


default search action
HPCCT 2018: Beijing, China
- Proceedings of the 2nd High Performance Computing and Cluster Technologies Conference, HPCCT 2018, Beijing, China, June 22-24, 2018. ACM 2018, ISBN 978-1-4503-6485-0

Data Theory and Processing Methods
- Jianguo Jiang, Xuebin Yuan, Rui Mao:

Research on Role Mining Algorithms in RBAC. 1-5 - Xinjie Yu, Wentao Chen, Jiajia Miao, Jian Chen, Handong Mao, Qiong Luo

, Lin Gu:
The Construction of Large Graph Data Structures in a Scalable Distributed Message System. 6-10 - Meng-Hsiun Tsai, Kai-Cheng Chuan, Jeng-Jer Shieh

, Chia-Tsen Tsai, Yong Zhi Huang
, Tu-Wei Li:
Microarray Data Analysis and Model Construction Based on Oversampling Approach and Decision Tree. 11-14 - Tae Jong Choi, Yeonju Lee:

Asynchronous Differential Evolution with Strategy Adaptation for Global Numerical Optimization. 15-18 - Xian-hong Fei, Chenggong Zhai, Han Qiao:

Research on Clothing and Accouterment Security Based on Big Data. 19-23
Image Processing and Applications
- Akinori Adachi, Tad Gonsalves:

White Lane Detection Using Semantic Segmentation. 24-26 - Hong Zhang, Shiqiang Hu:

An Improved Fast Visual Odometry Based on Semi-probabilistic Trimmed ICP. 27-32
Sensor Technology and Sensor Networks
- Yu-Ning Chen, Chiuyuan Chen:

Sensor Deployment under Probabilistic Sensing Model. 33-36 - Shipu Xu, Yunsheng Wang, Yong Liu, Weixiong Rao, Mingzhou Ma, Jingyin Zhao, Chenxi Zhang:

Research on WSN Routing Algorithm for Vegetable Greenhouse. 37-42 - Abdul Fuad Abdul Rahman, Azni Haslizan Ab Halim

, Najwa Hayaati Mohd Alwi
, Kamaruzzaman Seman Alwi, Farhan Arif Mohamad, Mohamad Nasrul Taufiq, Madihah Zulfa Mohamad, Khairul Azri Zainal Abidin:
Measuring Sensor to Cloud Energy Consumption. 43-47
Computer Science and Information Technology
- Siyu Liu, Chiuyuan Chen, Wu-Hsiung Lin:

A Suggestion of a New Measure of Importance of Nodes in Disease-propagation Graphs. 48-52 - Xuechao Li, Po-Chou Shih:

Performance Comparison of CUDA and OpenACC Based on Optimizations. 53-57 - Tao Feng, Weiyou He:

Research on Privacy Preserving of Searchable Encryption. 58-68 - Mohammad Hashem Haghighat, Zhe Fu, Jun Li:

HES: Highly Efficient and Scalable Technique for Matching Regex Patterns. 69-78 - Zhang Ying:

A Multitask Conflict Resolution Spatio-temporal Access Control Model. 79-84 - Nurcholis Ramlan, Zainal A. Hasibuan:

Information System Strategic Planning for Local Government Based on Business Model Canvas: A Case Study at Lebak Regency. 85-89 - Sara Benyahia, Hanane Houmani, Abdelwahed Namir

:
MARSC: A Macro-Architecture for Smart Cities. 90-97
Industrial Information and Electronic Technology
- Jiyao Chen, Tad Gonsalves:

Autonomous Highway Car Following System Based on Fuzzy Control. 98-101 - Budan Wu, Rongheng Lin, Ran Liu:

DMOMVP: A Business-Process-Oriented Data Model Optimization Method Based on Database Vertical Partition. 102-108 - Meiryani

, Azhar Susanto:
The Influence of Information Technology on the Quality of Accounting Information System. 109-115 - Shing-Cheng Wang, Hsien-Sen Hung, Hoang-Yang Lu:

A Novel Two-Stage Fusion Detector Based on Maximum Ratio Combining and Max-Log Rules. 116-120

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














