


default search action
39th IPCCC 2020: Austin, TX, USA
- 39th IEEE International Performance Computing and Communications Conference, IPCCC 2020, Austin, TX, USA, November 6-8, 2020. IEEE 2020, ISBN 978-1-7281-9829-3

- Yiding Wang, Zhenyi Wang

, Chenghao Li, Yilin Zhang, Haizhou Wang:
A Multimodal Feature Fusion-Based Method for Individual Depression Detection on Sina Weibo. 1-8 - Chengtao Xu, Kai Zhang, Houbing Song

:
UAV Swarm Communication Aware Formation Control via Deep Q Network. 1-2 - Jiawei Wan, Shijie Jia, Limin Liu, Yang Zhang:

Supporting Efficient Dynamic Update in Public Integrity Verification of Cloud Data. 1-12 - Fan Zhang, Jizhou Wu, Yingli Nie, Lihua Jiang, Ailian Zhou, Nengfu Xie:

Research of Knowledge Graph Technology and its Applications in Agricultural Information Consultation Field. 1-4 - Muhammad Mudussir Ayub, Franz Kreupl

:
A Modular and Distributed Setup for Power and Performance Analysis of Multi-Processor System-on-Chip at Electronic System Level. 1-8 - Dongxiao Yu, Xinpeng Duan, Feng Li, Yi Liang, Huan Yang, Jiguo Yu:

Distributed Scheduling Algorithm for Optimizing Age of Information in Wireless Networks. 1-8 - Xianhua Liu, Chun Yang, Zixin Guan:

Efficient arithmetic expression optimization with weighted adjoint matrix. 1-8 - Lixin Wang, Jianhua Yang, Mary McCormick, Peng-Jun Wan, XiaoHua Xu:

Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering. 1-8 - Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu:

What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense. 1-8 - Yaobin Qin, David J. Lilja:

AdaEmb-Encoder: Adaptive Embedding Spatial Encoder-Based Deduplication for Backing Up Classifier Training Data. 1-8 - Pinhao Wang, Wenzhong Li, Zepeng Yu, Baoguo Lu, Sanglu Lu:

Website Recommendation with Side Information Aided Variational Autoencoder. 1-6 - Lijun Sun, Xiaojie Yu, Shicong Chen, Yang Yan:

A Dynamic Task Assignment Framework based on Prediction and Adaptive Batching. 1-8 - Joshua Eason, Chengtao Xu, Houbing Song

:
Software Define Radio in Realizing the Intruding UAS Group Behavior Prediction. 1-5 - Yue Sun, Deqiang Xu, Zhuoming Huang, Honggang Zhang, Xiaohui Liang

:
LIDAUS: Localization of IoT Device via Anchor UAV SLAM. 1-11 - Abdoulaye Diop, Nahid Emad, Thierry Winter:

A Unite and Conquer Based Ensemble learning Method for User Behavior Modeling. 1-8 - Yuhan Zhao, Wei Zhang, Meihong Yang, Huiling Shi:

Network Resource Scheduling For Cloud/Edge Data Centers. 1-4 - Junte Ma, Sihao Xie, Jin Zhao:

P4SFC: Service Function Chain Offloading with Programmable Switches. 1-6 - Mahsa Bayati, Harsh Roogi, Ron Lee, Ningfang Mi:

Deploying Network Key-Value SSDs to Disaggregate Resources in Big Data Processing Frameworks. 1-8 - Qingyu Xiao, Jin Ye, Chengjie Pang, Liangdi Ma, Wenchao Jiang:

Adaptive Video Streaming via Deep Reinforcement Learning from User Trajectory Preferences. 1-8 - Zenan Wang, Jiao Zhang, Haoran Wei, Tao Huang

:
Hieff: Enabling Efficient VNF Clusters by Coordinating VNF Scaling and Flow Scheduling. 1-8 - Siyu Chen, Yu Zhu, Xiaoguang Niu, Zhiyong Hu:

Improved Window Segmentation for Deep Learning Based Inertial Odometry. 1-7 - Ilja Behnke, Lukas Pirl, Lauritz Thamsen, Robert Danicki, Andreas Polze, Odej Kao:

Interrupting Real-Time IoT Tasks: How Bad Can It Be to Connect Your Critical Embedded System to the Internet? 1-6 - Guoqiang Zhang, Mingwei Xu, Jiang Li:

NRV: Leveraging Secure Multi-Party Computation for Lightweight BGP Security Enhancement. 1-6 - Guéréguin Der Sylvestre Sidibé, Raphaël Bidaud, Marie-Françoise Servajean, Nadir Hakem, Michel Misson:

Evaluation of the interest of an extra-slot for a grouped polling-selecting method. 1-8 - Jiawei Sun, Yuan Zhou, Shupeng Wang, Lei Zhang, Junjiao Liu, Junteng Hou, Zhicheng Liu:

FProbe: Detecting Stealthy DGA-based Botnets by Group Activities Analysis. 1-8 - J. J. Garcia-Luna-Aceves, Abdulazaz Ali Albalawi

:
A Connection-Free Reliable Transport Protocol. 1-6 - Xiaobo Cai, Ke Han, Yan Li, Xuefei Li, Jiajin Zhang, Yue Zhang:

A sensor attack detection method based on fusion interval and historical measurement in CPS. 1-4 - Boyu Sun, Wenyuan Yang, Mengqi Yan, Dehao Wu, Yuesheng Zhu, Zhiqiang Bai:

An Encrypted Traffic Classification Method Combining Graph Convolutional Network and Autoencoder. 1-8 - Guangjun Shi, Liang Liu, Fu Chen:

The Practical Application of IoT for Large-scale Instruments and Equipment Sharing Management Platform. 1-5 - Alexander Xiong, Michael Nguyen, Andrew So, Tingting Chen:

Privacy Preserving Inference with Convolutional Neural Network Ensemble. 1-6 - Chengdong Wang, Jun Fang, Zhuofeng Zhao, Bo Zhao:

Research on Power Quality Data Placement Strategy Based on Improved Particle Swarm Optimization Algorithm. 1-5 - Ricardo Lent:

Experiments with Non-Cooperative Space DTN Routing. 1-6 - Xian Zhou, Daru Pan, Hui Song, Xu Huang:

Socially-Aware D2D Pair Strategy: A Stable Matching Approach. 1-4 - Xiaotao Li, Shujuan You, Wai Chen:

Automatic Recognition of Identification Schemes for IoT Identifiers via Sequence-to-Sequence Model. 1-6 - Wenyi Tang, Xinrui Xu, Guangchun Luo, Zaobo He, Kaiming Zhan:

Budgeted Persuasion on User Opinions via Varying Susceptibility. 1-8 - Ping Liu, Shenglin Zhang, Yongqian Sun, Yuan Meng, Jiahai Yang, Dan Pei:

FluxInfer: Automatic Diagnosis of Performance Anomaly for Online Database System. 1-8 - Jin Yu, Xiaopeng Ke, Fengyuan Xu, Hao Huang:

Efficient Architecture Paradigm for Deep Learning Inference as a Service. 1-8 - Jianzhou Mao, Tathagata Bhattacharya, Xiaopu Peng

, Ting Cao, Xiao Qin
:
Modeling Energy Consumption of Virtual Machines in DVFS-Enabled Cloud Data Centers. 1-6 - Norah Alilwit:

Authentication Based on Blockchain. 1-6 - Xinyu Yang

, Jiahao Cao, Mingwei Xu:
SEC: Secure, Efficient, and Compatible Source Address Validation with Packet Tags. 1-8 - Randeep S. Baweja, Devin B. Ridge, Harpreet S. Dhillon, William C. Headley

:
FPGA Implementation of a Pseudo-Random Signal Generator for RF Hardware Test and Evaluation. 1-7 - Natalia Trojanowska, Michal Kedziora, Moataz Hanif, Houbing Song

:
Secure Decentralized Application Development of Blockchain-based Games. 1-8 - Tao Lin:

Deep Learning for IoT. 1-4 - Jordan Pattee, Byeong Kil Lee:

Design Alternatives for Performance Monitoring Counter based Malware Detection. 1-2 - Joshua Groen

, Peter Howell, Michael Collins:
REPROOF: Quantifying the Jam Resistance of REBUF. 1-2 - Kai Zhang, Yushan Jiang

, Dahai Liu, Houbing Song
:
Spatio-Temporal Data Mining for Aviation Delay Prediction. 1-7 - Ze-Li Dou, Liran Ma, Khiem Nguyen, Kien X. Nguyen:

Paradox of AlphaZero: Strategic vs. Optimal Plays. 1-9 - Alexander Bothe, Nils Aschenbruck:

BonnMotion 4 - Taking Mobility Generation to the Next Level. 1-8 - Guangjun Ye, Wuji Liu, Chase Q. Wu, Wei Shen, Xukang Lyu:

On Machine Learning-based Stage-aware Performance Prediction of Spark Applications. 1-8 - Lihua Jiang, Jiawei Yan, Nengfu Xie:

Discussion on Application of the Internet of Things in Modern Agricultural Experimental Base. 1-4 - Danlin Jia, Manoj Pravakar Saha, Janki Bhimani, Ningfang Mi:

Performance and Consistency Analysis for Distributed Deep Learning Applications. 1-8 - Yuhao Kang, Songtao Guo, Pan Li, Yuanyuan Yang:

Edge Computing Based Privacy-Preserving Data Aggregation Scheme in Smart Grid. 1-6 - Ke Han, Youyan Duan, Rui Jin, Zhicheng Ma, Hui Rong, Xiaobo Cai:

Open Framework of Gateway Monitoring System for Internet of Things in Edge Computing. 1-5 - Megan O. Moore, William H. Clark, R. Michael Buehrer, William C. Headley

:
When is Enough Enough? "Just Enough" Decision Making with Recurrent Neural Networks for Radio Frequency Machine Learning. 1-7 - Mathew L. Wymore, Vishal Deep, Vishak Narayanan, Henry Duwe, Daji Qiao:

Lifecycle Management Protocols for Batteryless, Intermittent Sensor Nodes. 1-8 - Madeline Van Ness, Xin Sun:

Policy Units and Categories: Networking Models for Simplifying Security Policy Management. 1-11 - Xiaobo Cai, Ke Han, Yan Li, Huihui Wang, Jiajin Zhang, Yue Zhang:

Research on Security Estimation and Control of Cyber-Physical System. 1-5 - Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Guang Fan, Jiankuo Dong:

SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization Environment. 1-10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














