


default search action
38th IPCCC 2019: London, UK
- 38th IEEE International Performance Computing and Communications Conference, IPCCC 2019, London, United Kingdom, October 29-31, 2019. IEEE 2019, ISBN 978-1-7281-1025-7

- Yifeng Cao, Zhe Wang, Linghe Kong

, Guihai Chen
:
reZig: Decompose a Collision via Reference Waveform in ZigBee. 1-2 - Mohammed Alghamdi, Ligang He, Yujue Zhou

, Junyu Li:
Developing the Parallelization Methods for Finding the All-Pairs Shortest Paths in Distributed Memory Architecture. 1-8 - Chang Liu, Liang Dai, Wenjing Cui, Tao Lin:

A Byte-level CNN Method to Detect DNS Tunnels. 1-8 - Lu Pang, Anis Alazzawe, Krishna Kant, Jeremy Swift:

Data Heat Prediction in Storage Systems Using Behavior Specific Prediction Models. 1-8 - Haoran Xu

, Yuqing Sun
, Xiangjun Li:
Mining Cross-platform User Behaviors for Demographic Attribute Inference. 1-2 - Meriem Smache, Alexis Olivereau, Thibault Franco-Rondisson, Assia Tria:

Autonomous Detection of Synchronization Attacks in the Industrial Internet Of Things. 1-9 - Wenxuan He, Gaopeng Gou, Cuicui Kang, Chang Liu, Zhen Li, Gang Xiong:

Malicious Domain Detection via Domain Relationship and Graph Models. 1-8 - Mingyu Zhai, Aibo Song, Jingyi Qiu, Xuechun Ji, Qingxi Wu:

Query optimization Approach with Shuffle Intermediate Cache Layer for Spark SQL. 1-6 - Qianqian Fan, David J. Lilja, Sachin S. Sapatnekar:

Using DCT-based Approximate Communication to Improve MPI Performance in Parallel Clusters. 1-10 - Minghao Jiang, Gaopeng Gou, Junzheng Shi, Gang Xiong

:
I Know What You Are Doing With Remote Desktop. 1-7 - Zexun Jiang, Hao Yin, Yan Luo, Jiaying Gong, Yuannan Yang, Manshan Lin:

Quantitative Analysis of Mobile Application User Interface Design. 1-8 - Martina Cilia, Keisuke Yamamoto:

Intelligent IoT Sensing System Based on Compressive Sensing with Adaptively Learned Dictionary. 1-8 - Danlin Jia, Janki Bhimani, Son Nam Nguyen, Bo Sheng

, Ningfang Mi:
ATuMm: Auto-tuning Memory Manager in Apache Spark. 1-8 - Chuan Yu

, Shuhui Chen:
On Effects of Mobility Management Signalling Based DoS Attacks Against LTE Terminals. 1-8 - Mohammed Maray

, Arshad Jhumka, Adam P. Chester, Mohamed F. Younis
:
Scheduling Dependent Tasks in Edge Networks. 1-4 - Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi, Carsten Griwodz:

A Deep Learning Approach to Dynamic Passive RTT Prediction Model for TCP. 1-10 - Antonio Franco, Emma Fitzgerald, Björn Landfeldt, Ulf Kömer:

Reliability, timeliness and load reduction at the edge for cloud gaming. 1-8 - Xi Zhu

, Siguang Chen, Songle Chen, Geng Yang:
Energy and Delay Co-aware Computation Offloading with Deep Learning in Fog Computing Networks. 1-6 - Yibin Xu

, Yangyu Huang
:
Contract-connection: An efficient communication protocol for Distributed Ledger Technology. 1-4 - Kemeng Wu, Yongzheng Zhang, Tao Yin:

CLR: A Classification of DNS Tunnel Based on Logistic Regression. 1 - Jianguo Jiang, Qilei Yin, Zhixin Shi, Meimei Li, Bin Lv:

A New C&C Channel Detection Framework Using Heuristic Rule and Transfer Learning. 1-9 - Qihang Bing, Ruobing Jiang, Feng Hong

:
Exploiting Social Network Characteristics for Efficient Routing in Ocean Vessel Ad Hoc Networks. 1-8 - Steffen Haas, Florian Wilkens, Mathias Fischer:

Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs. 1-11 - Hua Fan, Kelin Zhang, Yuanjun Cen, Kaung Oo Htet

, Hadi Heidari
, Weiping Cheng, Yang Li, Quanyuan Feng, Hongrui Che, Xuanhong Zeng, Haizhu Wang, Hongquan Wang, Dagang Li:
High-Precision Adaptive Slope Compensation Circuit for System-on-Chip Power Management. 1-2 - Dongzheng Jia, Limin Liu, Shijie Jia, Jingqiang Lin:

VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts. 1-9 - Pascal A. Schirmer, Iosif Mporas:

Integration of Temporal Contextual Information for Robust Energy Disaggregation. 1-6 - Truong Thao Nguyen

, Mohamed Wahib, Ryousei Takano:
Topology-aware Sparse Allreduce for Large-scale Deep Learning. 1-8 - Erik Sy, Tobias Mueller, Moritz Moennich, Hannes Federrath:

Accelerating QUIC's Connection Establishment on High-Latency Access Networks. 1-8 - Yaowen Zheng, Zhanwei Song, Yuyan Sun, Kai Cheng, Hongsong Zhu, Limin Sun:

An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis. 1-8 - Qiaozhi Xu, Junxing Zhang:

piFogBed: A Fog Computing Testbed Based on Raspberry Pi. 1-8 - Lucien Moor, Lukas Bitter, Miguel de Prado, Nuria Pazos, Nabil Ouerhani

:
IoT meets distributed AI - Deployment scenarios of Bonseyes AI applications on FIWARE. 1-2 - Janki Bhimani, Rajinikanth Pandurangan, Ningfang Mi, Vijay Balakrishnan:

Emulate Processing of Assorted Database Server Applications on Flash-Based Storage in Datacenter Infrastructures. 1-8 - Xiao Yang, Ming Jiang, Chunming Zhao:

LT Codes with Feedback: Accelerate the Distributed Matrix-Vector Multiplication with Stragglers. 1-6 - Abdelwahab Boualouache

, Ridha Soua, Thomas Engel:
VPGA: An SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks. 1-8 - Adita Kulkarni, Anand Seetharam:

QuickR: A Novel Routing Strategy for Wireless Mobile Information-centric Networks. 1-8 - Yinjin Fu, Xiaofeng Qiu, Jian Wang:

F2MC: Enhancing Data Storage Services with Fog-toMultiCloud Hybrid Computing. 1-6 - Anis Alazzawe, Krishna Kant:

Mimic: Fast Recovery from Data Corruption Errors in Stencil Computations. 1-8 - Jianjun Lin, Jianbo Gao, Zhenhao Wu, Chengxiang Si, Bo Sun:

Deanonymizing Tor in a Stealthy Way. 1-8 - Teng Wang, Xinyu Yang, Xuebin Ren, Jun Zhao, Kwok-Yan Lam

:
Adaptive Differentially Private Data Stream Publishing in Spatio-temporal Monitoring of IoT. 1-8 - Jiapeng Huang, Linghe Kong

, Xiao-Yang Liu, Wenhao Qu, Guihai Chen
:
A C++ Library for Tensor Decomposition. 1-2 - Yongbin Sun, Sai Nithin Reddy Kantareddy, Joshua Siegel, Alexandre Armengol-Urpi, Xiaoyu Wu, Hongyu Wang, Sanjay E. Sarma:

Towards Industrial IoT-AR Systems using Deep Learning-Based Object Pose Estimation. 1-8 - Mingli Zhang, Liming Wang, Jing Yang:

A Blockchain-Based Authentication Method with One-Time Password. 1-9 - Yongliang Cheng, Yan Xu, Hong Zhong, Yi Liu:

HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT. 1-7 - Oluyomi Simpson

, Yichuang Sun:
A Stochastic based Physical Layer Security in Cognitive Radio Networks: Cognitive Relay to Fusion Center. 1-7 - Robert Raad, Elie Inaty, Martin Maier:

Improving Latency and Jitter Performance in CDMA-Based Next-Generation Ethernet Passive Optical Networks for 5G Applications. 1-8 - Yujia Liu, Changqing An

:
Cost Efficient Internet Path Tracking Based on Routing Changes Prediction. 1-8 - Praboda Rajapaksha, Reza Farahbakhsh, Noël Crespi, Bruno Defude

:
Uncovering Flaming Events on News Media in Social Media. 1-8 - Yehia Arafa, Gopinath Chennupati, Atanu Barai

, Abdel-Hameed A. Badawy, Nandakishore Santhi
, Stephan J. Eidenbenz:
GPUs Cache Performance Estimation using Reuse Distance Analysis. 1-8 - Shuhan Fan, Songyun Wu

, Zhiliang Wang, Zimu Li, Jiahai Yang, Heng Liu, Xinran Liu:
ALEAP: Attention-based LSTM with Event Embedding for Attack Projection. 1-8 - Bing Zhou, Hongqi Yang:

Rendering Scheduling Framework in Edge Computing: A Congestion Game-based Approach. 1-6 - Koosha Zarei, Reza Farahbakhsh, Noël Crespi:

Typification of Impersonated Accounts on Instagram. 1-6 - Christopher Kramer, Kiran Mathews, Reinhard Gotzhein:

Cooperative Fair Bandwidth Scaling in Contention-based Wireless Networks using Time Token Bucket. 1-9 - René Helmke, Jan Bauer, Alexander Bothe, Nils Aschenbruck:

CAN't - An ISOBUS Privacy Proxy for Collaborative Smart Farming. 1-3 - Miaoqing Tian, Ruobing Jiang, Chaoqun Xing, Haipeng Qu, Qian Lu, Xiaoyun Zhou:

Exploiting Temperature-Varied ECU Fingerprints for Source Identification in In-vehicle Network Intrusion Detection. 1-8 - Tanguy Godquin, Morgan Barbier, Chrystel Gaber

, Jean-Luc Grimault, Jean-Marie Le Bars:
Placement optimization of IoT security solutions for edge computing based on graph theory. 1-7 - Jiang Xie, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:

A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection. 1-8 - Junfeng Li

, Dan Li, Wenfei Wu, K. K. Ramakrishnan, Jinkun Geng, Fei Gui, Fanzhao Wang, Kai Zheng:
Sphinx: A Transport Protocol for High-Speed and Lossy Mobile Networks. 1-8 - Zhaoxing Wang, Xuehai Tang, Qiuyang Liu, Jizhong Han

:
Jily: Cost-Aware AutoScaling of Heterogeneous GPU for DNN Inference in Public Cloud. 1-8 - Tianyu Cui

, Chang Liu, Gaopeng Gou, Junzheng Shi, Gang Xiong:
A Comprehensive Study of Accelerating IPv6 Deployment. 1-8 - Xinlei Fan, Gaopeng Gou, Cuicui Kang, Junzheng Shi, Gang Xiong:

Identify OS from encrypted traffic with TCP/IP stack fingerprinting. 1-7 - Jinghan Jiang, Kui Wu, Huan Wang, Rong Zheng:

Automatic Data Quality Enhancement with Expert Knowledge for Mobile Crowdsensing. 1-7 - Qifeng Yang, Haojiang Deng, Lingfang Wang, Yiqiang Sheng:

An Almost-zero Latency Lightweight Mechanism for Caching Decision in ICN Content Router. 1-8 - Ke Li, Hong Li, Hongsong Zhu, Limin Sun, Hui Wen:

Side-Channel Information Leakage of Traffic Data in Instant Messaging. 1-8 - Junchi Xing, Mingliang Yang, Haifeng Zhou, Chunming Wu, Wei Ruan:

Hiding and Trapping: A Deceptive Approach for Defending against Network Reconnaissance with Software-Defined Network. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














