


default search action
10th PAAP 2019: Guangzhou, China
- Hong Shen, Yingpeng Sang:

Parallel Architectures, Algorithms and Programming - 10th International Symposium, PAAP 2019, Guangzhou, China, December 12-14, 2019, Revised Selected Papers. Communications in Computer and Information Science 1163, Springer 2020, ISBN 978-981-15-2766-1
Architectures
- Zhanmao Cao, Qisong Huang, Chase Q. Wu, Wenkang Kong

, Aiqin Hou:
On a Coexisting Scheme for Multiple Flows in Multi-radio Multi-channel Wireless Mesh Networks. 3-11 - Zijing Ma

, Shuangjuan Li, Longkun Guo, Guohua Wang:
Non-linear K-Barrier Coverage in Mobile Sensor Network. 12-23 - Jingqiu Zheng, Jiali Bian, Jian Kuang:

Interrupt Responsive Spinlock Mechanism Based on MCS for Multi-core RTOS. 24-34 - Xiaojun Wang

, Feng Shi
, Hong Zhang
:
A Novel Speedup Evaluation for Multicore Architecture Based Topology of On-Chip Memory. 35-47 - Slo-Li Chu, Wen-Chih Ho, Yi-Jie Jiang:

Improving the Performance of Collective Communication for the On-Chip Network. 48-57 - Wen Yang, Yawen Chen

, Zhiyi Huang, Haibo Zhang
, Huaxi Gu, Cui Yu:
A Survey of Multicast Communication in Optical Network-on-Chip (ONoC). 58-70 - Jie Yang, Chenggui Zhao

:
Virtual Network Embedding Based on Core and Coritivity of Graph. 71-82 - Yening Zhou, Taoshen Li, Zhe Wang, Jin Ye:

Non-time-Sharing Full-Duplex SWIPT Relay System with Energy Access Point. 83-97 - Jiaming Zhao, Pingjia Liang, Weiming Liufu, Zhengping Fan:

Recent Developments in Content Delivery Network: A Survey. 98-106
High Performance Systems
- Mengzhen Zhong, Junhao Chen, Yuzhen Niu:

Weighted Mean Deviation Similarity Index for Objective Omnidirectional Video Quality Assessment. 109-117 - Yuxiang Zhang, Naijie Gu, Xiaoci Zhang, Chuanwen Lin:

Tire X-ray Image Defects Detection Based on Adaptive Thresholding Method. 118-129 - Xinhong Zhang, Boyan Zhang, Fan Zhang:

Halftone Image Reconstruction Based on SLIC Superpixel Algorithm. 130-139 - Chengzhi Niu, Xiaofan Zhao:

Study on the Method of Extracting Diabetes History from Unstructured Chinese Electronic Medical Record. 140-146 - Yuanyuan Fan, Pengyu Liu, Yuzhen Niu:

Deep Residual Optimization for Stereoscopic Image Color Correction. 147-158 - Zhao Qiu, Xiaoquan Liang, Qiaoqiao Chen, Xiangsheng Huang, Yiping Wang:

Old Man Fall Detection Based on Surveillance Video Object Tracking. 159-167 - Zhao Qiu, Qiaoqiao Chen, Xiangsheng Huang, Xiaoquan Liang:

Electric Bicycle Violation Automatic Detection in Unconstrained Scenarios. 168-174 - Zelong Wang, Di Wu, Zhenxiao Luo, Yunfei Du:

Building a Lightweight Container-Based Experimental Platform for HPC Education. 175-183 - Zhenxiao Luo, Zelong Wang, Di Wu, Xiaojun Hei, Yunfei Du:

Automatic Generation and Assessment of Student Assignments for Parallel Programming Learning. 184-194 - Yiduo Wang

, Youxu Chen, Xinyang Shao, Jinzhong Chen, Liu Yuan, Yinlong Xu:
HSM2: A Hybrid and Scalable Metadata Management Method in Distributed File Systems. 195-206
Algorithms
- Haotian Zhang, Yang Yu, Maolin Pan:

Heuristic Load Scheduling Algorithm for Stateful Cloud BPM Engine. 209-220 - Aihua Yin

, Chong Chen
, Dongping Hu
, Jianghai Huang
, Fan Yang
:
An Improved Heuristic-Dynamic Programming Algorithm for Rectangular Cutting Problem. 221-233 - Zihan Yan, Hong Shen, Huiming Huang, Zexi Deng:

Constrained Optimization via Quantum Genetic Algorithm for Task Scheduling Problem. 234-248 - Jiexuan Chen, Yang Yu, Maolin Pan:

A Method of Business Process Bottleneck Detection. 249-261 - Manman Zhang, Wu Zhang, Xun Hong, Yifan Song, Yuan Rao, Yujia Gao, Yunyun Sun:

Optimized Layout of the Soil Moisture Sensor in Tea Plantations Based on Improved Dijkstra Algorithm. 262-274 - Zhendong Hao, Longkun Guo, Pei Yao, Peihuang Huang, Huihong Peng:

Efficient Algorithms for Constrained Clustering with Side Information. 275-286 - Yixuan Li, Xiaoxiang Yuan, Jie Zhu, Haiping Huang

, Min Wu:
Multi-objective Scheduling of Logistics UAVs Based on Simulated Annealing. 287-298 - Benbo Zha, Hong Shen:

IFME: Influence Function Based Model Explanation for Black Box Decision Systems. 299-310 - Hao Wei, Cheng Zhong, Danyang Chen, Meng-Xiao Yin, Jinxiong Zhang:

GPU-Accelerated Parallel Aligning Long Reads with High Error Rate Using Enhanced Sparse Suffix Array. 311-319 - Yi Wu

, Bin Lao
, Xinghui Ma, Ge Nong:
An Improved Algorithm for Building Suffix Array in External Memory. 320-330 - Jing Yi Xie

, Bin Lao
, Ge Nong:
In-Place Suffix Sorting on a Multicore Computer with Better Design. 331-342
Security and Privacy
- Tingting Feng, Xiaoyu Li, Yuchun Guo, Ti Wang, Shan Yang, Zhongyan Du:

Any Privacy Risk if Nobody's Personal Information Being Collected? 345-356 - Tonglai Liu, Jigang Wu, Xinpeng Zhang, Zhihao Peng, Jingyi Li:

Blockchain-Based Access Control Schemes for Medical Image Analysis System. 357-367 - Zhaohui Ma, Jialiang Huang:

Research on DDoS Abnormal Traffic Detection Under SDN Network. 368-379 - Haibo Tian, Peiran Luo, Yinxue Su:

An Efficient Group Signature Based Digital Currency System. 380-392 - Chuming Xiao, Jiaming Huang, Weigang Wu:

Detecting Anomalies in Cluster System Using Hybrid Deep Learning Model. 393-404 - Hussam Juma

, Khaled Shaalan
, Ibrahim Kamel
:
Customs-Based Blockchain Solution for Exportation Protection. 405-416 - Hussam Juma

, Khaled Shaalan
, Ibrahim Kamel
:
Customs-Based Distributed Risk Assessment Method. 417-429 - Zhicheng Xi, Yingpeng Sang

, Hanrui Zhong, Yongchun Zhang:
Pufferfish Privacy Mechanism Based on Multi-dimensional Markov Chain Model for Correlated Categorical Data Sequences. 430-439 - Yongchun Zhang, Yingpeng Sang, Zhicheng Xi, Hanrui Zhong:

Lattice Based Multi-replica Remote Data Integrity Checking for Data Storage on Cloud. 440-451 - Hanrui Zhong, Yingpeng Sang

, Yongchun Zhang, Zhicheng Xi:
Secure Multi-Party Computation on Blockchain: An Overview. 452-460 - Songyuan Li, Hong Shen, Yingpeng Sang:

A Survey of Privacy-Preserving Techniques on Trajectory Data. 461-476
Big Data Processing and Deep Learning
- Jijun Wang, Hongliang Li:

Minimizing Off-Chip Memory Access for Deep Convolutional Neural Network Training. 479-491 - Bao Feng, Peixin He, Yunyao Li, Junfeng Wu, Peng Li, Haichang Yao, Yimu Ji, Chao Min, Jiekui Zhang, Youtao Li, Peizhuang Wang, Yong Shi, Jing He

, Hui Zheng, Yang Wang:
Resultant Gradient Flow Method for Multiple Objective Programming Based on Efficient Computing. 492-506 - Siyuan Ma, Ping He:

Barrage Video Recommendation Method Based on Convolutional Recursive Neural Network. 507-518 - Xin Zhou, Rongchun Li, Peng Zhang, Yuntao Liu, Yong Dou:

A Pipelining Strategy for Accelerating Convolutional Networks on ARM Processors. 519-530 - Chuyue Zhang

, Manchun Cai
, Xiaofan Zhao
, Luzhe Cao
, Dawei Wang
:
Prediction Model of Suspect Number Based on Deep Learning. 531-540 - Wei Jiang, Yuan Wang, Yan Tang:

A Sequence-to-Sequence Transformer Premised Temporal Convolutional Network for Chinese Word Segmentation. 541-552

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














