


default search action
ICA3PP 2018: Guangzhou, China - Workshops
- Ting Hu, Feng Wang, Hongwei Li, Qian Wang:

Algorithms and Architectures for Parallel Processing - ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings. Lecture Notes in Computer Science 11338, Springer 2018, ISBN 978-3-030-05233-1
ICA3PP 2018 Workshop on Intelligent Algorithms for Large-Scale Complex Optimization Problems
- Bhavesh N. Gohil, Dhiren R. Patel:

An improved Grey Wolf Optimizer (iGWO) for Load Balancing in Cloud Computing Environment. 3-9 - Decheng Miao

, Jianqing Xi
:
Indexed Coinduction in a Fibrational Setting. 10-16 - Leisheng Li, Qiao Sun, Xin Liu, Changmao Wu, Haitao Zhao, Changyou Zhang:

Porting and Optimizing VASP on the SW26010. 17-26 - Hongjie Li, Yanhui Ding, Weizhi Xu

, Hui Yu, Li Sun:
A Data Reuse Method for Fast Search Motion Estimation. 27-33 - Senlin Cheng, Liutong Xu:

I-Center Loss for Deep Neural Networks. 34-44 - Min Cui, Fengtong Mei, Qiangyi Li

, Qiangnan Li:
Nodes Deployment Optimization Algorithm of Underwater Wireless Sensor Networks. 45-50 - Tong-Bo Wang:

A Novel Kernel Clustering Method for SVM Training Sample Reduction. 51-58 - Jun Wang, Junsheng Jiao:

Implementation of Beamforming for Large-Scale Circular Array Sonar Based on Parallel FIR Filter Structure in FPGA. 59-65 - Bo Zhao

, Yingying Li, Lin Han, Jie Zhao, Wei Gao, Rongcai Zhao, Ramin Yahyapour
:
A Practical and Aggressive Loop Fission Technique. 66-75 - Ping Du, Jinhuan Zhang, Jun Long:

Super-Sampling by Learning-Based Super-Resolution. 76-83 - Xiaoli Song, Yunzhan Gong, Dahai Jin, Qiangyi Li

, Hengchang Jing
:
Nodes Deployment Optimization Algorithm Based on Improved Evidence Theory. 84-89 - Feng Ye, Zongfei Jing, Qian Huang, Cheng Hu, Yong Chen:

The Research and Implementation of a Distributed Crawler System Based on Apache Flink. 90-98
ICA3PP 2018 Workshop on Security and Privacy in Data Processing
- Sun Yanan, Shen Jie, Yang Zhou:

A Security Reinforcement Technology of Telematics Box Based on Secure Element. 101-116 - Youli Fang, Hong Wang, Ruitong Di, Lutong Wang, Jin Li:

Detecting Fake Reviews Based on Review-Rating Consistency and Multi-dimensional Time Series. 117-123 - Ruitong Di, Hong Wang, Youli Fang, Ying Zhou:

Fake Comment Detection Based on Time Series and Density Peaks Clustering. 124-130 - Tuo Wang, Lu Liu, Chongzhi Gao, Jingjing Hu, Jingyu Liu:

Towards Android Application Protection via Kernel Extension. 131-137 - Zeping Li, Huwei Liu

, Ning Cao:
Threats and Coping Strategies Under the IOT. 138-144 - Huwei Liu

, Zeping Li, Ning Cao:
Framework Design of Financial Service Platform for Tobacco Supply Chain Based on Blockchain. 145-150 - Lili Sun, Zhaochan Li, Ning Cao, Li Zhou:

Research on Application of Logistics Service Quality Management Based on Blockchain. 151-157 - Jing Liu, Zhaochan Li, Lili Sun, Jinlong Wang, Ning Cao:

Research on the Application of RFID Technology in Logistics Warehousing Management System. 158-164 - Ruomeng Xu

, Jieren Cheng, Fengkai Wang
, Xiangyan Tang, Jinying Xu:
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment. 165-176 - Lijuan Zheng, Yunjia Zhang, Rui Zhang, Jianyou Chen, Meng Cui, Chunlei Song:

An Improved Authentication Protocol in Telemedicine System. 177-184 - Jing Lu, Yuxiang Chen, Hui Tian

, Yonghong Chen, Tian Wang
, Yiqiao Cai:
Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data. 185-191 - Fangping Li, Wei Zhang

, Heng Liu, Maosheng Zhang:
Feature Extraction of Dichotomous Equipment Based on Non-intrusive Load Monitoring and Decomposition. 192-200

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














