


default search action
ACM TUR-C 2017: Shanghai, China
- John C. S. Lui, Xinbing Wang, Alexander Wolf, Yunhao Liu, Chuanping Hu:

Proceedings of the ACM Turing 50th Celebration Conference - China, TUR-C 2017, Shanghai, China, May 12-14, 2017. ACM 2017, ISBN 978-1-4503-4873-7 - Ming Zhang

, Jile Zhu:
A data-driven analysis of student efforts and improvements on a SPOC experiment. 1:1-1:6 - Xiaohua Tian, Jiaqi Liu, Xinbing Wang:

Streamline architecture of network simulator to facilitate teaching of computer networking. 2:1-2:6 - Yuxiang Zhang, Yu Chen, Xiaojian Ma, Yuhan Tang, Yilin Niu, Shanshan Li, Weidong Liu:

Remote FPGA lab platform for computer system curriculum. 3:1-3:6 - Yunfan Chen, Ming Zhang

:
MOOC student dropout: pattern and prevention. 4:1-4:6 - Yao Guo

, Junlin Lu, Yifeng Chen, Ming Zhang
, Wenxin Li:
Hybrid small class teaching: dividing and conquering large computer systems classes. 5:1-5:6 - Haoyu Zhou, Yushan Zhou, Haifeng Zhang, Houjun Huang

, Wenxin Li:
Botzone: a competitive and interactive platform for game AI education. 6:1-6:5 - Yu Zhang, Xianglan Chen, Xin An, Jianliang Lu, Xuejun Li, Xuehai Zhou:

Building step-by-step practical curriculum system for computer systemic ability training. 7:1-7:6 - Bin Xu, Kexin Li

, Kening Gao, Changkuan Zhao, Ge Yu, Jinshuang Li:
Matrix completion for SPOC student peer-grading evaluation. 8:1-8:6 - Ruobin Wang, Fengxia Li, Nannan Cheng, Bin Xiao, Jiandong Wang, Chuntao Du:

How does web-based virtual reality affect learning: evidences from a quasi-experiment. 9:1-9:7 - Maoyang Zou, Xi Wu:

Research on quantitative quality evaluation method based on double cycles. 10:1-10:5 - Qiang Liu, Wentao Zhao, Dan Liu, Jiao Ji:

Evaluation of situational case-based teaching technique in engineering education. 11:1-11:7 - Bo Li, Xiaobin Zhang, Ning Wu:

Teaching evaluation for computational-thinking-oriented elementary computer courses. 12:1-12:6 - Hongzhi Wang

, Hong Gao, Shengjun Yin, Jie Zhu:
The design of course architecture for big data. 13:1-13:6 - Shumin Shi, Heyan Huang, Jun Zheng:

From the perspective of teaching scheme: cultivating and training undergraduates driven by engineering education accreditation. 14:1-14:4 - Jumin Zhao, Shimin Huo, Yanxia Li, Dengao Li, Xinyan Liu, Jie Zhou:

Tide and shock: the influential modern teaching methods on chinese education reform. 15:1-15:6 - Yanchun Sun, Chao Xin:

Using coursera clickstream data to improve online education for software engineering. 16:1-16:6 - Xiaoou Ding, Hongzhi Wang

, Yitong Gao, Jianzhong Li, Hong Gao:
Determining the currency of dynamic data. 17:1-17:6 - Yaoqiang Xu, Yongqing Xie, Jianhua Feng:

Correlation analysis between electricity consumption and economic development. 18:1-18:6 - Amina Belhassena, Hongzhi Wang:

Distributed skyline trajectory query processing. 19:1-19:7 - Haiquan Wang:

An APCA-enhanced compression method on large-scale time-series data. 20:1-20:6 - Ning Yin, Hongyan Li, Hanchen Su:

CLR: coupled logistic regression model for CTR prediction. 21:1-21:9 - Bing Xiao, Jinwei Guo, Weining Qian, Huiqi Hu, Aoying Zhou:

NIOSIT: efficient data access for log-structured merge-tree style storage systems. 22:1-22:10 - Huiying Wang, Jianhua Feng:

FlashSkipList: indexing on flash devices. 23:1-23:10 - Yun Ma

, Qing Li, Zhenguo Yang, Wenyin Liu, Antoni B. Chan
:
Learning word embeddings via context grouping. 24:1-24:10 - Chuan Li, Zhiheng Jiang, Yijie Li, Yangfan Miao, Daiyan Hu, Guangming Liu, Yijing Liu:

NANI: an efficient community detection algorithm based on nested aggregation of node influence. 25:1-25:10 - Nathan Scrivens, Xiaodong Lin:

Android digital forensics: data, extraction and analysis. 26:1-26:10 - Kai Fan, Hui Li, Wei Jiang, Chengsheng Xiao, Yintang Yang:

U2F based secure mutual authentication protocol for mobile payment. 27:1-27:6 - Jieqiong Hou, Haifeng Qian:

Collaboratively filtering malware infections: a tensor decomposition approach. 28:1-28:7 - Yunxia Feng, Xu Li, Bo Song:

(k, R, r)-anonymity: a light-weight and personalized location protection model for LBS query. 29:1-29:7 - Shuang Liang, Yue Zhang, Bo Li, Xiaojie Guo, Hao Guo, Xiaoyun He, Zheli Liu, Chunfu Jia:

ShadowPWD: practical browser-based password manager with a security token. 30:1-30:6 - Bo Fu, Yang Xiao

, Hui Chen
:
FNF: flow-net based fingerprinting. 31:1-31:5 - Liang He, Zhixiang Li, Chao Shen

:
Performance evaluation of anomaly-detection algorithm for keystroke-typing based insider detection. 32:1-32:7 - Huaxin Li, Qingrong Chen, Haojin Zhu

, Di Ma
:
Hybrid de-anonymization across real-world heterogeneous social networks. 33:1-33:7 - Ningjia Fu, Jianzhong Zhang, Wenping Yu, Changhai Wang:

Crowdsourcing-based wifi fingerprint update for indoor localization. 34:1-34:9 - Huikang Li, Yi Gao, Wei Dong, Chun Chen:

Taming both predictable and unpredictable link failures for network tomography. 35:1-35:10 - Xiaoshan Yu, Hong Xu

, Huaxi Gu:
Thor: a server-level hybrid switching data center network with heterogeneous topologies. 36:1-36:10 - Yi Wang, Zhuyun Qi, Kai Lei

, Bin Liu, Chen Tian:
Preventing "bad" content dispersal in named data networking. 37:1-37:8 - Xiaohua Tian, Jiaqi Liu, Wei Liu, Yu Cheng

, Lijun Ou, Zilong Zhao:
Security analysis of Bloom filter based multicast forwarding. 38:1-38:10 - Shuzhuang Zhang, Hao Luo, Zhi-Gang Wu, Yi Wang:

Composed sketch framework for quantiles and cardinality queries over big data streams. 39:1-39:10 - Lei Xu, Ke Xu, Meng Shen, Kui Ren, Jingyuan Fan, Chaowen Guan, Wenlong Chen:

MINOS: regulating router dataplane actions in dynamic runtime environments. 40:1-40:10 - Cunlu Li, Dezun Dong, Xiangke Liao:

Exploiting contention and congestion aware switch allocation in network-on-chips. 41:1-41:10 - Jiandian Zeng, Tian Wang, Md. Zakirul Alam Bhuiyan

:
Cooperative relay tracking with multiple mobile camera sensors. 42:1-42:7 - Liang Liu, Huadong Ma, Bo Chen, Wenbo Yang:

GlobeSen: an open interconnection framework based on named sensory date for IoT. 43:1-43:10 - Xiaolei Zhou, Deke Guo, Xiaoqiang Teng:

MagSpider: a localization-free approach for constructing global indoor map for navigation purpose. 44:1-44:10 - Yubo Yan, Panlong Yang, Xiang-Yang Li, Yafei Zhang:

COFFEE: coexist wifi for ZigBee networks: a frequency overlay approach. 45:1-45:6 - Chunbin Lin, Jianguo Wang, Chuitian Rong

:
Towards heterogeneous keyword search. 46:1-46:6 - Chunlin Xu, Shengli Wu:

The early fusion strategy for search result diversification. 47:1-47:6 - Haoyang Zhu, Peidong Zhu, Xiaoyong Li

, Qiang Liu:
Computing skyline groups: an experimental evaluation. 48:1-48:6 - Cai Fu, Chenchen Peng, Xiao-Yang Liu:

Search engine drives the evolution of social networks. 49:1-49:5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














