


default search action
ICA3PP 2015: Zhangjiajie, China
- Guojun Wang, Albert Y. Zomaya

, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part III. Lecture Notes in Computer Science 9530, Springer 2015, ISBN 978-3-319-27136-1
Applications of Parallel and Distributed Computing
- Wenbin Hu, Liping Yan, Huan Wang

, Bo Du:
On Exploring a Virtual Agent Negotiation Inspired Approach for Route Guidance in Urban Traffic Networks. 3-16 - Weihao Liang, Hong An, Feng Li, Yichao Cheng:

Optimization of Binomial Option Pricing on Intel MIC Heterogeneous System. 17-29 - Chunjiang Li, Yushan Dong, Kuan Li:

Stencil Computations on HPC-oriented ARMv8 64-Bit Multi-Core Processor. 30-43 - Chuangen Gao, Hua Wang, Fangjin Zhu, Linbo Zhai, Shanwen Yi:

A Particle Swarm Optimization Algorithm for Controller Placement Problem in Software Defined Network. 44-54 - Lei Li, Yonghua Xiong, Shufan Guo, Keyuan Jiang, Yongbing Tang:

A Streaming Execution Method for Multi-services in Mobile Cloud Computing. 55-67 - Qian Li, Weiguo Wu, Zeyu Sun, Lei Wang, Jianhang Huang:

Economy-Oriented Deadline Scheduling Policy for Render System Using IaaS Cloud. 68-78 - Qiang Lan, Namit Gaur, Johannes Langguth, Xing Cai

:
Towards Detailed Tissue-Scale 3D Simulations of Electrical Activity and Calcium Handling in the Human Cardiac Ventricle. 79-92 - Yizhuo Wang, Weixing Ji, Xu Chen, Sensen Hu:

Task Parallel Implementation of Matrix Multiplication on Multi-socket Multi-core Architectures. 93-104 - Yang Zhang, Dongwen Zhang, Weixing Ji, Yizhuo Wang:

Refactoring for Separation of Concurrent Concerns. 105-118 - Zhenchun Huang

, Guoqing Li:
Exploiting Scalable Parallelism for Remote Sensing Analysis Models by Data Transformation Graph. 119-133 - Md. Zakirul Alam Bhuiyan

, Guojun Wang, Jie Wu, Tian Wang, Xiangyong Liu:
Resource-Efficient Vibration Data Collection in Cyber-Physical Systems. 134-147 - Wenbin Jiang

, Zhiwei Lu, Hai Jin, Ye Chi:
A New Approach for Vehicle Recognition and Tracking in Multi-camera Traffic System. 148-161 - Yunxiang Zhao, Wanxin Zhang, Dongsheng Li, Zhen Huang:

DFIS: A Scalable Distributed Fingerprint Identification System. 162-175 - Runshui Zhu, Hua Wang, Yanqing Gao, Shanwen Yi, Fangjin Zhu:

Energy Saving and Load Balancing for SDN Based on Multi-objective Particle Swarm Optimization. 176-189 - Chen Yang, Jie Tang, Heng Gao, Gangshan Wu:

Pre-stack Kirchhoff Time Migration on Hadoop and Spark. 190-202 - Jen-Chieh Chang, Ting-Hsuan Chien, Rong-Guey Chang:

A Cyber Physical System with GPU for CNC Applications. 203-212 - Shuai Liu, Hua Wang, Shanwen Yi, Fangjin Zhu:

NCPSO: A Solution of the Controller Placement Problem in Software Defined Networks. 213-225 - Jiangang Wu, Chang Feng, Peihuan Gao, Shizhong Liao:

Parallel Column Subset Selection of Kernel Matrix for Scaling up Support Vector Machines. 226-239 - Lianyu Cao, Penghui Juan, Yinghua Zhang:

Real-Time Deconvolution with GPU and Spark for Big Imaging Data Analysis. 240-250 - Chao Li, Yida Wang, Changhai Zhao, Haihua Yan, Jianlei Zhang:

Parallel Kirchhoff Pre-Stack Depth Migration on Large High Performance Clusters. 251-266 - Shuai Pang, Rebecca J. Stones, Mingming Ren, Gang Wang, Xiaoguang Liu:

MrBayes for Phylogenetic Inference Using Protein Data on a GPU Cluster. 267-280 - Shijin Yuan, Yiwen Qian, Bin Mu:

Paralleled Continuous Tabu Search Algorithm with Sine Maps and Staged Strategy for Solving CNOP. 281-294
Service Dependability and Security in Distributed and Parallel Systems
- Chi Lin, Kun Liu, Bo Xu, Jing Deng, Chang-Wu Yu

, Guowei Wu:
VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs. 297-310 - Xiaojun Guo, Guang Cheng, Wubin Pan, Truong Dinhtu

, Yixin Liang:
A Novel Search Engine-Based Method for Discovering Command and Control Server. 311-322 - Jian Cao, Qiang Fu, Qiang Li, Dong Guo:

Leveraging Behavior Diversity to Detect Spammers in Online Social Networks. 323-336 - Xinpu Ji, Yuxiang Ma, Rui Ma, Peng Li, Jingwei Ma, Gang Wang, Xiaoguang Liu, Zhongwei Li:

A Proactive Fault Tolerance Scheme for Large Scale Storage Systems. 337-350 - Jue Chen, Jinbang Chen, Fei Xu, Min Yin, Wei Zhang:

When Software Defined Networks Meet Fault Tolerance: A Survey. 351-368 - Jie Wang, Xiaoxian He:

A Novel Signature Generation Approach for Polymorphic Worms. 369-382 - Jing Wang, Chuanhe Huang, Jinhai Wang:

Scalable Access Policy for Attribute Based Encryption in Cloud Storage. 383-402 - Chi Lin, Guowei Wu, Xiaochen Lai, Tie Qiu:

Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks. 403-416 - Shaobo Zhang

, Qin Liu, Guojun Wang:
Deviation-Based Location Switching Protocol for Trajectory Privacy Protection. 417-428 - Chonghua Wang, Xiao-chun Yun, Zhiyu Hao, Lei Cui, Yandong Han, Qingxin Zou:

Exploring Efficient and Robust Virtual Machine Introspection Techniques. 429-448 - Teng Li, Jianfeng Ma, Cong Sun

:
CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks. 449-462 - Entao Luo, Qin Liu, Guojun Wang:

NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks. 463-474 - Nianyuan Bao, Jie Tang, Xiaoyu Zhang, Gangshan Wu:

A New Data Replication Scheme for PVFS2. 475-491 - Fang Qi, Wenbo Wang:

Efficient Private Matching Scheme for Friend Information Exchange. 492-503 - Hongbo Han, Zhenxiang Chen, Qiben Yan

, Lizhi Peng, Lei Zhang:
A Real-time Android Malware Detection System Based on Network Traffic Analysis. 504-516 - Houwu Chen, Jiwu Shu:

Sky: Opinion Dynamics Based Consensus for P2P Network with Trust Relationships. 517-531 - Chun-hua Li, Ronglei Wei, Zebang Wu, Ke Zhou, Cheng Lei, Hao Jin:

Adopting Multi-mode Access Control for Secure Data Sharing in Cloud. 532-546 - Zheng Yan

, Wenxiu Ding
, Haiqi Zhu:
A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud. 547-561 - Xuhui Liu, Qin Liu, Tao Peng, Jie Wu:

HCBE: Achieving Fine-Grained Access Control in Cloud-Based PHR Systems. 562-576 - Lei Cui, Zhiyu Hao, Lun Li, Haiqiang Fei, Zhenquan Ding, Bo Li, Peng Liu:

Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications. 577-596 - Sheng Huo, Dafang Zhang, Yanbiao Li:

Fast and Scalable Regular Expressions Matching with Multi-Stride Index NFA. 597-610 - Jian Zhang, Ya-Wei Zhang, Jian-Biao He, Ou Jin:

A Robust and Efficient Detection Model of DDoS Attack for Cloud Services. 611-624 - GuanJun Liu, Changjun Jiang:

Secure Bisimulation for Interactive Systems. 625-639 - Shiming He, Weini Zeng, Kun Xie:

Privacy Preserving for Network Coding in Smart Grid. 640-654 - Xiaoyu Zhu, Qin Liu, Guojun Wang:

Verifiable Dynamic Fuzzy Search Over Encrypted Data in Cloud Computing. 655-666 - Hui Yin, Zheng Qin, Jixin Zhang, Lu Ou, Qin Liu, Yupeng Hu, Huigui Rong:

A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data. 667-681 - Guangquan Xu, Yuanyuan Ren, Bin Liu, Gaoxu Zhang, Xiaohong Li, Zhiyong Feng:

PEM4RFID: Privacy Enhancement Model for RFID Systems. 682-694 - Xin Liao

, Guoyong Chen, Qi Li, Jun Liu:
Improved WOW Adaptive Image Steganography Method. 695-702 - Lu Shen, Shifang Feng, Jinjin Sun, Zhongwei Li, Gang Wang, Xiaoguang Liu:

CloudS: A Multi-cloud Storage System with Multi-level Security. 703-716 - Robert Schadek, Oliver E. Theel:

Crossing - A Highly Available Quorum Protocol for Arbitrary Planar Topologies. 717-728 - Masayuki Arai, Shingo Inuyama, Kazuhiko Iwasaki:

Note on Fast Bridge Fault Test Generation Based on Critical Area. 729-740 - Yuan Yao, Pan He, Zhihao Zheng, Chun Tan, Yue Yuan:

Joint Redundancy and Inspection-Based Maintenance Optimization for Series-Parallel System. 741-755 - Zahra Shirmohammadi

, Seyed Ghassem Miremadi:
Addressing NoC Reliability Through an Efficient Fibonacci-Based Crosstalk Avoidance Codec Design. 756-770 - Yung-Li Hu, Yuo-Yu Cho, Wei-Bing Su, David S. L. Wei, Yennun Huang

, Jiann-Liang Chen, Ing-Yi Chen, Sy-Yen Kuo
:
A Programming Framework for Implementing Fault-Tolerant Mechanism in IoT Applications. 771-784 - Sridhar Adepu, Aditya Mathur, Jagadeesh Gunda, Sasa Z. Djokic:

An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems. 785-798

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














