kernel Using Static Analysis. 948-955 - Bo Wang

, Jie Tang, Rui Zhang, Wei Ding, Deyu Qi:
LCRC: A Dependency-Aware Cache Management Policy for Spark. 956-963 - Yibin Xu

, Yangyu Huang
:
MWPoW - Multi-Winner Proof of Work Consensus Protocol: An Immediate Block-Confirm Solution and an Incentive for Common Devices to Join Blockchain. 964-971 - Sai Sha

, Yingwei Luo, Zhenlin Wang, Xiaolin Wang:
A Neural Network Model for Cache and Memory Prediction of Neural Networks. 972-978 - Hugo Meyer, Uraz Odyurt

, Simon Polstra, Evangelos Paradas, Ignacio Gonzalez Alonso, Andy D. Pimentel
:
On the Effectiveness of Communication-Centric Modelling of Complex Embedded Systems. 979-986 - Heena Wadhwa

, Rajni Aron:
Fog Computing with the Integration of Internet of Things: Architecture, Applications and Future Directions. 987-994 - Issam Raïs

, Hélène Coullon, Laurent Lefèvre, Christian Pérez:
Automatic Energy Efficient HPC Programming: A Case Study. 995-1002 - Zechao Liu, Zoe Lin Jiang, Xuan Wang, Yulin Wu, Siu-Ming Yiu:

Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices. 1003-1008 - Arthur Silitonga, Florian Schade, Guanru Jiang, Jürgen Becker:

HLS-Based Performance and Resource Optimization of Cryptographic Modules. 1009-1016 - Zainab Abbas, Thorsteinn Thorri Sigurdsson, Ahmad Al-Shishtawy

, Vladimir Vlassov
:
Evaluation of the Use of Streaming Graph Processing Algorithms for Road Congestion Detection. 1017-1025 - Gang Xu, Xiaoxiao Li, Guojun Yuan, Zhan Wang, Guangming Tan, Xuejun An:

Routing and Spectrum Allocation for Time Varying Traffic by Artificial Bee Colony Algorithm in Elastic Optical Networks. 1026-1033 - Xuguang Bao, Lizhen Wang:

A Business Site Selection System Using Co-Locations and Ontologies. 1034-1035 - Xue Yang, Bingyang Liu, Fei Yang, Chuang Wang:

A Blockchain Based Online Trading System for DDoS Mitigation Services. 1036-1037 - Xuejun Li, Ruimiao Ding, Xiao Liu, Wenqiang Yan, Jia Xu

, Han Gao, Xi Zheng
:
COMEC: Computation Offloading for Video-Based Heart Rate Detection APP in Mobile Edge Computing. 1038-1039 - Junfeng Zhao, Minjia Zhang:

Refactoring OpenMP Code Based on MapReduce Model. 1040-1041 - Junfeng Zhao, Wenmeng Wang, Hongji Yang:

Code Refactoring Based on MapReduce in Cloud Migration. 1042-1043 - Kaho Okuyama, Yuta Tokusashi, Takuma Iwata, Mineto Tsukada, Kazumasa Kishiki, Hiroki Matsutani:

Network Optimizations on Prediction Server with Multiple Predictors. 1044-1045 - Boguslaw Cyganek

, Kazimierz Wiatr:
Design of a Visual Front-End for Parallel Signal Processing on Underwater Search Drone. 1046-1047
17th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2018)
- Estefania Serrano, Javier García-Blas

, Jesús Carretero
:
A Cloud Environment for Ubiquitous Medical Image Reconstruction. 1048-1055 - Nicolas Verstaevel

, Guillaume Garzone, Thierry Monteil, Nawal Guermouche, Johan Barthélemy, Pascal Perez
:
An Ontology Based Context-Aware Architecture for Smart Campus Applications. 1056-1063 - Md. Akbar Hossain

:
A Technology Assisted Framework for Medical Emergencies Involving Formal and Informal Caregivers. 1064-1070
8th IEEE International Conference on Big Data and Cloud Computing (BDCloud 2018)
- Duy Nguyen Phuong, Thanh Pham Chi

:
A Hybrid Indoor Localization System Running Ensemble Machine Learning. 1071-1078 - Jianjun Cao, Qibin Zheng, Nianfeng Weng, Xingchun Diao:

Low Dimensional Representation of Space Structure and Clustering of Categorical Data. 1079-1086 - Ruxia Li, Chase Q. Wu, Aiqin Hou, Yongqiang Wang, Tianyu Gao, Mingrui Xu:

On Scheduling of High-Throughput Scientific Workflows under Budget Constraints in Multi-Cloud Environments. 1087-1094 - Qianwen Ye, Chase Q. Wu, Huiyan Cao, Nageswara S. V. Rao, Aiqin Hou:

Storage-Aware Task Scheduling for Performance Optimization of Big Data Workflows. 1095-1102 - Konstantin Sozinov, Vladimir Vlassov

, Sarunas Girdzijauskas
:
Human Activity Recognition Using Federated Learning. 1103-1111 - Sangmi Lee Pallickara, Maxwell Roselius:

Radix: Enabling High-Throughput Georeferencing for Phenotype Monitoring over Voluminous Observational Data. 1112-1119 - Mandeep Kaur Saroa

, Rajni Aron:
Fog Computing and Its Role in Development of Smart Applications. 1120-1127
11th IEEE International Conference on Social Computing and Networking (SocialCom 2018)
- Kazuki Nakajima, Kenta Iwasaki, Toshiki Matsumura, Kazuyuki Shudo:

Estimating Top-k Betweenness Centrality Nodes in Online Social Networks. 1128-1135 - Kenta Iwasaki, Kazuyuki Shudo:

Comparing Graph Sampling Methods Based on the Number of Queries. 1136-1143 - Shatha Jaradat, Nima Dokoohaki

, Kim Hammar, Ummul Wara, Mihhail Matskin:
Dynamic CNN Models for Fashion Recommendation in Instagram. 1144-1151 - Meng Seng Wong

, Hideki Nishimoto, Nishigaki Yasuyuki:
The Incorporation of Social Media in an Emergency Supply and Demand Framework in Disaster Response. 1152-1158 - Kaustav Basu, Chenyang Zhou, Arunabha Sen, Victoria Horan Goliber:

A Novel Graph Analytic Approach to Monitor Terrorist Networks. 1159-1166 - Sunil Choenni, Niels Netten, Mortaza Shoae-Bargh, Rochelle Choenni:

On the Usability of Big (Social) Data. 1167-1174 - Giorgos Stamatelatos

, Sotirios Gyftopoulos
, George Drosatos
, Pavlos S. Efraimidis:
Deriving the Political Affinity of Twitter Users from Their Followers. 1175-1182 - Ericsson Marin, Mohammed Almukaynizi

, Eric Nunes, Jana Shakarian, Paulo Shakarian
:
Predicting Hacker Adoption on Darkweb Forums Using Sequential Rule Mining. 1183-1190 - Mathilde Hogsnes, Kjeld Hansen:

Negotiating Consumerism and Feminism on Instagram. 1191-1192

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














