


default search action
SmartCloud 2021: Newark, NJ, USA
- 6th IEEE International Conference on Smart Cloud, SmartCloud 2021, Newark, NJ, USA, November 6-8, 2021. IEEE 2021, ISBN 978-1-6654-4374-6

- Yeting Huang, Hancui Zhang:

A Safety Vehicle Detection Mechanism Based on YOLOv5. 1-6 - Jing Long, Fei Fang, Haibo Luo:

A Survey of Machine Learning-based IoT Intrusion Detection Techniques. 7-12 - Ke Ren, Peng Jiang

, Keke Gai, Liehuang Zhu, Jingjing Huang:
SM9-based Traceable and Accountable Access Control for Secure Multi-user Cloud Storage. 13-18 - Liangqun Huang, Lei Xu, Liehuang Zhu, Keke Gai:

A Blockchain-Assisted Privacy-Preserving Cloud Computing Method with Multiple Keys. 19-25 - Jiapeng Li, Hua Huang:

Research Study on Edge Computing. 26-32 - Jatin Patel, Talal Halabi

:
Optimizing the Performance of Web Applications in Mobile Cloud Computing. 33-37 - Zisang Xu, Jianbo Xu, Li-Dan Kuang

:
A Token-based Authentication and Key Agreement Protocol for Cloud Computing. 38-43 - Tong Zhu, Ziyang Zhou, Chenyang Liao, Xinyu Li, Qingfu Zhang:

Unsupervised Learning Based Detection Method for The Life Cycle of Virtual Cryptocurrency. 44-50 - Jiawei Ye, Jiaqian Li, AiErPan Jiang, Chengrong Wu:

PF_RING-TA: A Traffic-adaptive Method of Packet Capturing by Enhancing PF_Ring. 51-56 - Cheng Zhang:

Time-To-Live Based Caching Mechanism with Nonlinear Pricing for Information-centric Networks. 57-60 - Chunyan Diao, Dafang Zhang, Juan Chen, Yuting Tang, Lijun Xiao:

Research on the Application of Time and Space Prediction Method in Traffic Flow Prediction. 61-66 - Lars Nielsen

, Daniel E. Lucani:
Hekate a tool for gauging Data Deduplication Performance. 67-72 - Yingjie Liu, Xueyang Liu, Wenhui Hu

, Minghui Zhang, Dongdong Du, Yu Huang:
FBLE: A Feature-based Label Enhancement Method for Corporate Bond Credit Rating Prediction. 73-77 - Yujie Wang, Xiaoli Wan, Xin Du, Xuzhao Chen, Zhihui Lu:

A Resource Allocation Strategy for Edge Services Based on Intelligent Prediction. 78-83 - Boyao Zhang, Zhongrui Li, Chao Yang, Zongguo Wang, Yonghua Zhao, Jingqi Sun, Lihua Wang:

Similarity Analysis of Knowledge Graph-based Company Embedding for Stocks Portfolio. 84-89 - Alexandra Samsonova, Barry J. Devereux, Georgios Karakonstantis, Lev Mukhanov:

A case study on profiling of an EEG-based brain decoding interface on Cloud and Edge servers. 90-95 - Art Sedighi, Doug Jacobson

, Thomas Daniels:
T-PKI for Anonymous Attestation in TPM. 96-100 - Yu Huang, Wenhui Hu

, Xueyang Liu:
SG-CIM Mapping Entity Relationship Inference and Verification Techniques Based on Graph Representation Learning Technology. 101-106 - Jun Wang, Tong Zhang, Chu Wang, Xusheng Shi:

Optimizing the Uncertainty of PPM on Small Batch of Quality Data. 107-110 - Chunsheng Wu, Honghao Wu, Song Lei, Xiaojun Li, Hui Tong:

Deep Learning in Automatic Fingerprint Identification. 111-116 - Fengtao Hu, Hua Huang, Zhihan Guo:

Review on Service Composition. 117-124 - Arun Sojan, Ranjit Rajan, Pasi Kuvaja:

Monitoring solution for cloud-native DevSecOps. 125-131 - Wenjing Wu, Wu-chang Feng:

Game to Dethrone: A Least Privilege CTF. 132-137 - Tian Hui, Xiaoqing Chen, Ronggang Zhu, Yuelei Xu, Zhaoxiang Zhang:

Cross-view Matching Neural Network for Remote Sensing Images. 138-143 - Jialong Guo, Zhiwei Liu, Zongguo Wang, Yuhang Hu, Jue Wang, Yangang Wang:

A Genetic Algorithm-Based Artificial Network Method for Material Feature Recombination. 144-148

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














