


default search action
4th SmartCom 2019: Birmingham, UK
- Meikang Qiu:

Smart Computing and Communication - 4th International Conference, SmartCom 2019, Birmingham, UK, October 11-13, 2019, Proceedings. Lecture Notes in Computer Science 11910, Springer 2019, ISBN 978-3-030-34138-1 - Chenglong Hou, Chensong Zhou, Kun Zhou, Jinan Sun, Sisi Xuanyuanj:

A Survey of Deep Learning Applied to Story Generation. 1-10 - Kui Zhang, Xiaohu Zhou, Heng He, Yonghao Wang, Weihao Wang, Huajian Li:

A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel Plates. 11-21 - Jingjing Hu, Dongyan Ma, Chen Liu, Huaizhi Yan, Changzhen Hu:

An Improved Prediction Model for the Network Security Situation. 22-33 - Xiao Yu, Kunqing Wang, Quanxin Zhang, Yuanzhang Li:

A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles. 34-41 - Jingjing Hu, Shuangshuang Guo

, Fankun Meng, Dongsheng Hu, Zhiyu Shi:
An Improved Assessment Method for the Network Security Risk. 42-52 - Jingyu Liu, Jinrong Zhang, Juan Li, Lu Liu:

A High-Performance Storage System Based with Dual RAID Engine. 53-62 - Yuhang Zhao, Kunqing Wang, Yuan Xue, Quanxin Zhang, Xiaosong Zhang:

An Universal Perturbation Generator for Black-Box Attacks Against Object Detectors. 63-72 - Zhao Wang, Yanqi Wang, Yanan Zhang, Yangyang Liu, Chao Ma, Haijun Wang:

A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected Vehicle. 73-82 - Yirui Wu, Yao Xiao, Jun Feng:

Hierarchically Channel-Wise Attention Model for Clean and Polluted Water Images Classification. 83-92 - Yuanyuan Liu, Xiaohui Wei, Lina Li, Xingwang Wang:

Energy-Efficient Approximate Data Collection and BP-Based Reconstruction in UWSNs. 93-104 - Likun Liu, Hongli Zhang, Jiantao Shi

, Xiangzhan Yu, Haixiao Xu:
I2P Anonymous Communication Network Measurement and Analysis. 105-115 - Zhanyang Xu, Haoyang Shi, Xihua Liu:

Plot Digitizing over Big Data Using Beam Search. 116-125 - Ruichao Mo, Lianyong Qi, Zhanyang Xu, Xiaolong Xu

:
Trust-Aware Resource Provisioning for Meteorological Workflow in Cloud. 126-135 - Hao Jiang, Min Lin, Bingqing Liu, Huifang Liu, Yuanyuan Zeng, He Nai, Xiaoli Zhang, Xianlong Zhao, Wen Du, Haining Ye:

Do Top Social Apps Effect Voice Call? Evidence from Propensity Score Matching Methods. 136-149 - Kexin Yang, Yuanyuan Zeng, Hao Jiang, Qimei Chen

:
Cognitive Hierarchy Based Coexistence and Resource Allocation for URLLC and eMBB. 150-160 - Zhian Yang, Cong Zheng, Hao Jiang, Yuanyuan Zeng, Zhiyi Hu, Wen Du:

Smart Custom Package Decision for Mobile Internet Services. 161-170 - Zhaojun Wang, Hao Jiang, Xiaoyue Zhao, Yuanyuan Zeng, Yi Zhang, Wen Du:

A Space Dynamic Discovery Scheme for Crowd Flow of Urban City. 171-179 - Hailong Liu, Bo Li:

Automated Classification of Attacker Privileges Based on Deep Neural Network. 180-189 - Zhe Wang, Linghe Kong

, Guihai Chen
, Ming Ni:
NnD: Shallow Neural Network Based Collision Decoding in IoT Communications. 190-199 - He Nai, Min Lin, Hao Jiang, Huifang Liu, Haining Ye:

Subordinate Relationship Discovery Method Based on Directed Link Prediction. 200-211 - Kaihao Lou, Yongjian Yang, Chuncai Wang:

An Elephant Flow Detection Method Based on Machine Learning. 212-220 - Song Xia, Meikang Qiu, Meiqin Liu, Ming Zhong, Hui Zhao:

AI Enhanced Automatic Response System for Resisting Network Threats. 221-230 - Yongyi Cao

, Jing Wu, Bo Zhu, Hao Jiang, Yuchuan Deng, Wei Luo:
A Cross-Plane Cooperative DDoS Detection and Defense Mechanism in Software-Defined Networking. 231-243 - Wenzhi Wu, Ying Wei, Ruizhe Ye:

A Hardware Trojan Detection Method Design Based on TensorFlow. 244-252 - Xin Wang

, Linghe Kong
, Changjun Jiang:
Resolving the Loop in High-Level SDN Program for Multi-table Pipeline Compilation. 253-265 - Han Qiu

, Qinkai Zheng, Meikang Qiu, Gérard Memmi:
DC Coefficients Recovery from AC Coefficients in the JPEG Compression Scenario. 266-276 - Yingyue Chen, Lijun Xiao, Osama Hosam

:
A Performance Evaluation Method of Coal-Fired Boiler Based on Neural Network. 277-285 - Xiao Zeng, Hong Guo, Zhe Liu:

Analysis and Prediction of Commercial Big Data Based on WIFI Probe. 286-295 - Yu Gan, Wei Hu, Yonghao Wang:

Design and Optimization of Camera HAL Layer Based on Android. 296-303 - Yining Li, Wei Hu, Yonghao Wang

:
Music Rhythm Customized Mobile Application Based on Information Extraction. 304-309 - Art Sedighi, Doug Jacobson

:
Computational Challenges and Opportunities in Financial Services. 310-319 - Weidong Xiao, Weihong Huang, Wei Liang

, Xia Lei, Jiahong Cai, Yuanming Wang, Yanting Li:
A Shamir Threshold Model Based Recoverable IP Watermarking Scheme. 320-329 - Joseph L. Fracasso, Md Liakat Ali:

Applications of Machine Learning Tools in Genomics: A Review. 330-340 - Xiang Shen, Caiming Yang, Zhengwei Jiang, Dong Xie, Yingtao Sun, Shuibiao Chen, Bo Li:

Hierarchical Graph Neural Networks for Personalized Recommendations with User-Session Context. 341-348 - Lifeng Liu, Lizong Zhang, Fengming Zhang, Jianguo Qian, Xinxin Zhang, Peidong Chen, Bo Li:

Coattention-Based Recurrent Neural Networks for Sentiment Analysis of Chinese Texts. 349-356 - Honglei Zheng, Hong Guo, Shimin Wu:

Design and Implementation of Small-scale Sensor Network Based on Raspberry Pi. 357-365 - Wenhui Hu, Xueyang Liu, Chengli Xing, Minghui Zhang, Sen Ma:

Research on Template-Based Factual Automatic Question Answering Technology. 366-375 - Wenshuai Qin, Wenjie Guo, Xin Liu, Hui Zhao:

A Novel Scheme for Recruitment Text Categorization Based on KNN Algorithm. 376-386 - Yan Liu, Xu-Dong Wang, Meikang Qiu, Hui Zhao:

Machine Learning for Cancer Subtype Prediction with FSA Method. 387-397 - YauKa Cheung, Meikang Qiu, Meiqin Liu:

Autonomous Vehicle Communication in V2X Network with LoRa Protocol. 398-410

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














