


default search action
37th IPCCC 2018: Orlando, FL, USA
- 37th IEEE International Performance Computing and Communications Conference, IPCCC 2018, Orlando, FL, USA, November 17-19, 2018. IEEE 2018, ISBN 978-1-5386-6808-5

- Abdel-Hameed A. Badawy, Jesus Gardea, Yuho Jin, Jonathan E. Cook:

3D-PIM NoCs with Multiple Subnetworks: A Performance and Power Evaluation. 1-8 - Guoshun Nan, Xiuquan Qiao, Jiting Wang, Zeyan Li

, Jiahao Bu, Changhua Pei, Mengyu Zhou, Dan Pei
:
The Frame Latency of Personalized Livestreaming Can Be Significantly Slowed Down by WiFi. 1-8 - Xingsheng Zhao, Jingwen Shi, Mingzhe Du

, Fan Ni, Song Jiang, Yang Wang:
A Road-Aware Spatial Mapping for Moving Objects. 1-8 - Haipeng Du, Weizhan Zhang, Xuanyu Wang

, Qinghua Zheng:
Integrated Bandwidth Variation Pattern Differentiation for HTTP Adaptive Streaming over 4G Cellular Networks. 1-9 - Tim Bisson, Ke Chen, Changho Choi, Vijay Balakrishnan, Yang-Suk Kee:

Crail-KV: A High-Performance Distributed Key-Value Store Leveraging Native KV-SSDs over NVMe-oF. 1-8 - Shrikant S. Jadhav

, Clay Gloster, Christopher C. Doss, Youngsoo Kim, Jannatun Naher:
AutoRARE: An Automated Tool For Generating FPGA-Based Multi-Memory Hardware Accelerators For Compute-Intensive Applications. 1-8 - Fan Ni, Xingbo Wu, Weijun Li, Song Jiang:

ThinDedup: An I/O Deduplication Scheme that Minimizes Efficiency Loss due to Metadata Writes. 1-8 - Debashri Roy, Tathagata Mukherjee, Mainak Chatterjee, Eduardo L. Pasiliao:

Adaptive Video Encoding and Dynamic Channel Access for Real-time Streaming over SDRs. 1-9 - Zhi Cao

, Honggang Zhang, Benyuan Liu:
Performance and Stability of Application Placement in Mobile Edge Computing System. 1-8 - Tianye Yang, Dezun Dong, Cunlu Li, Liquan Xiao

:
BFRP: Endpoint Congestion Avoidance Through Bilateral Flow Reservation. 1-8 - Faustina J. Anto Morais, Swapnoneel Roy, Sanjay P. Ahuja:

A Cache Based DoS Attack on Real Information Centric Networking System. 1-7 - Hongyu Zhou, Jiagao Wu, Lu Shen, Linfeng Liu:

Vehicle Delay-tolerant Network Routing Algorithm based on Multi-period Bayesian Network. 1-8 - Ting Li, Zhijin Qiu

, Lijuan Cao, Hanshang Li, Zhongwen Guo, Fan Li, Xinghua Shi, Yu Wang:
Participant Grouping for Privacy Preservation in Mobile Crowdsensing over Hierarchical Edge Clouds. 1-8 - J. J. Garcia-Luna-Aceves:

Implementing Correct and Efficient Collision Avoidance in Multi-Hop Ad-Hoc Networks. 1-10 - Sulav Malla, Ken Christensen:

Choosing the Best Server for a Data Center: The Importance of Workload Weighting. 1-8 - Guangjing Wang, Lan Zhang, Zhi Yang, Xiang-Yang Li:

Socialite: Social Activity Mining and Friend Auto-labeling. 1-8 - Lei Wang, Qing Li, Lu Liu, Yong Jiang, Mingwei Xu, Jianping Wu:

S5: An Application Sensitive QoS Assurance System via SDN. 1-8 - Jingxiu Su, Zhenyu Li, Stéphane Grumbach, Muhammad Ikram

, Kavé Salamatian
, Gaogang Xie:
Web Tracking Cartography with DNS Records. 1-8 - Madhuri Siddula, Zhipeng Cai

, Dongjing Miao:
Privacy Preserving Online Social Networks using Enhanced Equicardinal Clustering. 1-8 - Raed Alsurdeh

, Rodrigo N. Calheiros, Kenan M. Matawie
, Bahman Javadi:
Cloud Resource Provisioning for Combined Stream and Batch Workflows. 1-8 - Shumin Cao, Xin He, Peide Zhu, Mingshi Chen, Xiangyang Li, Panlong Yang:

iPand: Accurate Gesture Input with Ambient Acoustic Sensing on Hand. 1-8 - Zhi Cao

, Honggang Zhang, Benyuan Liu, Bo Sheng
:
A Game-theoretic Framework for Revenue Sharing in Edge-Cloud Computing System. 1-8 - Walid Mokhtar Bennaceur

, Leïla Kloul:
Reliability and Performance Analysis of a Data Center's Network Architecture. 1-8 - Zeyan Li

, Wenxiao Chen
, Dan Pei
:
Robust and Unsupervised KPI Anomaly Detection Based on Conditional Variational Autoencoder. 1-9 - Go Nakagawa, Yusuke Ito, Yurino Sato, Hiroyuki Koga:

An Effective Scheme to Utilize Caches for Streaming Services in Mobile CCN. 1-2 - Yang Zhang, Daniel Zhang, Qi Li, Dong Wang:

Towards Optimized Online Task Allocation in Cost-Sensitive Crowdsensing Applications. 1-8 - Qian Wang, Zhipeng Gao, Xiaojiang Du, Liehuang Zhu:

An Optimal LTE-U Access Method for Throughput Maximization and Fairness Assurance. 1-8 - Baihong Chen, Hongwei Du, Chuang Liu, Qiang Ye

:
On the Impact of Sweep Radius and Energy Limitation on Sweep Coverage in Wireless Sensor Networks. 1-7 - Jiayu Gan, Jianhui Zhang, Siwen Zheng:

Where You Really Are: User Trip Based City Functional Zone Ascertainment. 1-8 - Yi Yue

, Bo Cheng:
EasyOrchestrator: A NFV-based Network Service Creation Platform for End-users. 1-2 - Guolin Sun, Gebrekidan Tesfay Zemuy, Kun Xiong:

Dynamic Reservation and Deep Reinforcement Learning based Autonomous Resource Management for wireless Virtual Networks. 1-4 - (Withdrawn) HCache: A Hybrid Caching Strategy in Information-Centric Networking. 1-2

- Dongbiao He

, Jinlei Jiang, Guangwen Yang, Cédric Westphal:
CODA: Achieving Multipath Data Transmission in NDN. 1-8 - Kenneth Lamar, Ramin Izadpanah, Jim M. Brandt, Damian Dechev:

An Efficient Latch-free Database Index Based on Multi-dimensional Lists. 1-2 - Yulong Zhan, Jihong Zhu

:
A More Scalable Scheduling Algorithm for FPGA-based Time-Triggered Network. 1-2 - Dongxiao Yu, Longlong Lin

, Yong Zhang, Jiguo Yu, Yifei Zou, Qiang-Sheng Hua, Xiuzhen Cheng:
Fully Dynamic Broadcasting under SINR. 1-8 - Junjiao Liu, Libo Yin, Yan Hu, Shichao Lv, Limin Sun:

A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition. 1-8 - Quanquan Chu, Shiyu Liu, Xiaofeng Gao, Fan Wu, Guihai Chen

, Qianni Deng:
Binoclt: A New Binomial Classification Scheme for Long-Text Mining in Online Social Network. 1-8 - Zirui Zhuang

, Jingyu Wang
, Qi Qi, Haifeng Sun, Jianxin Liao:
A Case-Based Decision System for Routing in Packet-Switched Networks. 1-2 - Tianming Yang, Haitao Wu, Wei Sun:

GD-FTL: Improving the Performance and Lifetime of TLC SSD by Downgrading Worn-out Blocks. 1-8 - Jian Wang

, Yongxin Liu, Alfaidi Amal, Houbing Song
, Richard S. Stansbury
, Jiawei Yuan, Tianyu Yang:
Fountain Code Enabled ADS-B for Aviation Security and Safety Enhancement. 1-7 - Weidong Zhang, Hong Li, Hui Wen, Hongsong Zhu, Limin Sun:

A graph neural network based efficient firmware information extraction method for IoT devices. 1-8 - Yang Liu, Ying Zhang, Jianfeng Guan, Changqiao Xu, Yu Wang:

When Group Buying Meets Wi-Fi Advertising. 1-8 - Kuldip Singh Atwal, Mostafa A. Bassiouni:

DeepSDN: Connecting the Dots Towards Self-driving Networks. 1-8 - Ghanshyam Bhutra, Amar A. Rasheed, Rabi N. Mahapatra:

Privacy-Preserving ECG based Active Authentication (PPEA2) for IoT Devices. 1-7 - Yaodong Huang, Fan Ye, Yuanyuan Yang

:
Peer Data Caching Algorithms in Large-Scale High-Mobility Pervasive Edge Computing Environments. 1-8 - Zhiqiang Guo, Xiaodong Dong, Sheng Chen, Xiaobo Zhou, Keqiu Li:

How to Set Timeout: Achieving Adaptive Load Balance in Asymmetric Topology Based on Flowlet Switching. 1-6 - Sen Wang, Biao Zhang:

Centralized In-network Caching for Information Centric Networking with Decoupling Data and Control Planes. 1-2 - Gabriel Meyer-Lee, Jiacheng Shang, Jie Wu:

Location-leaking through Network Traffic in Mobile Augmented Reality Applications. 1-8 - Hao Zhang, Shumin Dai, Yongdan Li, Wenjun Zhang:

Real-time Distributed-Random-Forest-Based Network Intrusion Detection System Using Apache Spark. 1-7 - Dingde Jiang, Yihang Zhang, Houbing Song

, Wenjuan Wang:
Intelligent Optimization-Based Energy-Efficient Networking in Cloud Services for Multimedia Big Data. 1-6 - Amardeep Mehta, Ewnetu Bayuh Lakew, Johan Tordsson, Erik Elmroth:

Utility-based Allocation of Industrial IoT Applications in Mobile Edge Clouds. 1-10 - Suzhen Wang, Jingjing Luo, Yuan-Hsun Lo

, Wing Shing Wong:
Forwarding and Optical Indices in an All-Optical BCube Networks. 1-8 - Haitao Wang, Zhanhuai Li, Xiao Zhang, Xiaonan Zhao, Xingsheng Zhao, Weijun Li, Song Jiang:

OC-Cache: An Open-channel SSD Based Cache for Multi-Tenant Systems. 1-6 - Weilan Lin, Meng Ma, Disheng Pan, Ping Wang:

FacGraph: Frequent Anomaly Correlation Graph Mining for Root Cause Diagnose in Micro-Service Architecture. 1-8 - Lanying Guo, Chao Peng, Siyuan Chen, Cheng He:

Reversible Programming Techniques for Shortest-Path Algorithms. 1-2 - Chao Liu, Jianan Li, Min Yu, Gang Li

, Bo Luo
, Kai Chen, Jianguo Jiang, Weiqing Huang:
URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls. 1-7 - Jiachen Yang, Qiming Zhao, Chang Wang, Bin Jiang, Tianyuan Zhang, Houbing Song

:
Oceanic Data Processing System Based on Multi-sensor Interaction through Internet of Things. 1-8 - Jiang Zhi, Jun Li, Haibo Wu

, Yongmao Ren
:
GAC: Gain-Aware 2-Round Cooperative Caching Approach in Information-Centric Networking. 1-8 - Suhan Jiang, Jie Wu:

2-Dominant Resource Fairness: Fairness-Efficiency Tradeoffs in Multi-resource Allocation. 1-8 - Pinglan Liu, Wensheng Zhang:

A New Game Theoretic Scheme for Verifiable Cloud Computing. 1-8 - Ionut Cardei, Mihaela Cardei, Rafael Papa:

UAV-enabled Data Gathering in Wireless Sensor Networks. 1-8 - Nafiseh Sharghivand, Farnaz Derakhshan

, Lena Mashayekhy:
QoS-Aware Matching of Edge Computing Services to Internet of Things. 1-8 - Yaobin Qin, Brandon Hoffmann, David J. Lilja:

HyperProtect: Enhancing the Performance of a Dynamic Backup System Using Intelligent Scheduling. 1-8 - Jonghyun Kim, Stephan Bohacek, Pratik K. Biswas, Siamak Samoohi, Sharon J. Mackey, Mitesh P. Patel:

Friendly-Jamming-Aware Routing Protocols for Tactical Networks. 1-6 - Jingrong Wang, Kaiyang Liu, George Tzanetakis

, Jianping Pan
:
Learning-based Cooperative Sound Event Detection with Edge Computing. 1-8 - Sajad Sameti, Mea Wang, Diwakar Krishnamurthy:

Stride: Distributed Video Transcoding in Spark. 1-8 - Rixin Xu, Qiang Zeng, Liehuang Zhu, Haotian Chi, Xiaojiang Du:

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study. 1-8 - Adriana Collaguazo Jaramillo

, Ronny Alcivar, Joffre Pesantez, Ronald Ponguillo
:
Cost Effective test-bed for Comparison of SDN Network and Traditional Network. 1-2 - Tong Shen, Xinyi Zhang

, Gaogang Xie, Yuanmei Meng, Dafang Zhang:
CoDE: Fast Name Lookup and Update using Conflict-driven Encoding. 1-8 - Shuyi Zhang, Shiran Pan, Wei Wang, Qiongxiao Wang:

A Fast Secure Outsourcing of Ridge Regression Based on Singular-Value Decomposition. 1-8 - Zhen Chen

, Jianxin Lin, Sen Liu, Jun Xia
, Weiping Li:
Decouple and Stretch: A Boost to Channel Pruning. 1-6 - Chengshang Hou, Junzheng Shi, Cuicui Kang, Zigang Cao, Xiong Gang:

Classifying User Activities in the Encrypted WeChat Traffic. 1-8 - Pouya Ostovari, Jie Wu, Alireza Jolfaei

:
Data Exchange in Delay Tolerant Networks using Joint Inter- and Intra-Flow Network Coding. 1-8 - Sen Wang, Biao Zhang:

On the Use of Q-Learning to Solve the Selectable Virtual Network Embedding Problem. 1-2 - Donghe Li, Qingyu Yang, Wei Yu

, Dou An, Xinwen Fu
:
Towards Incentive Mechanism for Taxi Services Allocation with Privacy Guarantee. 1-8 - Shuting Xu, Shuhua Lai, Yongjian Li:

A Deep Learning Based Framework for Cloud Masquerade Attack Detection. 1-2 - Hao Yan, Armin Haj Aboutalebi, Lide Duan:

Efficient Allocation and Heterogeneous Composition of NVM Crossbar Arrays for Deep Learning Acceleration. 1-8 - Yanal Alahmad

, Tariq Daradkeh
, Anjali Agarwal:
Availability-Aware Container Scheduler for Application Services in Cloud. 1-6 - Shohei Karaguchi, Kazuya Sakai, Satoshi Fukumoto:

Quality-Aware Task Assignment in Opportunistic Network-Based Crowdsourcing. 1-7 - Maria Valero, Fangyu Li, WenZhan Song

, Xiangyang Li:
Imaging Subsurface Civil Infrastructure with Smart Seismic Network. 1-8 - Jiahao Bu, Ying Liu, Shenglin Zhang

, Weibin Meng, Qitong Liu, Xiaotian Zhu, Dan Pei
:
Rapid Deployment of Anomaly Detection Models for Large Number of Emerging KPI Streams. 1-8 - Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac

, Kemal Akkaya:
U-PoT: A Honeypot Framework for UPnP-Based IoT Devices. 1-8 - Xiaokun Zhang, Yan Liu, Jing Chen:

Network Embedding based on External Word Vectors. 1-2 - Yuhua Guo, Weijun Xiao, Qing Liu, Xubin He:

A Cost-effective and Energy-efficient Architecture for Die-stacked DRAM/NVM Memory Systems. 1-2 - Wenjie Yang, Guodong Sun, Xingjian Ding, Xiaoyue Zhang:

Budget-feasible User Recruitment in Mobile Crowdsensing with User Mobility Prediction. 1-10 - Paulo Pereira, Jean Araujo

, Rúbens de Souza Matos Júnior, Nuno M. Preguiça
, Paulo R. M. Maciel:
Software Rejuvenation in Computer Systems: An Automatic Forecasting Approach Based on Time Series. 1-8 - Jingyi Zheng, Xiaoheng Deng, Honggang Zhang:

A Novel Method to Generate Frequent Itemsets in Distributed Environment. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














