


default search action
40th IPCCC 2021: Austin, TX, USA
- IEEE International Performance, Computing, and Communications Conference, IPCCC 2021, Austin, TX, USA, October 29-31, 2021. IEEE 2021, ISBN 978-1-6654-4331-9

- Saptarshi Bhowmik, Nikhil Jain, Xin Yuan, Abhinav Bhatele:

A Simulation Study of Hardware Parameters for Future GPU-based HPC Platforms. 1-10 - Leonie Reichert, Marcel Pazelt, Björn Scheuermann:

Circuit-based PSI for Covid-19 Risk Scoring. 1-8 - Dominik Scheinert, Houkun Zhu, Lauritz Thamsen, Morgan K. Geldenhuys, Jonathan Will, Alexander Acker, Odej Kao:

Enel: Context-Aware Dynamic Scaling of Distributed Dataflow Jobs using Graph Propagation. 1-8 - Zhejiang Ran, Zhiquan Lai, Lizhi Zhang, Dongsheng Li:

Accelerate Graph Neural Network Training by Reusing Batch Data on GPUs. 1-8 - Tao Zhong, Peichang Shi, Junsheng Chang:

JointCloud Cross-chain Verification Model of Decentralized Identifiers. 1-8 - Dingquan Huang, Xin Yao, Senquan An, Shengbing Ren:

Private Distributed K-Means Clustering on Interval Data. 1-9 - Thomas Prantl, Dominik Prantl, André Bauer

, Lukas Iffländer, Alexandra Dmitrienko, Samuel Kounev, Christian Krupitzer
:
Benchmarking of Pre- and Post-Quantum Group Encryption Schemes with Focus on IoT. 1-10 - Jia Guo, Wei Wang, Zuguang Li, Shan Sun:

Incentive Mechanism Design for Blockchain Enabled Distributed Content Caching. 1-6 - Kai Zhang, Yushan Jiang

, Lee Seversky, Chengtao Xu, Dahai Liu, Houbing Song
:
Federated Variational Learning for Anomaly Detection in Multivariate Time Series. 1-9 - Yijie Wang, Xin Chen, Ying Chen, Shougang Du:

Resource allocation algorithm for MEC based on Deep Reinforcement Learning. 1-6 - Lele Ma:

One Layer for All: Efficient System Security Monitoring for Edge Servers. 1-8 - Yaqi Xie, Chaonong Xu, Chao Li:

Optimal data sink location for real-time NOMA-based Industrial IoTs. 1-6 - Peng Feng

, Yuebin Bai, Zerui Guo, Xiaolin Wang, Yining Zhang, Bojian Bai, Junmin Zhang:
A Millimeter-wave Multi-channel MAC with Dynamic Spectrum Access Capability for Mobile Self-organizing Heterogeneous Networks. 1-7 - Haolin Wang, Xiao Xiao, Yilong Hui, Zhisheng Yin

, Nan Cheng:
Two-layer Federated Learning for Scene Text Detection. 1-6 - Jie Ma

, Bin Qi, Kewei Lv:
Three-Party Integer Comparison and Applications. 1-8 - Yue Sun, Zhuoming Huang, Honggang Zhang, Zhi Cao

, Deqiang Xu:
3DRIMR: 3D Reconstruction and Imaging via mmWave Radar based on Deep Learning. 1-8 - Tengpeng Li, Xiaoqian Zhang, Son Nam Nguyen, Bo Sheng

:
CODS: Cloud-assisted Object Detection for Streaming Videos on Edge Devices. 1-6 - Shehenaz Shaik, Sanjeev Baskiyar:

A Scalable Approach to Service Placement in Fog/Cloud Environments. 1-8 - Danlin Jia, Tengpeng Li, Xiaoqian Zhang, Li Wang, Mahsa Bayati, Ron Lee, Bo Sheng

, Ningfang Mi:
SNIS: Storage-Network Iterative Simulation for Disaggregated Storage Systems. 1-6 - Trung Thanh Nguyen, Truong Thao Nguyen, Tuan Anh Nguyen Dinh, Thanh-Hung Nguyen, Phi Le Nguyen

:
Q-learning-based Opportunistic Communication for Real-time Mobile Air Quality Monitoring Systems. 1-7 - Mohsen Gavahi, Abu Naser, Cong Wu, Mehran Sadeghi Lahijani, Zhi Wang, Xin Yuan:

Encrypted All-reduce on Multi-core Clusters. 1-7 - Juan V. Leon, Oscar G. Bautista, Abdullah Aydeger, Suat Mercan, Kemal Akkaya:

A General and Practical Framework for Realization of SDN-based Vehicular Networks. 1-7 - Junhua Cheng, Songtao Guo, Jing He:

ALLPC: A Lightweight Block Cipher Based on Generalized Feistel Networks for IoT. 1-8 - Chao Qiu, Yuanzhuo Xu, Yu Zhu, Luyao Xie, Da Shen, Junhui Huang, Xiaoguang Niu:

MAGINS: Neural Network Inertial Navigation System Corrected by Magnetic Information. 1-8 - Zhenli Cui, Yu Luo:

VideoKV: A Fast Key-Value Store For Intelligent Video Surveillance Terminals. 1-9 - Yuxin Shi, Ailian Zhou, Xiaohe Liang, Nengfu Xie, Saisai Wu, Xiaoyu Li:

Research on Tag Method for Joint Extraction of Domain-oriented Entity and Relation. 1-5 - Tao Lin, Fu Chen, Xue Fu:

Methodological Principles for Deep Learning in Software Engineering. 1-3 - Gaobi Kang, Jian Wang

, Xuejun Yue, Guofan Zeng, Zekai Feng:
Transfer Learning Based Crop Disease Identification Using State-of-the-art Deep Learning Framework. 1-6 - Abdullah Hussein Al-Ghushami

, Dabeeruddin Syed
, Ameema Zainab, Moaaz Ahmed, Jadran Sessa:
Deep Learning-based Face Mask Usage Detection on Low Compute Resource Devices. 1-6 - Harry Romesburg, Jian Wang

, Yushan Jiang, Huihui Wang
, Houbing Song
:
Software Defined Radio based Security Analysis For Unmanned Aircraft Systems. 1-5 - Mohamed Rahouti, Kaiqi Xiong

, Yufeng Xin
, Nasir Ghani:
QoSP: A Priority-Based Queueing Mechanism in Software-Defined Networking Environments. 1-7 - Yanglong Sun, Jianxin Zhang, Yuliang Tang:

NOMA-Assisted Wireless Caching in Vehicular Networks: A Online Scheduling Strategy. 1-6 - Pejman Najafi, Daniel Köhler, Feng Cheng, Christoph Meinel:

NLP-based Entity Behavior Analytics for Malware Detection. 1-5 - Thomas Prantl, Dominik Prantl, Lukas Beierlieb, Lukas Iffländer, Alexandra Dmitrienko, Samuel Kounev, Christian Krupitzer

:
Performance Evaluation for a Post-Quantum Public-Key Cryptosystem. 1-7 - Wei Wan, Xin Shi, Jinxia Wei, Jing Zhao, Chun Long:

ELSV: An Effective Anomaly Detection System from Web Access Logs. 1-6 - Mengqi Li, Liang Liu, Yanlin Wang, Jie Xi, Lisong Wang:

PACTS: Power-Aware Charging Time Scheduling in Wireless Rechargeable UAV Networks. 1-10 - Zachary Tauscher, Yushan Jiang

, Kai Zhang, Jian Wang
, Houbing Song
:
Learning to Detect: A Data-driven Approach for Network Intrusion Detection. 1-6 - Yuan Mei, Binbin Guo, Danyang Xiao, Weigang Wu:

FedVF: Personalized Federated Learning Based on Layer-wise Parameter Updates with Variable Frequency. 1-9 - Jessil Fuhr, Isaac Hanna, Feng Wang

, Yongning Tang:
The Diminished Importance of Connection-based Features in Intrusion Detection. 1-10 - Yun Fen Yong, Chee Keong Tan, Ian K. T. Tan

:
SMOTE for Wi-Fi Fingerprint Construction in Indoor Positioning Systems. 1-6 - Zhanpeng Yang, Yong Zhou, Youlong Wu, Yuanming Shi

:
Communication-Efficient Quantized SGD for Learning Polynomial Neural Network. 1-6 - Zhipeng Cai, Xu Zheng, Jinbao Wang:

Efficient Data Trading for Stable and Privacy Preserving Histograms in Internet of Things. 1-10 - Jirun Duan, Ke Ren, Wei Zhou, Yueyue Xu, Wanchun Dou:

A Service Migration Method for Resource Competition in Mobile Edge Computing. 1-8 - George Kousiouris

:
A self-adaptive batch request aggregation pattern for improving resource management, response time and costs in microservice and serverless environments. 1-10 - Zekai Feng, Gaobi Kang, Fanguo Zeng

, Xuejun Yue:
Identification of Cotton Growing Stage Based on Faster-RCNN. 1-6 - Yi Qin, Chuan Yue:

Key-Based Input Transformation Defense Against Adversarial Examples. 1-10 - Yiqing Wang, Junqi Jin, Zhenzhe Zheng, Haiyang Xu, Fan Wu, Yuning Jiang, Guihai Chen:

Multi-objective Dynamic Auction Mechanism for Online Advertising. 1-8 - Yongxin Liu

, Yingjie Chen, Jian Wang
, Shuteng Niu, Dahai Liu, Houbing Song
:
Zero-bias Deep Neural Network for Quickest RF Signal Surveillance. 1-8 - Jing Tian, Chang Liu, Gaopeng Gou, Zhen Li, Gang Xiong

, Yangyang Guan:
RecGraph: Graph Recovery Attack using Variational Graph Autoencoders. 1-7 - Yuejing Chen, Ailian Zhou, Xiaohe Liang, Nengfu Xie, Huijuan Wang, Xiaoyu Li:

A Traceability System of Livestock Products Based on Blockchain and the Internet of Things. 1-5 - Kangkang Li, Liangmin Wang:

Elastic Scheduling of Virtual Machines in Cloudlet Networks. 1-7 - Samuel Alexander Stein, Ryan L'Abbate, Wenrui Mu, Yue Liu, Betis Baheri

, Ying Mao, Qiang Guan, Ang Li, Bo Fang:
A Hybrid System for Learning Classical Data in Quantum States. 1-7 - Salvatore Servodio, Xiaoming Li:

An Efficient Shuffle-Light FFT Library. 1-10 - Salem Alqahtani, Murat Demirbas:

BigBFT: A Multileader Byzantine Fault Tolerance Protocol for High Throughput. 1-10 - Jing Tian, Gaopeng Gou, Yangyang Guan, Wei Xia, Gang Xiong, Chang Liu:

Universal Perturbation for Flow Correlation Attack on Tor. 1-9 - Jianan Chen, Qi Qi, Jingyu Wang

, Haifeng Sun, Jianxin Liao:
Accelerating DNN Inference by Edge-Cloud Collaboration. 1-7 - Longhao Li, Taieb Znati, Rami G. Melhem:

Differential Shadowing: A Resilience Framework for Extreme-scale, Heterogeneous Environments with Non-Uniform Node Failure Distribution. 1-8 - Lianjin Ye, Qing Li, Xudong Zuo, Jingyu Xiao

, Yong Jiang, Zhuyun Qi, Chunsheng Zhu:
PUFF: A Passive and Universal Learning-based Framework for Intra-domain Failure Detection. 1-8 - Feixue Han, Qing Li, Keke Zhu, Jianer Zhou, Yong Jiang, Zhuyun Qi, Fuliang Li:

LAFS: Learning-Based Application-Agnostic Flow Scheduling for Datacenters. 1-8 - Xinliang Wei, A. B. M. Mohaimenur Rahman

, Yu Wang:
Data Placement Strategies for Data-Intensive Computing over Edge Clouds. 1-8 - Youssef Elmougy, Weiwei Jia, Xiaoning Ding

, Jianchen Shan:
Diagnosing the Interference on CPU-GPU Synchronization Caused by CPU Sharing in Multi-Tenant GPU Clouds. 1-10 - Teng Pu, Honghao Cai, Gang He

, Yinghua Luo, MinQi Wu:
An air quality prediction model based on deep learning and wavelet analysis considering the COVID-19 pandemic factors. 1-2 - Yuyang Wang, Dezun Dong, Fei Lei:

MR-tree: A Parametric Family of Multi-Rail Fat-tree. 1-9 - Chiranjibi Subedi, Brendan P. Beauchamp, Nabeeh Kandalaft:

MQTT based Wi-Fi communication between Microcontroller and FPGA. 1-4 - Zhe Lang, Shouguo Yang, Yiran Cheng, Xiaoling Zhang, Zhiqiang Shi, Limin Sun:

PMatch: Semantic-based Patch Detection for Binary Programs. 1-10 - Fanguo Zeng

, Wen Peng, Gaobi Kang, Zekai Feng, Xuejun Yue:
Spectral Data Classification By One-Dimensional Convolutional Neural Networks. 1-6 - Wang Yang, Jing Cao, Fan Wu

:
Adaptive Video Streaming with Scalable Video Coding using Multipath QUIC. 1-7 - Li-Chi Chang, Zesheng Chen, Chao Chen

, Guoping Wang, Zhuming Bi:
Defending Against Adversarial Attacks in Speaker Verification Systems. 1-8 - Soeren Becker, Florian Schmidt, Odej Kao:

EdgePier: P2P-based Container Image Distribution in Edge Computing Environments. 1-8 - Rohit Sahu

, Ryan Toepfer, Matthew D. Sinclair, Henry Duwe:
DENNI: Distributed Neural Network Inference on Severely Resource Constrained Edge Devices. 1-10 - Stephanie Lei, Wenyi Su:

An End-To-End Method for Teenagers Potential Depression Detection on Social Media. 1-2 - Haoke Xu, Xiaoming Li:

Fast Monotonicity Preserving Text Sorting On GPU. 1-7 - Md. Tahmid Rashid, Dong Wang:

Unravel: An Anomalistic Crowd Investigation Framework Using Social Airborne Sensing. 1-10 - Wenyi Ouyang, Qiongxiao Wang, Wei Wang, Jingqiang Lin, Yaxi He:

SCB: Flexible and Efficient Asymmetric Computations Utilizing Symmetric Cryptosystems Implemented with Intel SGX. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














