- 2015
- Sridhar Adepu, Aditya Mathur, Jagadeesh Gunda, Sasa Z. Djokic:
An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems. ICA3PP (3) 2015: 785-798 - Masayuki Arai, Shingo Inuyama, Kazuhiko Iwasaki:
Note on Fast Bridge Fault Test Generation Based on Critical Area. ICA3PP (3) 2015: 729-740 - Nianyuan Bao, Jie Tang, Xiaoyu Zhang, Gangshan Wu:
A New Data Replication Scheme for PVFS2. ICA3PP (3) 2015: 475-491 - Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Tian Wang, Xiangyong Liu:
Resource-Efficient Vibration Data Collection in Cyber-Physical Systems. ICA3PP (3) 2015: 134-147 - Jian Cao, Qiang Fu, Qiang Li, Dong Guo:
Leveraging Behavior Diversity to Detect Spammers in Online Social Networks. ICA3PP (3) 2015: 323-336 - Lianyu Cao, Penghui Juan, Yinghua Zhang:
Real-Time Deconvolution with GPU and Spark for Big Imaging Data Analysis. ICA3PP (3) 2015: 240-250 - Jen-Chieh Chang, Ting-Hsuan Chien, Rong-Guey Chang:
A Cyber Physical System with GPU for CNC Applications. ICA3PP (3) 2015: 203-212 - Jue Chen, Jinbang Chen, Fei Xu, Min Yin, Wei Zhang:
When Software Defined Networks Meet Fault Tolerance: A Survey. ICA3PP (3) 2015: 351-368 - Houwu Chen, Jiwu Shu:
Sky: Opinion Dynamics Based Consensus for P2P Network with Trust Relationships. ICA3PP (3) 2015: 517-531 - Lei Cui, Zhiyu Hao, Lun Li, Haiqiang Fei, Zhenquan Ding, Bo Li, Peng Liu:
Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications. ICA3PP (3) 2015: 577-596 - Chuangen Gao, Hua Wang, Fangjin Zhu, Linbo Zhai, Shanwen Yi:
A Particle Swarm Optimization Algorithm for Controller Placement Problem in Software Defined Network. ICA3PP (3) 2015: 44-54 - Xiaojun Guo, Guang Cheng, Wubin Pan, Truong Dinhtu, Yixin Liang:
A Novel Search Engine-Based Method for Discovering Command and Control Server. ICA3PP (3) 2015: 311-322 - Hongbo Han, Zhenxiang Chen, Qiben Yan, Lizhi Peng, Lei Zhang:
A Real-time Android Malware Detection System Based on Network Traffic Analysis. ICA3PP (3) 2015: 504-516 - Shiming He, Weini Zeng, Kun Xie:
Privacy Preserving for Network Coding in Smart Grid. ICA3PP (3) 2015: 640-654 - Yung-Li Hu, Yuo-Yu Cho, Wei-Bing Su, David S. L. Wei, Yennun Huang, Jiann-Liang Chen, Ing-Yi Chen, Sy-Yen Kuo:
A Programming Framework for Implementing Fault-Tolerant Mechanism in IoT Applications. ICA3PP (3) 2015: 771-784 - Wenbin Hu, Liping Yan, Huan Wang, Bo Du:
On Exploring a Virtual Agent Negotiation Inspired Approach for Route Guidance in Urban Traffic Networks. ICA3PP (3) 2015: 3-16 - Zhenchun Huang, Guoqing Li:
Exploiting Scalable Parallelism for Remote Sensing Analysis Models by Data Transformation Graph. ICA3PP (3) 2015: 119-133 - Sheng Huo, Dafang Zhang, Yanbiao Li:
Fast and Scalable Regular Expressions Matching with Multi-Stride Index NFA. ICA3PP (3) 2015: 597-610 - Xinpu Ji, Yuxiang Ma, Rui Ma, Peng Li, Jingwei Ma, Gang Wang, Xiaoguang Liu, Zhongwei Li:
A Proactive Fault Tolerance Scheme for Large Scale Storage Systems. ICA3PP (3) 2015: 337-350 - Wenbin Jiang, Zhiwei Lu, Hai Jin, Ye Chi:
A New Approach for Vehicle Recognition and Tracking in Multi-camera Traffic System. ICA3PP (3) 2015: 148-161 - Qiang Lan, Namit Gaur, Johannes Langguth, Xing Cai:
Towards Detailed Tissue-Scale 3D Simulations of Electrical Activity and Calcium Handling in the Human Cardiac Ventricle. ICA3PP (3) 2015: 79-92 - Chunjiang Li, Yushan Dong, Kuan Li:
Stencil Computations on HPC-oriented ARMv8 64-Bit Multi-Core Processor. ICA3PP (3) 2015: 30-43 - Teng Li, Jianfeng Ma, Cong Sun:
CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks. ICA3PP (3) 2015: 449-462 - Qian Li, Weiguo Wu, Zeyu Sun, Lei Wang, Jianhang Huang:
Economy-Oriented Deadline Scheduling Policy for Render System Using IaaS Cloud. ICA3PP (3) 2015: 68-78 - Chun-hua Li, Ronglei Wei, Zebang Wu, Ke Zhou, Cheng Lei, Hao Jin:
Adopting Multi-mode Access Control for Secure Data Sharing in Cloud. ICA3PP (3) 2015: 532-546 - Chao Li, Yida Wang, Changhai Zhao, Haihua Yan, Jianlei Zhang:
Parallel Kirchhoff Pre-Stack Depth Migration on Large High Performance Clusters. ICA3PP (3) 2015: 251-266 - Lei Li, Yonghua Xiong, Shufan Guo, Keyuan Jiang, Yongbing Tang:
A Streaming Execution Method for Multi-services in Mobile Cloud Computing. ICA3PP (3) 2015: 55-67 - Weihao Liang, Hong An, Feng Li, Yichao Cheng:
Optimization of Binomial Option Pricing on Intel MIC Heterogeneous System. ICA3PP (3) 2015: 17-29 - Xin Liao, Guoyong Chen, Qi Li, Jun Liu:
Improved WOW Adaptive Image Steganography Method. ICA3PP (3) 2015: 695-702 - Chi Lin, Kun Liu, Bo Xu, Jing Deng, Chang-Wu Yu, Guowei Wu:
VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs. ICA3PP (3) 2015: 297-310