


default search action
>ISPA/BDCloud/SocialCom/SustainCom 2021: New York City, NY, USA
- 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30 - Oct. 3, 2021. IEEE 2021, ISBN 978-1-6654-3574-1

- Siqing Fu

, Tiejun Li, Jianmin Zhang, Sheng Ma, Sheng Liu:
MiniMCTAD: Minimalist Monte Carlo Transport Architecture Design. 1-10 - Xuan Li, Liqiong Chang, Xue Liu:

CE-Dedup: Cost-Effective Convolutional Neural Nets Training based on Image Deduplication. 11-18 - Aijuan Qian, Chenlu Li, Xiaoju Dong, Shengtao Chen, Yanling Zhang, Guoqiang Li:

SLAMVis: An Interactive Visualization Approach for Smart Labeling on Multidimensional Data. 19-26 - Ling Xiao, Beiji Zou, Chengzhang Zhu, Meng Zeng, Zhi Chen

:
HFBT: An Efficient Hierarchical Fault-tolerant Method for Cloud Storage System. 27-36 - Xin Lu

, Zhijun Wu:
ATMCC: Design of the Integration Architecture of Cloud Computing and Blockchain for Air Traffic Management. 37-43 - Xiao Huang, Yu Jiang, Hao Fan, Huayun Tang, Yiping Wang, Jin Jin, Hai Wan, Xibin Zhao:

TATA: Throughput-Aware TAsk Placement in Heterogeneous Stream Processing with Deep Reinforcement Learning. 44-54 - Yi Xu, Zhenyi Chen

, Binhong Huang, Ximeng Liu, Chen Dong:
HTtext: A TextCNN-based pre-silicon detection for hardware Trojans. 55-62 - Chun Liu, Lin Yang, LinRu Ma, LiuCheng Shi, Xuexian Hu, Weipeng Cao, JingJing Zhang:

PEBIID: Privacy-preserving and Efficient Biometric Identification for IoV DApp. 63-72 - Feiyang Wu, Zhuoran Song, Jing Ke, Li Jiang, Naifeng Jing, Xiaoyao Liang:

PIPArch: Programmable Image Processing Architecture Using Sliding Array. 73-80 - Saqing Yang, Yi Ren, Jianfeng Zhang, Jianbo Guan, Bao Li:

KubeHICE: Performance-aware Container Orchestration on Heterogeneous-ISA Architectures in Cloud-Edge Platforms. 81-91 - Xiaohui Wei, Changbao Zhou

, Yong Sheng, Yan Wu, Lina Li, Shang Gao:
RLConfig: Run-time Configuration of Cluster Schedulers via Deep Reinforcement Learning. 92-99 - Xiaohui Wei, Yong Sheng, Lina Li, Changbao Zhou:

DRL-Deploy: Adaptive Service Function Chains Deployment with Deep Reinforcement Learning. 100-107 - Xiaorui Zhu, Lei Gong, Zongwei Zhu, Xuehai Zhou:

Vapor: A GPU Sharing Scheduler with Communication and Computation Pipeline for Distributed Deep Learning. 108-116 - Kunli Lin, Haojun Xia, Kun Zhang, Bibo Tu:

AddrArmor: An Address-based Runtime Code-reuse Attack Mitigation for Shared Objects at the Binary-level. 117-124 - Penghao Sun

, Dongliang Xue, Litong You, Yan Yan, Linpeng Huang:
HyperKV: A High Performance Concurrent Key-Value Store for Persistent Memory. 125-134 - Yihuan Qian, Songwen Pei, Jihong Yuan, Dianle Zhou, Tong Liu, Linghe Kong

:
DRAM: Dragonfly Routing Algorithm on Multi-objects by Optimal Thresholds. 135-142 - Ming Xu, Luoyi Zhang, Baoming Zhang, Meng Cao, Jinliang Yuan

, Chongjun Wang:
EPINE: Enhanced Proximity Information Network Embedding. 143-150 - Libo Chang, Shengbing Zhang, Huimin Du, Shiyu Wang, Meikang Qiu, Jihe Wang:

Accuracy vs. Efficiency: Achieving both Through Hardware-Aware Quantization and Reconfigurable Architecture with Mixed Precision. 151-158 - Chendi Li

, Haipeng Jia, Hang Cao, Jianyu Yao, Boqian Shi, Chunyang Xiang, Jinbo Sun, Pengqi Lu, Yunquan Zhang:
AutoTSMM: An Auto-tuning Framework for Building High-Performance Tall-and-Skinny Matrix-Matrix Multiplication on CPUs. 159-166 - Jia Ma, Xianqi Zheng, Yubo Liu, Zhiguang Chen:

KBP: Mining Block Access Pattern for I/O Prediction with K-Truss. 167-176 - Yinglong Xiong, Jiang Zhou, Lin Su

, Weiping Wang
, Yong Chen:
ECCH: Erasure Coded Consistent Hashing for Distributed Storage Systems. 177-184 - Zhihao Liu, Qiang Wang, Yongjian Li, Yongxin Zhao:

CMSS: Collaborative Modeling of Safety and Security Requirements for Network Protocols. 185-192 - Baoke Li, Cong Cao

, Yuhai Lu, Yanbing Liu
, Baohui Li, Binxing Fang, Jianhui Fu:
D2Graph: An Efficient and Unified Out-of-Core Graph Computing Model. 193-201 - Milan M. Shetti, Bingzhe Li

, David H. C. Du:
E-VM: An Elastic Virtual Machine Scheduling Algorithm to Minimize the Total Cost of Ownership in a Hybrid Cloud. 202-211 - Ke Ren, Peng Jiang

, Liehuang Zhu, Keke Gai:
SM9-based Anonymous Search over Encrypted Data. 212-219 - Xin Huang, Guozheng Wang, Yongmei Lei:

GR-ADMM: A Communication Efficient Algorithm Based on ADMM. 220-227 - Moming Duan, Duo Liu, Xinyuan Ji, Renping Liu, Liang Liang, Xianzhang Chen

, Yujuan Tan:
FedGroup: Efficient Federated Learning via Decomposed Similarity-Based Clustering. 228-237 - Renjie Zhou, Dezun Dong, Shan Huang

, Yang Bai:
FastTune: Timely and Precise Congestion Control in Data Center Network. 238-245 - Chunhua Xiao, Dandan Xu, Shi Qiu, Chen Shi, Kun Ning:

FGPA: Fine-Grained Pipelined Acceleration for Depthwise Separable CNN in Resource Constraint Scenarios. 246-254 - Junchao Ma, Dezun Dong, Cunlu Li, Ke Wu, Liquan Xiao

:
PAARD: Proximity-Aware All-Reduce Communication for Dragonfly Networks. 255-262 - Lanju Kong, Yaming Dou, Qingqing Yin, Xinping Min, Qingzhong Li:

WST+iMPT: A High-performance Incremental Verification World State Model for Massive Accounts. 263-270 - Penghao Zhang, Heng Pan, Zhenyu Li, Gaogang Xie, Penglai Cui:

NetANNS: A High-Performance Distributed Search Framework Based On In-Network Computing. 271-278 - Lizhi Zhang, Zhiquan Lai, Yu Tang, Dongsheng Li, Feng Liu, Xiaochun Luo:

PCGraph: Accelerating GNN Inference on Large Graphs via Partition Caching. 279-287 - Zhen Xu, Wenbo Zhang:

QuickCDC: A Quick Content Defined Chunking Algorithm Based on Jumping and Dynamically Adjusting Mask Bits. 288-299 - Xinmeng Li, Nengguang Luo, Dan Tang, Zhiqing Zheng, Zheng Qin, Xinxiang Gao:

BA-BNN: Detect LDoS Attacks in SDN Based on Bat Algorithm and BP Neural Network. 300-307 - Ziyue Xu, Lixiao Cui, Gang Wang, Xiaoguang Liu:

Alter: Towards Optimizing Persistent Indexes in Hybrid Memory Systems. 308-315 - Jiaming Huang, Chuming Xiao, Weigang Wu, Ye Yin, Hongli Chang:

MADC: Multi-scale Attention-based Deep Clustering for Workload Prediction. 316-323 - Yuzhao Wang, Junqing Yu, Zhibin Yu:

Treator: a Fast Centralized Cluster Scheduling at Scale Based on B+ Tree and BSP. 324-335 - Tao Zhong, Junsheng Chang, Peichang Shi, Linhui Li, Fei Gao:

Dyacon: JointCloud Dynamic Access Control Model of Data Security Based on Verifiable Credentials. 336-343 - Li Lin, Shuang Li, Xuhui Lv, Bo Li:

BTDetect: An Insider Threats Detection Approach Based on Behavior Traceability for IaaS Environments. 344-351 - Shuai Ding, Daoqing Zhang, Jingguo Ge, Xiaowei Yuan, Xinhui Du:

Encrypt DNS Traffic: Automated Feature Learning Method for Detecting DNS Tunnels. 352-359 - Shuyue Ma, Shudian Song, Lingyu Yang, Jingmei Zhao, Feng Yang, Linbo Zhai:

IMOPSOQ: Offloading Dependent Tasks in Multi-access Edge Computing. 360-367 - Xinxuan Huang, Jigang Wu, Jiaxing Li

, Chengpeng Xia:
BEADS: Blockchain-Empowered Auction in Decentralized Storage. 368-373 - Qizhen Xu, Zhijie Zhang

, Lin Zhang, Liwei Chen, Gang Shi:
Finding Runtime Usable Gadgets: On the Security of Return Address Authentication. 374-381 - Xiaobo Guo, Fali Wang, Neng Gao, Zeyi Liu, Kai Liu:

ConvMB: Improving Convolution-Based Knowledge Graph Embeddings by Adopting Multi-Branch 3D Convolution Filters. 382-389 - Xiu Ma, Guangli Li, Lei Liu, Huaxiao Liu, Lei Liu, Xiaobing Feng:

Understanding the Runtime Overheads of Deep Learning Inference on Edge Devices. 390-397 - Jiaquan Yan, Yalan Wu, Jigang Wu, Long Chen:

Parameter Servers Placement for Distributed Deep Learning in Edge computing. 398-404 - Haiyang Lin

, Mingyu Yan, Duo Wang, Wenming Li, Xiaochun Ye, Zhimin Tang, Dongrui Fan
:
Alleviating Imbalance in Synchronous Distributed Training of Deep Neural Networks. 405-412 - Bin Dai, Tao Ren, Jianwei Niu

, Zheyuan Hu, Shucheng Hu, Meikang Qiu:
A Distributed Computation Offloading Scheduling Framework based on Deep Reinforcement Learning. 413-420 - Shiqin Liu, Shiyuan Feng, Jinxia Wu, Wei Ren, Weiqi Wang

, Wenwen Zheng:
Exploration of the Influence on Training Deep Learning Models by Watermarked Image Dataset. 421-428 - Zhiyi Gui, Xiang Yang, Hao Yang, Wei Li, Lei Zhang, Qi Qi, Jingyu Wang

, Haifeng Sun, Jianxin Liao:
Grouping Synchronous to Eliminate Stragglers with Edge Computing in Distributed Deep Learning. 429-436 - Degan Zhang, Hong-rui Fan, Jie Zhang:

Novel Resource Allocation Algorithm of Edge Computing Based on Deep Reinforcement Learning Mechanism. 437-444 - Zhijun Wu, Cheng Liang, Yuqi Li:

Intrusion Detection Method based on Deep Learning. 445-452 - Yang Liang, Zhigang Hu, Liu Yang:

A Two-stage Replica Management Mechanism for Latency-Aware Applications in Multi-Access Edge Computing. 453-459 - Pengwei Wang, Yajun Zhao, Zhaohui Zhang:

Joint Optimization of Data Caching and Task Scheduling based on Information Entropy for Mobile Edge Computing. 460-467 - Tian Dong, Han Qiu, Jialiang Lu, Meikang Qiu, Chun Fan:

Towards Fast Network Intrusion Detection based on Efficiency-preserving Federated Learning. 468-475 - Shili Yan, Bing Tang, Jincheng Luo, Xing Fu, Xiaoyuan Zhang:

Unsupervised Anomaly Detection with Variational Auto-Encoder and Local Outliers Factor for KPIs. 476-483 - Yingjun Ye

, Yongdong Zhang, Weicai Ye:
An application-level failure detection algorithm based on a robust and efficient torus-tree for HPC. 484-492 - Chuanjia Hou, Tong Jia, Yifan Wu, Ying Li, Jing Han:

Diagnosing Performance Issues in Microservices with Heterogeneous Data Source. 493-500 - Zhongyang Wang, Yijie Wang, Zhenyu Huang, Yongjun Wang:

Entropy and Autoencoder-Based Outlier Detection in Mixed-Type Network Traffic Data. 501-508 - Jingxuan Kang

, Bin Zang, Weipeng Cao:
Domain Adaptive Semantic Segmentation via Image Translation and Representation Alignment. 509-516 - Lingyao Chen, Kang Xu, Xiaoying Zheng, Yongxin Zhu, Yi Jing:

Image Distillation Based Screening for X-ray Crystallography Diffraction Images. 517-521 - Ziheng Zhou, Hong Guo, Yuwen Guo, Huanhuan Sheng:

Synthesis and Segmentation Method of Cross-Staining Style Nuclei Pathology Image Based on Adversarial Learning. 522-532 - Rui Miao

, Hongxu Jiang, Fangzheng Tian, Xiaobin Li, Yonghua Zhang, Dong Dong:
Real-Time Ship detection from Infrared Images Through Multi-feature Fusion. 533-538 - Gang Qiu, Yanli Guo:

Movie Big Data Intelligent Recommendation System Based on Knowledge Graph. 539-546 - Jihe Wang, Hao Chen, Danghui Wang, Kuizhi Mei, Shengbing Zhang, Xiaoya Fan:

A Heterogeneous Stochastic Computing Multiplier for Universally Accurate and Energy-Efficient DNNs. 547-554 - Yu Han, Wei Hu, Jing Liu, Yu Gan:

Energy-Efficient Scheduling Algorithms with Reliability Goal on Heterogeneous Embedded Systems. 555-562 - Qinnan Qiu, Yongmei Lei, Dongxia Wang, Guozheng Wang:

An efficient hybrid MPI/OpenMP parallelization of the asynchronous ADMM algorithm. 563-570 - Suna He, Jigang Wu, Bing Wei

, Jiaxin Wu:
Task Tree Partition and Subtree Allocation for Heterogeneous Multiprocessors. 571-577 - Hao Shi, Yixiang Chen, Jinyi Xu:

An Efficient Scheduling Algorithm for Distributed Heterogeneous Systems with Task Duplication Allowed. 578-587 - Jiong Zhang, Biao Wang, Hongjun Dai:

An Effective Outlier Detection Method for EAF Based on an Iterative Heterogeneous Ensemble. 588-593 - Qingyuan Jiang, Jinyi Xu, Yixiang Chen:

A Genetic Algorithm for Scheduling in Heterogeneous Multicore System Integrated with FPGA. 594-602 - Weiyu Tan, Tian Ling, Zhenyu Zeng, Ying Tao, Yuxia Cheng:

Learning Heterogeneous DAG Tasks Scheduling Policies With Efficient Neural Network Evolution. 603-610 - Hong Guo, Cui Hanjing:

An Edge Computing Architecture and Application Oriented to Distributed Microgrid. 611-617 - Yifan Liang, Hongjun Dai:

Application Virtualization: An Agent Encapsulation of Software in Virtual Machines to Archive the Execution Performance in Hosts. 618-625 - Zhijun Wu, Junjun Guo, Weihang Cui:

Analysis of BBR's Non-queuing Optimal Model. 626-631 - Jianfeng An, Hongjun You, Jinhua Sun, Jiawei Cao:

Fault Tolerant XY-YX Routing Algorithm Supporting Backtracking Strategy for NoC. 632-635 - Hong Guo, Guo Nan:

Research and Application of a Multidimensional Association Rules Mining Algorithm Based on Hadoop. 636-643 - Shuyu Wu, Linghe Kong

, Qiao Xiang, Zhenzhe Zheng, Luoyi Fu, Guihai Chen:
A Lightweight, Privacy-Preserving Tensor Completion Framework for Internet of Things. 644-651 - Jiang Zhou, Lin Su

, Weiping Wang, Yong Chen:
Hashing Based Data Distribution in Heterogeneous Storage. 652-659 - Tanhong Chen, Tao Ren, Jianwei Niu

, Qingfeng Li:
A Novel Shape-based Robotic Sorting Approach based on Computer Vision. 660-667 - Yaqiong Ma, Xiangyu Bai, Zhaoran Wang:

Trajectory Privacy Protection Method based on Shadow vehicles. 668-673 - Ying Huang, Xiaoying Zheng, Yongxin Zhu, Xiangcong Kong

, Xinru Jing:
CPU-GPU Collaborative Acceleration of Bulletproofs - A Zero-Knowledge Proof Algorithm. 674-680 - Jiayi Lai, Lin Gan, Lanning Wang:

Mixed-precision Methods to Reconstruct Numerical Ocean Simulations. 681-688 - Xiaoyun Dong, Zhenchao Ouyang

, Zeling Guo, Jianwei Niu
:
Polarmask-Tracker: Lightweight Multi-Object Tracking and Segmentation Model for Edge Device. 689-696 - Jinyu Wang, Yifei Kang, Yiwen Li, Weiguo Wu, Song Liu, Longxiang Wang:

Hexagonal Tiling based Multiple FPGAs Stencil Computation Acceleration and Optimization Methodology. 697-705 - Syeed Abrar Zaoad, Tauhid Tanjim

, Mir Hasan, Md. Mamun-Or-Rashid, Ibrahem Abdullah Almansour, Md. Mosaddek Khan:
Accelerating Message Passing Operation of GDL-Based Constraint Optimization Algorithms Using Multiprocessing. 706-714 - Yuekai Zhao, Jianzhuang Lu, Xiaowen Chen:

Vectorized Winograd's algorithm for Convolution Neural networks. 715-722 - Lihua Song, Yuzhu Jin, Pengyu Wang, Dongchao Ma, Wenlong Chen, Laizhong Cui:

Multi-path Routing Deployment Method Based on SRv6. 723-730 - Shanshan Shi, Jun Li, Bin Han

, Haibo Wu
, Yuxiang Ma, Qian Dong, Hans D. Schotten:
Multi-Path Forwarding Strategy for Named Data Networking Based on Pending Interests and Available Bandwidth. 731-737 - Ying Zeng, Minghua Wang, Bo Fan:

Cooperative Charging Algorithm Based on K-mean++ Clustering for WRSN. 738-744 - Wentao Dong, Zhuo Li, Xin Chen:

Deep Reinforcement Learning-based Adaptive Clustering Approach in Short Video Sharing through D2D Communication. 745-752 - Xin Shen, Zhuo Li, Xin Chen:

Optimization for Node Cooperation in Hierarchical Federated Learning. 753-760 - Tingting Zhang, Mingqi Zhang, Lintao Yang, Tao Dong, Jie Yin, Zhihui Liu, Jing Wu, Hao Jiang

:
Satellite Network Traffic Scheduling Algorithm Based on Multi-Agent Reinforcement Learning. 761-768 - Luis Herrera-Huisa, Nicole Arias-Meza, Michael Cabanillas-Carbonell

:
Analysis of the use of Machine Learning in the detection and prediction of hypertension in COVID 19 patients. A review of the scientific literature. 769-775 - Shuyu Chen, Shiyong Sun, Haopeng Chen, Jinteng Ruan, Ziming Wang:

A Game Theoretic Approach to Task Offloading for Multi-Data-Source Tasks in Mobile Edge Computing. 776-784 - Yanrong Lu, Meng Yue, Zhijun Wu:

Content Security over ICN based Smart Grid: A Cryptographic Solution. 785-791 - Dawei Li, Yingxian Song, Lixin Zhang

, Di Liu, Baoquan Ma, Zhenyu Guan:
Unified Authentication Scheme for IoT Blockchain Based on PUF. 792-798 - Zhenyu Guan, Xiaoqing Wen, Dawei Li, Mai Xu, Haihua Li:

A Blockchain-based Verified Locating Scheme for IoT Devices. 799-805 - Yongqing Zhu, Zhenyu Guan, Ziyi Wang, Dawei Li, Yawei Wang, Mai Xu:

SRAM-PUF Based Lightweight Mutual Authentication Scheme for IoT. 806-813 - Jiaofu Zhang, Lianzhong Liu, Zihang Huang, Lihua Han, Shuhai Wang, Tongge Xu, Jingyi Zhang, Yangyang Li, Yifeng Liu, Md. Zakirul Alam Bhuiyan:

Robust Social Event Detection via Deep Clustering. 814-819 - Linlin Liu, Minghua Wang, Yan Wang:

An Energy-balanced Routing by Considering Neighbor Node's Energy Based on Small World WSN. 820-825 - Liuhui Ding, Dachuan Li, Bowen Liu, Wenxing Lan, Bing Bai, Qi Hao

, Weipeng Cao, Ke Pei:
Capture Uncertainties in Deep Neural Networks for Safe Operation of Autonomous Driving Vehicles. 826-835 - Xingshuo Han, Kangjie Chen, Yuan Zhou

, Meikang Qiu, Chun Fan, Yang Liu
, Tianwei Zhang:
A Unified Anomaly Detection Methodology for Lane-Following of Autonomous Driving Systems. 836-844 - Chen Zhao, Jiaqi Yin, Huibiao Zhu, Ran Li

:
Modeling and Verifying Ticket-Based Authentication Scheme for IoT Using CSP. 845-852 - Pengfei Yue, Ru Li, Bin Pang:

The Random Content Poisoning Attack in NDN. 853-860 - Guoliang Yang, Mengqi Xiong, Guangsheng Feng, Yuzheng Liu, Yun Huang:

Distributed V2V Computing Offloading Method Based on Delay and Fairness Awareness. 861-867 - Feifei Liu

, Di Liu, Yu Sun, Dawei Li, Jian Cui, Zhenyu Guan, Jianwei Liu
:
Secure Vehicle Platooning Protocol for 5G C-V2X. 868-875 - Ya-Nan Cao, Yujue Wang, Yong Ding

, Haibin Zheng, Zhenyu Guan, Huiyong Wang:
A PUF-based Lightweight Authenticated Metering Data Collection Scheme with Privacy Protection in Smart Grid. 876-883 - Lemei Da, Yujue Wang, Yong Ding

, Wanjun Xiong, Huiyong Wang, Hai Liang
:
An Efficient Certificateless Signcryption Scheme for Secure Communication in UAV Cluster Network. 884-891 - Tongshuai Wu

, Liwei Chen, Gewangzi Du, Chenguang Zhu, Gang Shi:
Self-Attention based Automated Vulnerability Detection with Effective Data Representation. 892-899 - Ke Yu, Hongwang Xiao, Ying Zhao

, Jiao Tian, Jinjun Chen:
A Framework for Deep Q-Learning Based Hybrid DVFS Algorithms for Real-Time Systems. 900-907 - Jinyu Cheng, Kai Zhao, Yuanchao Xu:

Global-view based Task Migration for Deep Learning Processor. 908-915 - Jianyu Chen, Keke Gai, Peng Jiang

, Liehuang Zhu:
Heuristic-based Blockchain Assignment: An Empirical Study. 916-923 - Chongyou Xu, Guangxian Lv, Jian Du, Lei Chen, Yu Huang, Wang Zhou:

Kubeflow-based Automatic Data Processing Service for Data Center of State Grid Scenario. 924-930 - An Da, Rui Zhang, Shuang Li, Weipeng Cao:

Target-oriented Self Training for Heterogeneous Domain Adaptation. 931-938 - Ningjing Liang, Xingjun Zhang, Xurui Wu, Heng Chen, Changjiang Zhang:

An Endurance-aware RAID-6 Code with Low Computational Complexity and Write Overhead. 939-946 - Shikui Zhang, Ce Chi, Kaixuan Ji, Zhiyong Liu, Fa Zhang, Penglei Song, Huimei Yuan, Dehui Qiu, Xiaohua Wan:

A new meta-heuristic task scheduling algorithm for optimizing energy efficiency in data centers. 947-954 - Wenting Wang, Xianghua Fu

, Xinze Lin:
Edge-Based Sampling for Complex Network with Self-Similar Structure. 955-962 - Anping Song, Yi Dai, Ruyi Ji, Ziheng Song:

Extend PBFT Protocol with L-DAG. 963-970 - Shintaro Narisada, Kazuhide Fukushima

, Shinsaku Kiyomoto:
Fast GPU Implementation of Dumer's Algorithm Solving the Syndrome Decoding Problem. 971-977 - Xiaobin Li, Hongxu Jiang, Fangzheng Tian, Yonghua Zhang, Rui Miao, Donghuan Xu:

Optimal FPGA-oriented lightweight network architecture search under multi-objective constraints. 978-983 - Wuji Liu, Qianwen Ye, Chase Q. Wu, Yangang Liu, Xin Zhou

, Yunpeng Shan:
Machine Learning-assisted Computational Steering of Large-scale Scientific Simulations. 984-992 - Han Huang, Hua Luan:

Rethinking Insertions to B+-Trees on Coupled CPU-GPU Architectures. 993-1001 - Jacek Gambrych

:
Influence of optimization techniques on software performance for subsequent generations of CUDA architecture. 1002-1009 - Xiang Hou, Rui Xu, Sheng Ma, Qiong Wang, Wei Jiang, Hongyi Lu:

Co-designing the Topology/Algorithm to Accelerate Distributed Training. 1010-1018 - Xiandong Huang, Qinglin Wang, Shuyu Lu, Ruochen Hao, Songzhu Mei, Jie Liu:

NUMA-aware FFT-based Convolution on ARMv8 Many-core CPUs. 1019-1026 - Ji Li, Zewei Chen, Xin Liu:

Deep reinforcement learning for partial offloading with reliability guarantees. 1027-1034 - Huiling Meng, Yaobin Wang, Ling Li, Manasah Musariri, Xinyi Wang:

Parallel analysis of TACLeBench kernel benchmark's loop and procedure level speculation. 1035-1040 - Kangkang Li, Yitao Qiu, Kaiqiang Zhang, Congfeng Jiang, Jian Wan:

Cost-Aware Virtual Cluster Placement in Software-Defined Cloudlet Networks. 1041-1052 - Zhiwei Guo

, Dian Meng, Huiyan Zhang, Heng Wang, Keping Yu
:
Enhancing Matrix Factorization-based Recommender Systems via Graph Neural Networks. 1053-1059 - Lei Zhang, Xuefei Chen, Yuxiang Ma:

A Similarity-Based Method for Base Station Selection in 5G Networks. 1060-1066 - Chunhua Xiao, Wei Ran, Fangzhu Lin, Lin Zhang:

Dynamic Fine-Grained Workload Partitioning for Irregular Applications on Discrete CPU-GPU Systems. 1067-1074 - Lin Chen

, Kang He, Hao Jiang, Roberto Barrio, Jie Liu, Tiejun Li:
Quantization improvements for LU Decomposition to Solve Linear Equations. 1075-1082 - Zhipeng Li, Yan Ding, Xiaofan Chen, Pan Dong, Chenlin Huang, Liantao Song, Peng Wang:

Agile Approach on the Performance Prediction of ARM TrustZone-based Mandatory Access Control Security Enhancement. 1083-1090 - Edward Chuah

, Arshad Jhumka, Samantha Alt, R. Todd Evans, Neeraj Suri
:
Failure Diagnosis for Cluster Systems using Partial Correlations. 1091-1101 - Caihong Zhao

, Wenpeng Neng:
A Sleep Stage Classification Method via Combination of Time and Frequency Domain Features based on Single-Channel EEG. 1102-1109 - Jie Zhang, Kefan Li, Baoming Zhang, Ming Xu, Chongjun Wang:

QMIMC: Q-Learning Model Based on Imperfect-information under Multi-agent Crowdtesting. 1110-1117 - Chengzhen Meng, Hongjun Dai:

An Obstacle Avoidance Method Based on Advanced Rapidly-exploring Random Tree for Autonomous Navigation. 1118-1125 - Luming Yang, Shaojing Fu, Yongjun Wang, Chao Li, Shanghuai Feng, Yuchuan Luo, Lin Liu:

Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application Traffic. 1126-1134 - Qixun Zhang, Tong Jia, Wensheng Xia, Ying Li, Zhonghai Wu, Jing Han:

Mining Configuration Items From System Logs through Distant Supervision. 1135-1142 - Shiyu Wang, Shengbing Zhang, Jihe Wang, Libo Chang, Liangyou Feng, Xiaoya Fan:

Hardware architecture design of HEVC entropy decoding. 1143-1150 - Junsung Yook, Bernhard Egger:

Modeling Cache and Application Performance on Modern Shared Memory Multiprocessors. 1151-1158 - Jinhua Du, Xianming Gao, Jingchao Wang, Shaohua Liu, Weipeng Cao, Yanbo Song

, Shanqing Jiang
:
Research on An Approach of ARP Flooding Suppression in Multi-Controller SDN Networks. 1159-1166 - Wei Gao, Meihong Yang, Wei Zhang, Yuhan Zhao, Yan Zhou, Kai Zhang:

FFDNet-Based Channel Estimation for Beamspace mmWave Massive MIMO Systems. 1167-1170 - Ziheng Wang

, Heng Chen, Weiling Cai:
A hybrid CPU/GPU Scheme for Optimizing ChaCha20 Stream Cipher. 1171-1178 - Junwei Zhou, Qian Wei, Chao Wu, Guangzhong Sun:

A High Performance Computing Method for Noise Cross-Correlation Functions of Seismic Data. 1179-1182 - Jianmin Zhang, Tiejun Li, Yan Sun:

A Two-level Concurrent Address Translation Cache of High Performance Interconnect Network. 1183-1188 - Hongbo Li, Tao Xie, Jin Xie:

A Decentrlized Trading Model Based on Public Blockchain with Regulatable Bi-Tierred Identities. 1189-1198 - Xiaofeng Chen, Zhiguang Chen, Yutong Lu, Dan Huang:

A Fine-grained Optimization to Winograd Convolution Based on Micro-architectural Features of CPU. 1199-1208 - Yonghua Zhang, Hongxu Jiang, Xiaobin Li, Rui Miao, Jinyan Nie, Yu Du:

Energy-Efficient CNNs Accelerator Implementation on FPGA with Optimized Storage and Dataflow. 1209-1214 - Wenwen Zheng, Weiqi Wang

, Wei Ren, Shiyuan Feng, Shiqin Liu, Yi Ren:
A User Behavior-Based Random Distribution Scheme for Adversarial Example Generated CAPTCHA. 1215-1221 - Xingyi Yuan, Long Chen, Jiale Huang, Jigang Wu:

Coalitional Double Auction for Ride-Sharing with Buyout Ask Price. 1222-1229 - Wei Jiang, Rui Xu, Sheng Ma, Qiong Wang, Xiang Hou, Hongyi Lu:

A Memory Saving Mechanism Based on Data Transferring for Pipeline Parallelism. 1230-1235 - Qingxian Wang, Renjian Zhang, Kangkang Ma, Bo Chen, Jiufang Chen, Xiaoyu Shi:

Siamese Generative Adversarial Predicting Network for Extremely Sparse Data in Recommendation System. 1236-1241 - Zihang Huang, Lianzhong Liu, Jiaofu Zhang, Lihua Han, Shuhai Wang, Tongge Xu, Yangyang Li, Yifeng Liu, Md. Zakirul Alam Bhuiyan:

Semantic Social Event Evolution Discovering. 1242-1247 - Mingqi Li, Hong Guo, Jing Liu, Yu Gan, Wei Hu:

Decrease Iteration Time Deterministic Cyclic Scheduling for Real-time Periodic Tasks. 1248-1254 - Ruixue Li, Jing Wu, Ning Li, Ruiliang Song:

Blind Zone Performance Enhancement with THz Communication. 1255-1260 - Siyuan Zheng, Changqing Yin, Bin Wu:

Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain. 1269-1278 - Fang Liu, Zimeng Fan, Yanxiang He, Min Peng:

Software-Hardware Co-Optimization for CNNs Based on Reconfigurable Devices. 1279-1286 - Weiran Wang, Jing Wu, Ning Li, Ruiliang Song:

Joint User Association and Resource Allocation for MmWave and THz Coexistence Networks. 1287-1294 - Zheyuan Hu, Renluan Hou, Jianwei Niu

, Xiaolong Yu, Tao Ren, Qingfeng Li:
Object Pose Estimation for Robotic Grasping based on Multi-view Keypoint Detection. 1295-1302 - Huayan Yu, Xin Li, Ligang Yuan, Xiaolin Qin:

Efficient Spatio-Temporal-Data-Oriented Range Query Processing for Air Traffic Flow Statistics. 1303-1310 - Jingyuan Zhao, Xin Liu, Yao Liu, Penglong Jiao, Jinshuo Liu, Wei Xue:

Profiling HPC Applications with Low Overhead and High Accuracy. 1311-1319 - Chang Shu, Yan Wang, Jianxi Fan, Huanwen Zhang:

Fault-Tolerant Routing of Generalized Hypercubes under 3-Component Connectivity. 1320-1327 - Xiangyu Gao, Meikang Qiu, Zhen He:

Big Data Analysis with Momentum Strategy on Data-driven Trading. 1328-1335 - Dasheng Liu, Jianping Wu, Tao Jiang, Yingjie Wang, Xiaotian Pan, Penglun Li:

Optimization of the parallel semi-Lagrangian scheme in the YHGSM based on the adaptive maximum wind speed. 1336-1344 - Yuantong Zhang, Liwei Chen, Xiaofan Nie, Zhijie Zhang, Haolai Wei, Gang Shi:

Accelerating Data-Flow Analysis with Full-Partitioning. 1345-1352 - Ziqiang Weng, Weiyu Zhang

, Zhongxiu Xia:
Adaptive attention encoder for attribute graph embedding. 1353-1359 - Weicai Ye, Hao Wu, Zhijun Tan, Qingsong Zou:

An Adaptive Time Stepping Algorithm and Its Application to Platelet Aggregation Simulation. 1360-1369 - Jia Wei, Xingjun Zhang, Zeyu Ji, Jingbo Li, Zheng Wei:

PANDA: Population Automatic Neural Distributed Algorithm for Deep Leaning. 1370-1377 - Fanchao Meng, Qingran Ji, Dianhui Chu, Xuequan Zhou:

Modeling and Solution Algorithm of Virtual Machines Optimization Provision Problem for Application Deployment in Public Cloud. 1378-1385 - Junhang Wu, Ruimin Hu, Dengshi Li, Yilin Xiao

, Lingfei Ren, Wenyi Hu:
Multi-network Embedding for Missing Point-of-Interest Identification. 1386-1393 - Yuyang Liu, Yuxiang Ma, Junruo Gao, Zefang Zhao, Jun Li:

Coupled Self-Exciting Process for Information Diffusion Prediction. 1394-1401 - Yue Gao, Jinqiao Shi, Xuebin Wang, Ruisheng Shi, Zelin Yin, Yanyan Yang:

Practical Deanonymization Attack in Ethereum Based on P2P Network Analysis. 1402-1409 - Jinyu Wang, Yifei Kang, Yaqi Feng, Yiwen Li, Weiguo Wu, Guoliang Xing:

Lossless Compression of Bitstream Configuration Files: Towards FPGA Cloud. 1410-1421 - Ting Xiong, Tao Xie, Jin Xie, Xiaochun Luo:

ORIC: A Self-Adjusting Blockchain Protocol with High Throughput. 1422-1434 - Jianguo Sun, Yuqing Qiao, Zechao Liu, Yitao Chen, Yang Yang:

Practical Multi-Authority Ciphertext Policy Attribute-Based Encryption from R-LWE. 1435-1443 - Jie Zhang, Kefan Li, Baoming Zhang, Ming Xu, Chongjun Wang:

Parallel Counterfactual Regret Minimization in Crowdsourcing Imperfect-information Expanded Game. 1444-1451 - Shang Wu, Yijie Wang:

Attention-based Encoder-Decoder Recurrent Neural Networks for HTTP Payload Anomaly Detection. 1452-1459 - Xingguang Zhou, Ziyu Meng, Yi Liu:

Fast Settlement Scheme of Aviation Business Privacy Preservation Based on Consortium Blockchain. 1460-1468 - Zhenyu Guan, Lixin Zhang

, Yingpeng Zhang, Dawei Li, Yu Sun, Jian Cui:
Off-chain Anonymous Payment Channel Scheme based on Mimblewimble. 1469-1475 - Yuxiang Ma, Xuefei Chen, Lei Zhang:

Base Station handover Based on User Trajectory Prediction in 5G Networks. 1476-1482 - Mengqi Li, Liang Liu, Yanlin Wang, Jianfei Peng, Jie Xi, Lisong Wang:

Efficient Wireless Static Chargers Deployment for UAV Networks. 1483-1490 - Anantaa Kotal, Anupam Joshi, Karuna Pande Joshi:

The Effect of Text Ambiguity on creating Policy Knowledge Graphs. 1491-1500 - Naghmeh Dezhabad, Sudhakar Ganti, Gholamali C. Shoja:

An Optimum Decision Making Framework for Allocating Spot Instances to Execute Batch Workload in Cloud. 1501-1508 - Bin Li, Teng Liu:

An Analysis of Multi-Modal Deep Learning for Art Price Appraisal. 1509-1513 - Regina Marin, Luciano Gallegos:

A Survey on Privacy Approaches for Social Networks. 1514-1521 - Sarthak Khanal, Rus Refati, Kyle Glandt, Doina Caragea, Sifan Xu, Chien-Fei Chen:

Using Content Analysis and Machine Learning to Identify COVID-19 Information Relevant to Low-income Households on Social Media. 1522-1531 - Leyu Gao, Sandeep Shah, Nasser Assery, Xiaohong Yuan, Xiuli Qu, Kaushik Roy:

Semi-Supervised Self Training to Assess the Credibility of Tweets. 1532-1537 - Hieu Nguyen, Jihye Moon, Nijhum Paul, Swapna S. Gokhale:

Sarcasm Detection in Politically Motivated Social Media Content. 1538-1545 - Oladapo Oyebode

, Rita Orji:
MediNER: Understanding Diabetes Management Strategies Based on Social Media Discourse. 1546-1553 - Danghui Wang, Zhaoqing Wang, Linfan Yu, Ying Wu, Jiaqi Yang, Kuizhi Mei, Jihe Wang:

A Survey of Stochastic Computing in Energy-Efficient DNNs On-Edge. 1554-1561 - Pietro Tedeschi

, Savio Sciancalepore
, Roberto Di Pietro:
Modelling a Communication Channel under Jamming: Experimental Model and Applications. 1562-1573 - Matthew Wilchek

, Yingjie Wang
:
Synthetic Differential Privacy Data Generation for Revealing Bias Modelling Risks. 1574-1580 - Anshika Rawat, Marijn Janssen, Mortaza S. Bargh, Sunil Choenni:

Designing a User Interface for Improving the Usability of a Statistical Disclosure Control Tool. 1581-1591 - Sana Imtiaz, Zannatun N. Tania, Hassan Nazeer Chaudhry, Muhammad Arsalan, Ramin Sadre, Vladimir Vlassov:

Machine Learning with Reconfigurable Privacy on Resource-Limited Computing Devices. 1592-1602 - Parjanya Vyas, R. K. Shyamasundar, Bhagyesh V. Patil, Snehal Borse, Satyaki Sen:

SP*: An Information Flow Secure Linux. 1603-1612 - Anjie Chen, Zhibing Zhang:

A Comparative Study of Credentialed Vulnerability Scanning and Non-credentialed Vulnerability Scanning. 1613-1616 - Ahmed Aleroud, Faten Masalha, Ahmad A. Saifan:

Identifying GDPR Privacy Violations Using an Augmented LSTM: Toward an AI-based Violation Alert Systems. 1617-1624 - Siyuan Zheng, Changqing Yin, Bin Wu:

Malicious Conspiracy on Permissioned Blockchain to Mount Denial-of-endorsement Attacks. 1625-1630 - Wojciech Wasko, Dotan David Levi, Teferet Geula, Amit Mandelbaum:

Artificial Accurate Time-stamp in Network Adapters. 1631-1638 - Nikumani Choudhury, Moustafa M. Nasralla, Prakhar Gupta, Ikram Ur Rehman

:
Centralized Graph based TSCH Scheduling for IoT Network Applications. 1639-1644 - Yen-Hung Frank Hu

, Chung-Chu George Hsieh:
A Study of Classifying Advanced Persistent Threats With Multi-Layered Deep Learning Approaches. 1645-1650 - Federico Gerardi, Giacomo Iadarola, Fabio Martinelli, Antonella Santone, Francesco Mercaldo:

Perturbation of Image-based Malware Detection with Smali level morphing techniques. 1651-1656 - Alexander O'Mara, Izzat Alsmadi, Ahmed Aleroud:

Generative Adverserial Analysis of Phishing Attacks on Static and Dynamic Content of Webpages. 1657-1662 - Weiwei Miao, Zeng Zeng, Mingxuan Zhang, Siping Quan, Zhen Zhang, Shihao Li, Li Zhang, Qi Sun:

Workload Prediction in Edge Computing based on Graph Neural Network. 1663-1666 - Ali Hussein Raheem, Rand Raheem, Thomas M. Chen, Ahmed Alkhayyat:

Estimation of Ransomware Payments in Bitcoin Ecosystem. 1667-1674 - Dingkun Yang, Nan Zhao, Hongshuang Ma, Jiasheng Yang:

Provisioning with Fine-grained Affinity for Container-enabled Cloud-edge System. 1675-1681 - Zeng Zeng, Weiwei Miao, Shihao Li, Xiaoyun Liao, Mingxuan Zhang, Rui Zhang, Changzhi Teng:

Adaptive Task Scheduling in Cloud-Edge System for Edge Intelligence Application. 1682-1689 - Bo Ma, Kuncheng Zhuo, Zanyou Su, Donghai Huang, Yonglong Zou:

The Design of Network Query System for Automobile Inspection Data. 1690-1696 - Feng Jing, Ying Jiang, Shengbin Chen, Xirong Lv, Jiayi He:

Optimization of key and value storage in vector map rendering. 1697-1704 - Bo Zhang, Kuncheng Zhuo, Yifan Lan, Dayuan Chen:

Intelligent Movement Method for Trajectory Map Matching. 1705-1709 - Bo Ma, Zanyou Su, Kuncheng Zhuo, Meng Li, Donghai Huang, Chuyi Yu, Ying Ma:

Research and Development of Enterprise Data Security Transmission Management System. 1710-1716 - Feng Jing, Donghai Huang, Yifei Wang, Xirong Lv, Qi Du:

Remote Sensing Data Backup and Recovery System for Power Industry. 1717-1723 - Yanqi Xie, Xirong Lv, Ying Jiang, Zanyou Su, Nan Luo, Ying Ma:

A software defect detection algorithm based on asymmetric classification evaluation. 1724-1728 - Weiwei Miao, Zeng Zeng, Mingxuan Zhang, Siping Quan, Zhen Zhang, Shihao Li, Li Zhang, Qi Sun:

Multi-Agent Reinforcement Learning for Edge Resource Management with Reconstructed Environment. 1729-1736 - Weiwei Miao, Zeng Zeng, Shihao Li, Lei Wei, Chengling Jiang, Siping Quan, Yong Li:

Microservice Replacement Algorithm in Cloud-Edge System for Edge Intelligence. 1737-1744 - Christelle Nader, Elias Bou-Harb:

Revisiting IoT Fingerprinting behind a NAT. 1745-1752 - Gianpiero Costantino, Ilaria Matteucci

, Davide Micale, Giuseppe Patanè:
Private Drivers Identification based on users' routine. 1753-1762 - Martin Vivian, Ramin Sadre:

Reverse-Engineering the Physical Configuration of Smart Homes. 1763-1770 - Mohd Khan, Yu Chen:

A Randomized Switched-Mode Voltage Regulation System for IoT Edge Devices to Defend Against Power Analysis based Side Channel Attacks. 1771-1776

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














