default search action
>ISPA/BDCloud/SocialCom/SustainCom 2020: Exeter, UK
- Jia Hu, Geyong Min, Nektarios Georgalas, Zhiwei Zhao, Fei Hao, Wang Miao:
IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, ISPA/BDCloud/SocialCom/SustainCom 2020, Exeter, United Kingdom, December 17-19, 2020. IEEE 2020, ISBN 978-1-6654-1485-2 - Rui Liu, Zheng Lin, Peng Fu, Weiping Wang:
Reinforced Keyphrase Generation with BERT-based Sentence Scorer. 1-8 - Chiheb Ameur Abid, Kaïs Klai, Jaime Arias, Hiba Ouni:
SOG-Based Multi-Core LTL Model Checking. 9-17 - Minghao Tang, Peng Zhang, Haoqi Sun, Lei Zhang:
A Task Execution Framework Based on Aging Indicator and SARIMI. 18-25 - Andrea Nardelli, Vladimir Vlassov, Amir Hossein Payberah:
Framework-Agnostic Optimization of Repeated Skewed Joins at Massive Scale. 26-33 - Xiaoxiao Zhang, Liangjun Wang, Xuesen Chu, Hu Ding, Wu Zhang:
Parallel Computing and Optimization of Lattice Boltzmann Method Based on SW26010 Processor. 34-40 - Yongnan Li:
A tile assembly model to calculate point-multiplication on conic curves over finite field GF(2n). 41-48 - Wei Zheng, Zhaobin Chen, Rizos Sakellariou, Lu Tang, Jinjun Chen:
Evaluating DAG Scheduling Algorithms for Maximum Parallelism. 49-56 - Mingming Ren, Yuyang Gao, Gang Wang, Xiaoguang Liu:
Discrete Sine and Cosine Transform and Helmholtz Equation Solver on GPU. 57-66 - Mingming Ren, Xiaomin Huang, Zhuofeng Wu, Rebecca J. Stones, Xiaoguang Liu, Gang Wang:
CuCodeML: GPU-Accelerated CodeML for the Branch-Site Model in Phylogenetics. 67-75 - Stijn Schildermans, Kris Aerts, Jianchen Shan, Xiaoning Ding:
Ptlbmalloc2: Reducing TLB Shootdowns with High Memory Efficiency. 76-83 - Na Yang, Xia Wang, Yun Wang, Qi Zhai:
Dependent and Heterogeneous Process Migration Based on Checkpoints. 84-92 - Dunbo Zhang, Chaoyang Jia, Qiong Wang, Li Shen:
A Unified Page Walk Buffer and Page Walk Cache. 93-101 - Zhixing Yu, Kejing He, Chao Chen, Jian Wang:
Live Container Migration via Pre-restore and Random Access Memory. 102-109 - Haocong Li, Yunjia Cheng, Wei Ren, Tianqing Zhu:
A Fast Robustness Quantification Method for Evaluating Typical Deep Learning Models by Generally Image Processing. 110-117 - Zihan Liu, Jingwen Leng, Quan Chen, Chao Li, Wenli Zheng, Li Li, Minyi Guo:
DLFusion: An Auto-Tuning Compiler for Layer Fusion on Deep Neural Network Accelerator. 118-127 - Miaojin Li, Peng Fu, Zheng Lin, Weiping Wang:
Parallel Variational Autoencoders for Multiple Responses Generation. 128-136 - Jiansong Li, Zihan Jiang, Fangxin Liu, Xiao Dong, Guangli Li, Xueying Wang, Wei Cao, Lei Liu, Yanzhi Wang, Tao Li, Xiaobing Feng:
Characterizing the I/O Pipeline in the Deployment of CNNs on Commercial Accelerators. 137-144 - Ke Zhan, Zhonghua Lu, Bingchang Liu:
DCDFNE: build dataset to evaluate binary codes diffing tools and train deep learning models. 145-152 - Mengtao Hu, Li Liu, Wei Wang, Yao Liu:
APENAS: An Asynchronous Parallel Evolution Based Multi-objective Neural Architecture Search. 153-159 - Nazariy K. Shaydyuk, Eugene B. John:
FPGA Implementation of MobileNetV2 CNN Model Using Semi-Streaming Architecture for Low Power Inference Applications. 160-167 - Daud Khan, Haopeng Chen, Najamul Din:
Caching Resource Allocation and Mobility Aware in Information-Centric Networking with Mobile Edge Computing. 168-174 - Yang Yang, Xiaolin Chang, Ziye Jia, Zhu Han, Zhen Han:
Towards 6G Joint HAPS-MEC-Cloud 3C Resource Allocation for Delay-Aware Computation Offloading. 175-182 - Mengjia Zhai, Fei Gu, Jin Wang, Lingzhi Li, Kejie Lu, Jianping Wang:
PCRec: A Private Coding Computation Scheme Based on Edge Computing for Recommendation System. 183-191 - Tingting Dong, Jin Wang, Fei Gu, Jingya Zhou, Kejie Lu, Jianping Wang:
MCSEC: Secure Coded Matrix Multiplication Scheme for Edge Computing with Minimum Communication Cost. 192-199 - Yang Li, Bing Shi:
A Deep Reinforcement Learning based Mobile Device Task Offloading Algorithm in MEC. 200-207 - Meimei Zhang, Yingying Xie, Xiang Chen, Bo Bai, Gong Zhang, Kai Lei:
SDWCM: A Software-Defined Wi-Fi Architecture For Collaborative Management. 208-217 - Yusen Li, Jinping Wu, Bingzheng Ma, Gang Wang, Xiaoguang Liu:
Cost-Efficient Request Dispatching in Geo-distributed Cloud Gaming Infrastructure. 218-227 - Sreekrishnan Venkateswaran, Santonu Sarkar:
A New Paradigm of Cloud Brokerage. 228-235 - Tianchen Ding, Shiyou Qian, Weidong Zhu, Jian Cao, Guangtao Xue, Yanmin Zhu, Wenjuan Li:
Comat: An Effective Composite Matching Framework for Content-based Pub/Sub Systems. 236-243 - Xu Zhang, Kai Yang, Rongqi Zhang, Qilin Fan, Hong Tang, Zhan Ma:
Demystifying the Largest Live Game Streaming Platform via Black-Box Measurement. 244-250 - Yiping Teng, Dan Liu, Xiaoting Liu, Weiyu Zhao, Haigang Liu, Chunlong Fan:
Secure Spatio-textual Skyline Queries on Cloud Platform. 251-259 - Zan Zong, Lijie Wen, Xiao Liu, Li Lin, Chen Qian, Leilei Lin:
Scaleplus: Towards Fast Scaling of Distributed Streaming Dataflows. 260-268 - Shuokang Huang, Maoyu Du, Wei Li, Kai Lei:
TSSN: A Trusted Shared Storage Network Based on Blockchain and Bilateral Matching. 269-276 - Yan Ding, Liaoliao Feng, Ying Qin, Chenlin Huang, Pan Dong, Long Gao, Yusong Tan:
Blockchain-based Access Control Mechanism of Federated Data Sharing System. 277-284 - Yichen Hou, Wenxin Liu, Hui Lin, Xiaoding Wang:
Multi-layer Access Control Mechanism based on Blockchain for Mobile Edge Computing. 285-291 - Min Peng, QinYang Miao, Hui Lin, Xiaoding Wang:
A cross-blockchain based distributed crowdsouring system for Internet of Things. 292-297 - Jingyu Zhang, Siqi Zhong, Jin Wang, Lei Wang:
An Systematic Study on Blockchain Transaction Databases Storage and Optimization. 298-304 - Qi Wang, Ming Xu, Xiangxue Li, Haifeng Qian:
Revisiting the Fairness and Randomness of Delegated Proof of Stake Consensus Algorithm. 305-312 - Ruxue Wen, Wenqing Cheng, Haojun Huang, Wang Miao, Chen Wang:
Privacy Preserving Trajectory Data Publishing with Personalized Differential Privacy. 313-320 - Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Qi Alfred Chen, Gang Li, Jiqiang Liu, Long Li:
Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack. 321-328 - Jie Wen, Jingyuan Hu, Hongbin Shi, Xin Wang, Chunyuan Yuan, Jizhong Han, Tao Guo:
Fusion-based Spammer Detection Method by Embedding Review Texts and Weak Social Relations. 329-336 - Wenyan An, Liwei Chen, Jinxin Wang, Gewangzi Du, Gang Shi, Dan Meng:
AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention Mechanism. 337-344 - Hui Qi, Tianwei Lu, Ligang Cong, Xiaoqiang Di:
Secure Deduplication Method Based on Autoencoder. 345-352 - Yafei Sang, Yan Xu, Yongzheng Zhang, Peng Chang, Shuyuan Zhao, Yijing Wang:
Toward Automatic Mobile Application Fingerprint Extraction from Non-encrypted HTTP Traffic. 353-362 - Yaosong Lu, Weijie Liu, Wenhao Wang:
Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks. 363-370 - Krzysztof Stepien, Aneta Poniszewska-Maranda:
Analysis of security methods in Vehicular Ad-Hoc Network against Worm Hole and Gray Hole attacks. 371-378 - Dongfang Li, Yasha Chen, Shuai Zhang, Wei Shen, Guang Yang:
Hardware Implementation of Security Association Lookup Device Based on RAM. 379-383 - Xiaocai Wang, Qiuwei Yang, Zichao Xie, Zhiqing Zheng, Yudong Yan, Dan Tang:
Low-rate DoS Attack Detection Based on WPD-EE Algorithm. 384-391 - Yun Li, Chenlin Huang, Lu Yuan, Yan Ding, Hua Cheng:
ASPGen: an Automatic Security Policy Generating Framework for AppArmor. 392-400 - Yichuan Qi, Dan Feng, Binbing Hou, Fang Wang, Jianxi Chen, Yun Liu:
A Simulation-based Study on the Reliability of Data Center Upgrades. 401-408 - Xuefei Tian, Chenlu Li, Aijuan Qian, Xiaoju Dong:
IntruDTS: Interactive Visual Analysis System for Intrusion Detection in Time Series. 409-416 - Ran Tan, Xuefeng Yan:
Improved Human Activity Recognition Model based on Sequence Mixup. 417-424 - Ziyu Guo, Shijun Liu, Li Pan, Qiang He:
An Ego Network Embedding Model via Neighbors Sampling and Self-attention Mechanism. 425-432 - Jiong Wang, Yingshuai Kou, Neng Gao, Chenyang Tu:
User Preference Excitation Network for Sequential Recommendation. 433-440 - Jin Wang, Yaqiong Yang, Jingyu Zhang, Lei Wang:
Remote Procedure Call Optimization of Big Data Systems Based on Data Awareness. 441-447 - Hongze Wang, Jing Liu, Jiexiang Kang, Wei Yin, Haiying Sun, Hui Wang:
Feature Envy Detection based on Bi-LSTM with Self-Attention Mechanism. 448-457 - Meilin Zhou, Qi Liang, Peng Zhang, Lu Ma, Dan Luo, Bin Wang:
Global Context-aware Representation for Implicit Discourse Relation Recognition. 458-465 - Chuan Sheng, Yu Yao, Dongbiao Li, Hongna An, Wei Yang:
Honeyeye: A Network Traffic Collection Framework for Distributed ICS Honeynets. 466-473 - Fang Liu, Qin Dai, Shengze Wang, Liang Zhao, Xiangbin Shi, Jianzhong Qiao:
Multi-Relational Graph Convolutional Networks for Skeleton-Based Action Recognition. 474-480 - Shuang Yang, Fali Wang, Daren Zha, Cong Xue, Zhihao Tang:
NarGNN: Narrative Graph Neural Networks for New Script Event Prediction Problem. 481-488 - Hongji Sun, Lili Lin, Riqing Chen:
Social Recommendation based on Graph Neural Networks. 489-496 - Chuanyu Zong, Chengwei Zhang, Xiufeng Xia, Tao Qiu, Jiaying Wang:
Effectively Refining Parameters for Unexpected Nodes on Structural Graph Clustering. 497-504 - Xiufeng Xia, Jida Min, Chuanyu Zong, Jiajia Li, Xiangyu Liu, Tao Qiu:
Effectively Explaining Missing Nodes on Structural Graph Clustering. 505-512 - Xingang Wang, Dong Wang, Fengpo Ji:
A Span-based Model for Joint Entity and Relation Extraction with Relational Graphs. 513-520 - Lu Ma, Peng Zhang, Dan Luo, Meilin Zhou, Qi Liang, Bin Wang:
Answer Graph-based Interactive Attention Network for Question Answering over Knowledge Base. 521-528 - Chuanyu Zong, Xiufeng Xia, Chao Xian, Anzhen Zhang, Rui Zhu, Jiaying Wang:
Effectively Incremental Structural Graph Clustering for Dynamic Parameter. 529-536 - Wei Song, Song Liu, Xiaochun Wang, Weiguo Wu:
An Improved Sparrow Search Algorithm. 537-543 - Rongyu Dong, Huawei Cao, Xiaochun Ye, Yuan Zhang, Qinfen Hao, Dongrui Fan:
Highly Efficient and GPU-Friendly Implementation of BFS on Single-node System. 544-553 - Zhengxiao Liu, Fali Wang, Zheng Lin, Lei Wang, Zhiyi Yin:
DE-CO: A Two-Step Spelling Correction Model for Combating Adversarial Typos. 554-561 - Chuanzhi Zhuang, Ningyu Zhang, Xiaolong Jin, Zhong Li, Shumin Deng, Huajun Chen:
Joint Extraction of Triple Knowledge Based on Relation Priority. 562-569 - Weilong Li, Shuyuan Jin:
A simple function embedding approach for binary similarity detection. 570-577 - Ziwen Ma, Wei Huangfu, Yaxi Liu:
Optimizing 3-D Placement of Multiple UAVs Based on Taguchi's Method. 578-585 - Miao Xie, Shijun Liu, Li Pan:
A recommendation algorithm for sparse data via implicit relationship. 586-592 - Jia-Le Li, Zhi-Juan Du, Jiantao Zhou:
A Hybrid Recommendation Algorithm with Short-term Preference and Knowledge Preference. 593-600 - Yangqi Zhang, Haiyang Yang, Li Kuang:
A Web API Recommendation Method with Composition Relationship Based on GCN. 601-608 - Zijie Wang, Liang Liu, Jiankang Xu, Li Zeng:
A UAV Path and Action Planning Algorithm for Indoor Localization Information Collection. 609-616 - Jiajia Li, Jiahui Hu, Lei Li, Xing Xiong, Xiufeng Xia:
Efficient Multi-Request Route Planning on Road Network. 617-624 - Liang Chen, Wei Wang, Yun Yang:
An efficient dynamic neural network for predicting time series data stream. 625-632 - Liu Yang, Junyu Zhang, Tingxuan Chen, Wuji Lei, Xiaolong Liu:
Predicting Residual Stress by Finding Peak Shape Using Artificial Neural Networks. 633-640 - Pingping Li, Haopeng Chen:
Task Merging Based on Scenarios of Functionally Unique Resources for Deadline-Constrained Workflow Scheduling. 641-648 - Renjie Zhou, Guoyuan Yuan, Dezun Dong, Shan Huang:
APCC: Agile and Precise Congestion Control in Datacenters. 649-656 - Zhenhua Cai, Jiayun Lin, Fang Liu, Zhiguang Chen, Hongtao Li:
NVMCache: Wear-Aware Load Balancing NVM-based Caching for Large-Scale Storage Systems. 657-665 - Doudou Wang, Xin Hu, Quan Xue, Ze Li, Lexi Xu, Weidong Wang:
Resource Scheduling Algorithm on Mobile P2P Distribution Networks. 666-673 - Liang Zhao, Tong Zheng, Mingwei Lin, Ammar Hawbani, Jiaxing Shang:
A Novel Influence Maximization-based Dynamic Forwarding Node Selection Scheme in SDVNs. 674-682 - Ran Zhang, Lei Liu, Xudong Lu, Zhongmin Yan, Hui Li:
Performance Modeling of a General GPS Scheduling Under Long Range Dependent Traffic. 683-689 - Minh-Thuyen Thi, Jean-Marc Pierson, Georges Da Costa:
Game-Based Negotiation between Power Demand and Supply in Green Datacenters. 690-697 - Yixin Zhang, Wei He, Lizhen Cui, Lei Liu, Zhongmin Yan:
Multi-interest Aware Recommendation in CrowdIntell Network. 698-705 - Zhongkai Zhang, Lei Liu, Xudong Lu, Zhongmin Yan, Hui Li:
Encrypted Network Traffic Classification: A data driven approach. 706-712 - Xiaomeng Lian, Wei He, Lizhen Cui, Hui Li, Lei Liu:
Task Assignment with Consensus Decision for Spatial Crowdsouring. 713-720 - Hexiang Qiao, Zheming Yang, Bing Liang, Wen Ji:
Crowd Intelligence Empowered Video Transmission in Ultra-low-bandwidth Constrained Circumstances. 721-727 - Linqing Zhai, Zheming Yang, Wen Ji:
Understanding Crowd Intelligence in Large-scale Systems: A Hierarchical Binary Particle Swarm Optimization Approach. 728-735 - Hong Zhu, Ian Bayley, Hongbo Wang:
Continuous Debugging of Microservices. 736-745 - Dragi Kimovski, Dijana Capeska Bogatinoska, Narges Mehran, Aleksandar Karadimce, Natasa Paunkoska, Radu Prodan, Ninoslav Marina:
Cloud - Edge Offloading Model for Vehicular Traffic Analysis. 746-753 - Wenyue Sun, Haokun Fang, Shensheng Zheng, Quan Qian:
Blockchain and Homomorphic Encryption For Digital Copyright Protection. 754-761 - Bipasa Bose, Jyotsna Priya, Sonam Welekar, Zeyu Gao:
Hemp Disease Detection and Classification Using Machine Learning and Deep Learning. 762-769 - Feng Wei, Uyen Trang Nguyen:
A Neural Attentive Model Using Human Semantic Knowledge for Clickbait Detection. 770-776 - Hadi Ghahremannezhad, Hang Shi, Chengjun Liu:
Automatic Road Detection in Traffic Videos. 777-784 - Umair Ullah Tariq, Haider Ali, John Panneerselvam, James Hardy, Lu Liu:
Energy-aware Multimedia Applications Scheduling on VFI-NoC-MPSoC using as an Edge-device in IoT. 785-793 - Joshua D. Hamilton, Carson K. Leung, Sehaj Pal Singh:
Identifying the Right Person in Social Networks with Double Metaphone Codes. 794-801 - Yongjun Li, Xiangyu Li, Jiaqi Yang, Congjie Gao:
Matching User Accounts across Large-scale Social Networks based on Locality-sensitive Hashing. 802-809 - Tao Ruan, Qingkai Kong, Yawen Zhang, Sara K. McBride, Qin Lv:
An Analysis of Twitter Responses to the 2019 Ridgecrest Earthquake Sequence. 810-818 - Na He, Sam Ferguson:
Music Social Tags Representation in Dimensional Emotion Models. 819-826 - Nasser Assery, Xiaohong Yuan, Xiuli Qu, Sultan Almalki, Kaushik Roy:
Identifying Panic Triggers from Disaster-Related Tweets. 827-836 - Yawen Zhang, Seth E. Spielman, Qi Liu, Si Shen, Jason Shuo Zhang, Qin Lv:
Exploring the Usage of Online Food Delivery Data for Intra-Urban Job and Housing Mobility Detection and Characterization. 837-844 - Zhihao Dong, Yuanzhu Chen, Terrence S. Tricco, Cheng Li, Ting Hu:
Practical Strategy of Acquaintance Immunization without Contact Tracing. 845-851 - Swaroop Gowdra Shanthakumar, Anand Seetharam, Arti Ramesh:
Analyzing Societal Impact of COVID-19: A Study During the Early Days of the Pandemic. 852-859 - Zichu Yang, Bowen Sun:
Hyper-Casual Endless Game Based Dynamic Difficulty Adjustment System For Players Replay Ability. 860-866 - Swapna S. Gokhale:
Monitoring the Perception of Covid-19 Vaccine using Topic Models. 867-874 - Fengpan Zhao, Yan Huang, Akshita Maradapu Vera Venkata Sai, Yubao Wu:
A Cluster-based Solution to Achieve Fairness in Federated Learning. 875-882 - Jiawei Deng, Guangyao Pang, Li Wan, Zhenming Yu:
Low-light Image Enhancement based on Joint Decomposition and Denoising U-Net Network. 883-888