


default search action
11th CloudCom 2019: Sydney, Australia
- 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Sydney, Australia, December 11-13, 2019. IEEE 2019, ISBN 978-1-7281-5011-6

- Yuankun Shi, Ziyang Peng, Ren Wang, Zhaojuan Bian:

Adaptive Cloud Application Tuning with Enhanced Structural Bayesian Optimization. 1-8 - Francesco Iorio, Ali B. Hashemi, Michael Tao, Cristiana Amza:

Transfer Learning for Cross-Model Regression in Performance Modeling for the Cloud. 9-18 - Ming-ting Wei, Yu-Shiang Lin, Che-Rung Lee:

Performance Optimization for InfiniBand Virtualization on QEMU/KVM. 19-26 - David William Honorio Araujo da Silva

, Hanes Barbosa Marques de Oliveira, C. Edward Chow, Bryan Sosa Barillas, Carlos Paz de Araujo:
Homomorphic Image Processing Over Geometric Product Spaces and Finite P-Adic Arithmetic. 27-36 - Chao Wu, Shingo Horiuchi, Kenichi Tayama:

A Resource Design Framework to Realize Intent-Based Cloud Management. 37-44 - Jakub Krzywda, Ahmed Ali-Eldin, Eddie Wadbro, Per-Olov Östberg, Erik Elmroth:

Power Shepherd: Application Performance Aware Power Shifting. 45-53 - Daniel Seybold, Simon Volpert, Stefan Wesner

, André Bauer
, Nikolas Herbst, Jörg Domaschka:
Kaa: Evaluating Elasticity of Cloud-Hosted DBMS. 54-61 - Florian Hofer

, Martin A. Sehr, Antonio Iannopollo, Ines Ugalde, Alberto L. Sangiovanni-Vincentelli, Barbara Russo:
Industrial Control via Application Containers: Migrating from Bare-Metal to IAAS. 62-69 - Ali Elgazar, Khaled Harras

:
Teddybear: Enabling Efficient Seamless Container Migration in User-Owned Edge Platforms. 70-77 - Michel-Daniel Cojocaru, Alexandru Uta

, Ana-Maria Oprescu
:
MicroValid: A Validation Framework for Automatically Decomposed Microservices. 78-86 - André Moreira, Waldemar Celes Filho:

Metaheuristic-Based Workload Selection for Hybrid Cloud Rendering of CAD Models. 87-94 - Yu-Shiang Lin, Chun-Yuan Lin, Che-Rung Lee, Yeh-Ching Chung:

qCUDA: GPGPU Virtualization for High Bandwidth Efficiency. 95-102 - Ronny Peterson, André Carvalho, Altigran S. da Silva, Gabriel Fernandez, André Martin, Christof Fetzer, Andrey Brito:

Vallum: Privacy, Confidentiality and Access Controlfor Sensitive Data in Cloud Environments. 103-110 - Chikako Takasaki, Atsuko Takefusa, Hidemoto Nakada, Masato Oguchi:

A Study of Action Recognition Using Pose Data Toward Distributed Processing Over Edge and Cloud. 111-118 - Muhammad Abdullah

, Waheed Iqbal, Abdelkarim Erradi, Faisal Bukhari:
Learning Predictive Autoscaling Policies for Cloud-Hosted Microservices Using Trace-Driven Modeling. 119-126 - Sheriffo Ceesay, Adam Barker, Yuhui Lin:

Benchmarking and Performance Modelling of MapReduce Communication Pattern. 127-134 - Arif Ahmed, Guillaume Pierre:

Docker Image Sharing in Distributed Fog Infrastructures. 135-142 - Aabhas Bhatia, Shuangyi Li, Zheng Song

, Eli Tilevich
:
Exploiting Equivalence to Efficiently Enhance the Accuracy of Cognitive Services. 143-150 - Jason Anderson, Kate Keahey:

A Case for Integrating Experimental Containers with Notebooks. 151-158 - Dixit Bhatta

, Lena Mashayekhy:
Generalized Cost-Aware Cloudlet Placement for Vehicular Edge Computing Systems. 159-166 - Sai Santosh Dayapule, Fan Yao

, Guru Venkataramani:
PowerStar: Improving Power Efficiency in Heterogenous Processors for Bursty Workloads with Approximate Computing. 175-182 - Eric Henziger, Niklas Carlsson:

Delta Encoding Overhead Analysis of Cloud Storage Systems Using Client-Side Encryption. 183-190 - Shreshth Tuli, Shikhar Tuli, Udit Jain, Rajkumar Buyya

:
APEX: Adaptive Ext4 File System for Enhanced Data Recoverability in Edge Devices. 191-198 - Arnaldo Pereira Ferreira, Richard O. Sinnott:

A Performance Evaluation of Containers Running on Managed Kubernetes Services. 199-208 - Nicolae Marian Popa, Ana Oprescu

:
A Data-Centric Approach to Distributed Tracing. 209-216 - Tianhang Guo, Yiping Wen, Feiran Wang, Junjie Hou:

Learning Resource Recommendation Based on Generalized Matrix Factorization and Long Short-Term Memory Model. 217-222 - Rekha Nachiappan, Bahman Javadi, Rodrigo N. Calheiros

, Kenan M. Matawie
:
ProactiveCache: On Reducing Degraded Read Latency of Erasure Coded Cloud Storage. 223-230 - Saumitra Aditya, Renato Figueiredo

:
SocialEdge: Enabling Trusted Data Processing Workflow in Smart Communities. 231-238 - Shreya Ghosh

, Soumya K. Ghosh, Rajkumar Buyya
:
MovCloud: A Cloud-Enabled Framework to Analyse Movement Behaviors. 239-246 - Mehdi Mokhtar Belkhiria, Cédric Tedeschi:

Design and Evaluation of Decentralized Scaling Mechanisms for Stream Processing. 247-254 - Chaofeng Wu, Ian T. Foster, Ted Summer, Zhuozhao Li

, Anna Woodard, Ryan Chard, Matt Baughman, Yadu N. Babuji, Kyle Chard
, Jason Pitt:
ParaOpt: Automated Application Parameterization and Optimization for the Cloud. 255-262 - Bryan Harris, Nihat Altiparmak

:
Monte Carlo Based Server Consolidation for Energy Efficient Cloud Data Centers. 263-270 - Yassine Jebbar, Fatna Belqasmi, Roch H. Glitho, Omar Alfandi

:
A Fog-Based Architecture for Remote Phobia Treatment. 271-278 - Ahmed Ben Said, Abdelkarim Erradi:

Deep-Gap: A Deep Learning Framework for Forecasting Crowdsourcing Supply-Demand Gap Based on Imaging Time Series and Residual Learning. 279-286 - Loic Guegan

, Anne-Cécile Orgerie:
Estimating the End-to-End Energy Consumption of Low-Bandwidth IoT Applications for WiFi Devices. 287-294 - Martin Gilje Jaatun:

Architectural Risk Analysis in Agile Development of Cloud Software. 295-300 - Hanbeom Jo, Youngjin Kim, Hochul Lee, Young Choon Lee, Hyuck Han, Sooyong Kang:

On the Trade-Off Between Performance and Storage Efficiency of Replication-Based Object Storage. 301-304 - Atsutoshi Osuka, Kenji Kono:

A Framework for Building Linux-Based Single-Purpose Appliances Optimized for the Cloud. 305-308 - Jayden King

, Young Ki Kim, Young Choon Lee, Seok-Hee Hong:
Visualisation of Distributed Systems Simulation Made Simple. 309-312 - Rasika Dayarathna, Thisura Seniya Rathnayake:

Activity Monitor A Personal Informatics Application. 313-316 - Han Qiu, Xiao Wu, Shuyi Zhang, Victor C. M. Leung, Wei Cai

:
ChainIDE: A Cloud-Based Integrated Development Environment for Cross-Blockchain Smart Contracts. 317-319 - Pegah Tabarisaadi, Abbas Khosravi, Saeid Nahavandi:

Designing an H_infinity Fuzzy LMI-Based Consensus Protocol for Nonlinear Multi-agent Systems. 320-325 - Thomas Diefenbach, Carsten Lucke, Ulrike Lechner:

Towards an Integration of Information Security Management, Risk Management and Enterprise Architecture Management - A Literature Review. 326-333 - Matija Buric

, Marina Ivasic-Kos
, Miran Pobar
:
Player Tracking in Sports Videos. 334-340 - Hussain Mohammed Dipu Kabir

, Parham M. Kebria, Abbas Khosravi, Saeid Nahavandi:
Probability Density Computation Neural Network for Time Series Data. 341-346 - Shangyu Chen, Shuo Wang, Richard O. Sinnott:

Parametric Canonical Correlation Analysis. 347-353 - Richard O. Sinnott:

Migrating a National Cloud Platform for Urban Analytics: A Performance Assessment Framework. 354-361 - Yinghao Du, Xuebing Wang, Zhihai Lei, Yiran Li, Bin Hu, Guang Li:

Anlysis and Design of Activity Degree Monitoring Algorithm. 362-366 - Anupam Agrawal

, Gopal Chandra Jana
, Prachi Gupta:
A Deep Transfer Learning Approach for Seizure Detection Using RGB Features of Epileptic Electroencephalogram Signals. 367-373 - Ming Fang, Lin-Na Li, Liu Yang:

Social Network Public Opinion Research Based on S-SEIR Epidemic Model. 374-379 - Pao-Ann Hsiung

, Chih-Chen Lin:
Data Reconstruction for Cyber-Physical Landslide Detection System. 380-386 - Tri D. T. Nguyen, Eui-Nam Huh, Jae Ho Park, Md. Imtiaz Hossain, Md. Delowar Hossain

, Seung-Jin Lee, Jin Woong Jang, Seo Hui Jo, Luan N. T. Huynh, Trong Khanh Tran:
Performance Analysis of Data Parallelism Technique in Machine Learning for Human Activity Recognition Using LSTM. 387-391 - Sungyun Woo, Yunkon Kim, Junyoung Park, YeonSoo Lim, Eui-Nam Huh:

A Study on Blockchain-Based Lightweight Logging Framework for Service Availability in Resource-Limited Edge Cloud. 392-395 - Kishor Datta Gupta

, Abdur Rahman Khan Jehad, Subash Poudyal, Mohammad Nurul Huda, M. A. Parvez Mahmud
:
A Hybrid POW-POS Implementation Against 51 percent Attack in Cryptocurrency System. 396-403 - Zeshun Shi, Huan Zhou, Jayachander Surbiryala, Yang Hu, Cees de Laat, Zhiming Zhao:

An Automated Customization and Performance Profiling Framework for Permissioned Blockchains in a Virtualized Environment. 404-410 - Mohammad Jabed Morshed Chowdhury, Md. Sadek Ferdous

, Kamanashis Biswas
, Niaz Chowdhury, A. S. M. Kayes
, Paul A. Watters
, Alex Ng:
Trust Modeling for Blockchain-Based Wearable Data Market. 411-417 - Magnus Westerlund, Martin Gilje Jaatun:

Tackling the Cloud Forensic Problem While Keeping Your Eye on the GDPR. 418-423 - Ayesha Altaf, Haider Abbas

, Faiza Iqbal
:
Context Based Trust Formation Using Direct User-Experience in the Internet of Things(IoT). 424-430 - Adeel Aslam, Hanhua Chen, Jiang Xiao, Hai Jin:

Reasoning Based Workload Performance Prediction in Cloud Data Centers. 431-438

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














