callback( { "result":{ "query":":facetid:toc:\"db/conf/dasc/dasc2018.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"76.49" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"165", "@dc":"165", "@oc":"165", "@id":"43375832", "text":":facetid:toc:db/conf/dasc/dasc2018.bht" } }, "hits":{ "@total":"165", "@computed":"100", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"2543637", "info":{"authors":{"author":[{"@pid":"167/2113","text":"Eslam G. AbdAllah"},{"@pid":"45/1198","text":"Mohammad Zulkernine"},{"@pid":"07/3173","text":"Hossam S. Hassanein"}]},"title":"A Security Framework for ICN Traffic Management.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"78-85","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/AbdAllahZH18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00027","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00027","url":"https://dblp.org/rec/conf/dasc/AbdAllahZH18"}, "url":"URL#2543637" }, { "@score":"1", "@id":"2543638", "info":{"authors":{"author":{"@pid":"228/8988","text":"Mohammad A. R. Abdeen"}},"title":"A Distributed Architecture and Design Challenges of an Astray Pilgrim Tracking System.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"1028-1033","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/Abdeen18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00146","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00146","url":"https://dblp.org/rec/conf/dasc/Abdeen18"}, "url":"URL#2543638" }, { "@score":"1", "@id":"2543639", "info":{"authors":{"author":[{"@pid":"224/9071","text":"Antonio Acien"},{"@pid":"41/11239","text":"Ana Nieto"},{"@pid":"02/3236-1","text":"Javier López 0001"}]},"title":"Analyzing Cross-Platform Attacks: Towards a Three-Actor Approach.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"536-543","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/AcienN018","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00102","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00102","url":"https://dblp.org/rec/conf/dasc/AcienN018"}, "url":"URL#2543639" }, { "@score":"1", "@id":"2543640", "info":{"authors":{"author":[{"@pid":"30/7085","text":"Abdulghani Ali Ahmed"},{"@pid":"198/9893","text":"Yee Wai Kit"}]},"title":"Collecting and Analyzing Digital Proof Material to Detect Cybercrimes.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"742-747","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/AhmedK18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00129","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00129","url":"https://dblp.org/rec/conf/dasc/AhmedK18"}, "url":"URL#2543640" }, { "@score":"1", "@id":"2543641", "info":{"authors":{"author":[{"@pid":"19/49","text":"Leonidas Akritidis"},{"@pid":"21/1146","text":"Panayiotis Bozanis"},{"@pid":"86/9976","text":"Athanasios Fevgas"}]},"title":"Supervised Papers Classification on Large-Scale High-Dimensional Data with Apache Spark.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"987-994","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/AkritidisBF18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00140","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00140","url":"https://dblp.org/rec/conf/dasc/AkritidisBF18"}, "url":"URL#2543641" }, { "@score":"1", "@id":"2543642", "info":{"authors":{"author":[{"@pid":"150/8548","text":"Mabrook Al-Rakhami"},{"@pid":"301/8451","text":"Mohammed Abdullah Alsahli"},{"@pid":"84/4762","text":"Mohammad Mehedi Hassan"},{"@pid":"25/2352","text":"Atif Alamri"},{"@pid":"57/7356","text":"Antonio Guerrieri"},{"@pid":"f/GiancarloFortino","text":"Giancarlo Fortino"}]},"title":"Cost Efficient Edge Intelligence Framework Using Docker Containers.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"800-807","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/Al-RakhamiAHAGF18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00138","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00138","url":"https://dblp.org/rec/conf/dasc/Al-RakhamiAHAGF18"}, "url":"URL#2543642" }, { "@score":"1", "@id":"2543643", "info":{"authors":{"author":[{"@pid":"151/5195","text":"Khaled Alanezi"},{"@pid":"37/3475","text":"Shivakant Mishra"}]},"title":"A Privacy Negotiation Mechanism for the Internet of Things.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"512-519","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/AlaneziM18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00099","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00099","url":"https://dblp.org/rec/conf/dasc/AlaneziM18"}, "url":"URL#2543643" }, { "@score":"1", "@id":"2543644", "info":{"authors":{"author":[{"@pid":"47/5437","text":"Saqib Ali"},{"@pid":"81/3285-1","text":"Guojun Wang 0001"},{"@pid":"05/7222","text":"Xiaofei Xing"},{"@pid":"42/2615","text":"Roger Leslie Cottrell"}]},"title":"Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest Neighbors.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"919-926","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/AliWXC18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.000-8","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.000-8","url":"https://dblp.org/rec/conf/dasc/AliWXC18"}, "url":"URL#2543644" }, { "@score":"1", "@id":"2543645", "info":{"authors":{"author":[{"@pid":"144/2169","text":"Alaa Alsaig"},{"@pid":"a/VSAlagar","text":"Vangular Alagar"},{"@pid":"o/OlgaOrmandjieva","text":"Olga Ormandjieva"}]},"title":"Foundational Issues on Big Data Science and Engineering.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"995-1000","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/AlsaigAO18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00141","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00141","url":"https://dblp.org/rec/conf/dasc/AlsaigAO18"}, "url":"URL#2543645" }, { "@score":"1", "@id":"2543646", "info":{"authors":{"author":[{"@pid":"228/9089","text":"Kahina Amara"},{"@pid":"80/456","text":"Naeem Ramzan"},{"@pid":"16/7647","text":"Nouara Achour"},{"@pid":"58/11421","text":"Mahmoud Belhocine"},{"@pid":"159/2808","text":"Cherif Larbes"},{"@pid":"121/2835","text":"Nadia Zenati"}]},"title":"A New Method for Facial and Corporal Expression Recognition.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"446-450","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/AmaraRABLZ18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00089","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00089","url":"https://dblp.org/rec/conf/dasc/AmaraRABLZ18"}, "url":"URL#2543646" }, { "@score":"1", "@id":"2543647", "info":{"authors":{"author":[{"@pid":"228/9013","text":"Arafa Anis"},{"@pid":"45/1198","text":"Mohammad Zulkernine"},{"@pid":"51/8816","text":"Shahrear Iqbal"},{"@pid":"07/6584","text":"Clifford Liem"},{"@pid":"228/9079","text":"Catherine Chambers"}]},"title":"Securing Web Applications with Secure Coding Practices and Integrity Verification.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"618-625","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/AnisZILC18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00112","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00112","url":"https://dblp.org/rec/conf/dasc/AnisZILC18"}, "url":"URL#2543647" }, { "@score":"1", "@id":"2543648", "info":{"authors":{"author":[{"@pid":"67/3312-9","text":"Muhammad Arif 0009"},{"@pid":"81/3285-1","text":"Guojun Wang 0001"},{"@pid":"35/1949","text":"Shuhong Chen"}]},"title":"Deep Learning with Non-parametric Regression Model for Traffic Flow Prediction.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"681-688","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/ArifWC18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00120","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00120","url":"https://dblp.org/rec/conf/dasc/ArifWC18"}, "url":"URL#2543648" }, { "@score":"1", "@id":"2543649", "info":{"authors":{"author":[{"@pid":"117/9015","text":"Beakal Gizachew Assefa"},{"@pid":"o/OznurOskasap","text":"Öznur Özkasap"}]},"title":"MER-SDN: Machine Learning Framework for Traffic Aware Energy Efficient Routing in SDN.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"974-980","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/AssefaO18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.000-1","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.000-1","url":"https://dblp.org/rec/conf/dasc/AssefaO18"}, "url":"URL#2543649" }, { "@score":"1", "@id":"2543650", "info":{"authors":{"author":[{"@pid":"228/9084","text":"Nikoloas Bakalos"},{"@pid":"119/1645","text":"Eftychios Protopapadakis"},{"@pid":"52/6277","text":"Anastasios D. Doulamis"},{"@pid":"68/4000","text":"Nikolaos Doulamis"}]},"title":"Dance Posture/Steps Classification Using 3D Joints from the Kinect Sensors.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"868-873","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/BakalosPDD18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00-16","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00-16","url":"https://dblp.org/rec/conf/dasc/BakalosPDD18"}, "url":"URL#2543650" }, { "@score":"1", "@id":"2543651", "info":{"authors":{"author":[{"@pid":"199/5146","text":"Humayun Bakht"},{"@pid":"228/9023","text":"Samuel Eding"}]},"title":"Policy-Based Approach for Securing Message Dissemination in Mobile Ad Hoc Networks.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"1040-1045","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/BakhtE18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00148","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00148","url":"https://dblp.org/rec/conf/dasc/BakhtE18"}, "url":"URL#2543651" }, { "@score":"1", "@id":"2543652", "info":{"authors":{"author":[{"@pid":"228/9022","text":"Puneet Bakshi"},{"@pid":"228/9097","text":"Neelakantan Subramanian"},{"@pid":"20/4077","text":"Sukumar Nandi"}]},"title":"Using Digital Tokens to Improve Amortized Performance of eSign.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"121-128","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/BakshiSN18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00033","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00033","url":"https://dblp.org/rec/conf/dasc/BakshiSN18"}, "url":"URL#2543652" }, { "@score":"1", "@id":"2543653", "info":{"authors":{"author":[{"@pid":"196/4258","text":"Souha Bejaoui"},{"@pid":"09/1219","text":"Christophe Cérin"},{"@pid":"137/0536","text":"Tarek Menouer"},{"@pid":"41/6237","text":"Walid Saad"}]},"title":"Towards a Two Layers Based Scheduling Schema for Data Aware Strategies.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"1060-1067","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/BejaouiCMS18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00151","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00151","url":"https://dblp.org/rec/conf/dasc/BejaouiCMS18"}, "url":"URL#2543653" }, { "@score":"1", "@id":"2543654", "info":{"authors":{"author":[{"@pid":"46/1668","text":"Pierfrancesco Bellini"},{"@pid":"62/8772","text":"Stefano Bilotta"},{"@pid":"70/5028","text":"Paolo Nesi"},{"@pid":"07/4654","text":"Michela Paolucci"},{"@pid":"223/9192","text":"Mirco Soderi"}]},"title":"Real-Time Traffic Estimation of Unmonitored Roads.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"935-942","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/BelliniBNPS18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.000-6","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.000-6","url":"https://dblp.org/rec/conf/dasc/BelliniBNPS18"}, "url":"URL#2543654" }, { "@score":"1", "@id":"2543655", "info":{"authors":{"author":[{"@pid":"271/4879","text":"Keltoum Bendiab"},{"@pid":"47/3696","text":"Nicholas Kolokotronis"},{"@pid":"118/4391","text":"Stavros Shiaeles"},{"@pid":"77/1930","text":"Samia Boucherkha"}]},"title":"WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"724-729","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/BendiabKSB18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00126","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00126","url":"https://dblp.org/rec/conf/dasc/BendiabKSB18"}, "url":"URL#2543655" }, { "@score":"1", "@id":"2543656", "info":{"authors":{"author":[{"@pid":"228/8984","text":"Quentin Bergougnoux"},{"@pid":"i/JulienIguchiCartigny","text":"Julien Cartigny"},{"@pid":"g/GGrimaud","text":"Gilles Grimaud"}]},"title":"Porting the Pip Proto-Kernel's Model to Multi-core Environments.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"584-591","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/BergougnouxCG18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00108","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00108","url":"https://dblp.org/rec/conf/dasc/BergougnouxCG18"}, "url":"URL#2543656" }, { "@score":"1", "@id":"2543657", "info":{"authors":{"author":[{"@pid":"228/9076","text":"Nesrine Berjab"},{"@pid":"98/6329","text":"Hieu Hanh Le"},{"@pid":"91/1919","text":"Chia-Mu Yu"},{"@pid":"57/264","text":"Sy-Yen Kuo"},{"@pid":"y/HaruoYokota","text":"Haruo Yokota"}]},"title":"Abnormal-Node Detection Based on Spatio-Temporal and Multivariate-Attribute Correlation in Wireless Sensor Networks.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"568-575","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/BerjabLYKY18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00106","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00106","url":"https://dblp.org/rec/conf/dasc/BerjabLYKY18"}, "url":"URL#2543657" }, { "@score":"1", "@id":"2543658", "info":{"authors":{"author":[{"@pid":"228/9073","text":"Ruiying Cai"},{"@pid":"174/1590","text":"Ao Guo"},{"@pid":"49/1832-2","text":"Jianhua Ma 0002"},{"@pid":"14/5444","text":"Runhe Huang"},{"@pid":"06/3061","text":"Ruiyun Yu"},{"@pid":"01/2478","text":"Chen Yang"}]},"title":"Correlation Analyses Between Personality Traits and Personal Behaviors Under Specific Emotion States Using Physiological Data from Wearable Devices.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"46-53","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/CaiGMHYY18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00023","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00023","url":"https://dblp.org/rec/conf/dasc/CaiGMHYY18"}, "url":"URL#2543658" }, { "@score":"1", "@id":"2543659", "info":{"authors":{"author":[{"@pid":"217/4457","text":"Joyjit Chatterjee"},{"@pid":"228/9080","text":"Vajja Mukesh"},{"@pid":"84/3187","text":"Hui-Huang Hsu"},{"@pid":"152/3780","text":"Garima Vyas"},{"@pid":"77/35-2","text":"Zhen Liu 0002"}]},"title":"Speech Emotion Recognition Using Cross-Correlation and Acoustic Features.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"243-249","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/ChatterjeeMHV018","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00050","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00050","url":"https://dblp.org/rec/conf/dasc/ChatterjeeMHV018"}, "url":"URL#2543659" }, { "@score":"1", "@id":"2543660", "info":{"authors":{"author":[{"@pid":"228/8994","text":"Lingchi Chen"},{"@pid":"22/2465","text":"Xiaoheng Deng"},{"@pid":"36/3058","text":"Hailan Shen"},{"@pid":"08/6812","text":"Congxu Zhu"},{"@pid":"21/2841","text":"Le Chang"}]},"title":"DYCUSBoost: Adaboost-Based Imbalanced Learning Using Dynamic Clustering and Undersampling.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"208-215","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/ChenDSZC18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00045","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00045","url":"https://dblp.org/rec/conf/dasc/ChenDSZC18"}, "url":"URL#2543660" }, { "@score":"1", "@id":"2543661", "info":{"authors":{"author":[{"@pid":"27/1328","text":"Hsing-bung Chen"},{"@pid":"20/1255","text":"Qiang Guan"},{"@pid":"57/2335","text":"Song Fu"}]},"title":"UNS: A Portable, Mobile, and Exchangeable Namespace for Supporting Fetch-from-Anywhere Big Data Eco-Systems.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"889-896","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/ChenGF18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00-12","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00-12","url":"https://dblp.org/rec/conf/dasc/ChenGF18"}, "url":"URL#2543661" }, { "@score":"1", "@id":"2543662", "info":{"authors":{"author":[{"@pid":"53/5475-2","text":"Fulong Chen 0002"},{"@pid":"26/2210","text":"Hao Shen"},{"@pid":"54/2062","text":"Cheng Wang"},{"@pid":"14/2320","text":"Le Xie"},{"@pid":"89/3574","text":"Shoujun Zhou"},{"@pid":"08/2190-1","text":"Hesheng Wang 0001"}]},"title":"The Model Experimental Evaluation of the Cardiovascular Interventional Surgery Robot System.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"114-120","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/ChenSWXZW18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00032","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00032","url":"https://dblp.org/rec/conf/dasc/ChenSWXZW18"}, "url":"URL#2543662" }, { "@score":"1", "@id":"2543663", "info":{"authors":{"author":[{"@pid":"228/9091","text":"Chunhua Chen"},{"@pid":"69/6353","text":"Junwei Yan"}]},"title":"HyTube: A Novel Middleware Layer for Smart Building Systems.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"135-142","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/ChenY18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00035","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00035","url":"https://dblp.org/rec/conf/dasc/ChenY18"}, "url":"URL#2543663" }, { "@score":"1", "@id":"2543664", "info":{"authors":{"author":[{"@pid":"12/5268","text":"Yi-Ting Chen"},{"@pid":"140/8372","text":"Chia-Cheng Yen"},{"@pid":"228/8991","text":"Yu-Tai Lin"},{"@pid":"23/6238","text":"Jia-Shung Wang"}]},"title":"Cooperative Caching Plan of Popular Videos for Mobile Users by Grouping Preferences.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"762-769","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/ChenYLW18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00132","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00132","url":"https://dblp.org/rec/conf/dasc/ChenYLW18"}, "url":"URL#2543664" }, { "@score":"1", "@id":"2543665", "info":{"authors":{"author":[{"@pid":"73/7187","text":"Xuejiao Chen"},{"@pid":"185/1060","text":"Jiahui Yu"},{"@pid":"70/6154","text":"Feng Ye"},{"@pid":"36/3184","text":"Pan Wang"}]},"title":"A Hierarchical Approach to Encrypted Data Packet Classification in Smart Home Gateways.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"41-45","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/ChenYYW18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00022","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00022","url":"https://dblp.org/rec/conf/dasc/ChenYYW18"}, "url":"URL#2543665" }, { "@score":"1", "@id":"2543666", "info":{"authors":{"author":[{"@pid":"228/9077","text":"Edren Dacaymat"},{"@pid":"29/4190","text":"Jun Zhang"},{"@pid":"19/1924","text":"Qi Wang"},{"@pid":"228/8997","text":"M. D. Alam Bhuiyan"},{"@pid":"83/7380","text":"Thaier Hayajneh"}]},"title":"Exploring Problems with Virtualization in Cloud Computing.","venue":"DASC/PiCom/DataCom/CyberSciTech","pages":"673-680","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/dasc/DacaymatZWBH18","doi":"10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00119","ee":"https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00119","url":"https://dblp.org/rec/conf/dasc/DacaymatZWBH18"}, "url":"URL#2543666" } ] } } } )