default search action
37th IPCCC 2018: Orlando, FL, USA
- 37th IEEE International Performance Computing and Communications Conference, IPCCC 2018, Orlando, FL, USA, November 17-19, 2018. IEEE 2018, ISBN 978-1-5386-6808-5
- Abdel-Hameed A. Badawy, Jesus Gardea, Yuho Jin, Jonathan E. Cook:
3D-PIM NoCs with Multiple Subnetworks: A Performance and Power Evaluation. 1-8 - Guoshun Nan, Xiuquan Qiao, Jiting Wang, Zeyan Li, Jiahao Bu, Changhua Pei, Mengyu Zhou, Dan Pei:
The Frame Latency of Personalized Livestreaming Can Be Significantly Slowed Down by WiFi. 1-8 - Xingsheng Zhao, Jingwen Shi, Mingzhe Du, Fan Ni, Song Jiang, Yang Wang:
A Road-Aware Spatial Mapping for Moving Objects. 1-8 - Haipeng Du, Weizhan Zhang, Xuanyu Wang, Qinghua Zheng:
Integrated Bandwidth Variation Pattern Differentiation for HTTP Adaptive Streaming over 4G Cellular Networks. 1-9 - Tim Bisson, Ke Chen, Changho Choi, Vijay Balakrishnan, Yang-Suk Kee:
Crail-KV: A High-Performance Distributed Key-Value Store Leveraging Native KV-SSDs over NVMe-oF. 1-8 - Shrikant S. Jadhav, Clay Gloster, Christopher C. Doss, Youngsoo Kim, Jannatun Naher:
AutoRARE: An Automated Tool For Generating FPGA-Based Multi-Memory Hardware Accelerators For Compute-Intensive Applications. 1-8 - Fan Ni, Xingbo Wu, Weijun Li, Song Jiang:
ThinDedup: An I/O Deduplication Scheme that Minimizes Efficiency Loss due to Metadata Writes. 1-8 - Debashri Roy, Tathagata Mukherjee, Mainak Chatterjee, Eduardo L. Pasiliao:
Adaptive Video Encoding and Dynamic Channel Access for Real-time Streaming over SDRs. 1-9 - Zhi Cao, Honggang Zhang, Benyuan Liu:
Performance and Stability of Application Placement in Mobile Edge Computing System. 1-8 - Tianye Yang, Dezun Dong, Cunlu Li, Liquan Xiao:
BFRP: Endpoint Congestion Avoidance Through Bilateral Flow Reservation. 1-8 - Faustina J. Anto Morais, Swapnoneel Roy, Sanjay P. Ahuja:
A Cache Based DoS Attack on Real Information Centric Networking System. 1-7 - Hongyu Zhou, Jiagao Wu, Lu Shen, Linfeng Liu:
Vehicle Delay-tolerant Network Routing Algorithm based on Multi-period Bayesian Network. 1-8 - Ting Li, Zhijin Qiu, Lijuan Cao, Hanshang Li, Zhongwen Guo, Fan Li, Xinghua Shi, Yu Wang:
Participant Grouping for Privacy Preservation in Mobile Crowdsensing over Hierarchical Edge Clouds. 1-8 - J. J. Garcia-Luna-Aceves:
Implementing Correct and Efficient Collision Avoidance in Multi-Hop Ad-Hoc Networks. 1-10 - Sulav Malla, Ken Christensen:
Choosing the Best Server for a Data Center: The Importance of Workload Weighting. 1-8 - Guangjing Wang, Lan Zhang, Zhi Yang, Xiang-Yang Li:
Socialite: Social Activity Mining and Friend Auto-labeling. 1-8 - Lei Wang, Qing Li, Lu Liu, Yong Jiang, Mingwei Xu, Jianping Wu:
S5: An Application Sensitive QoS Assurance System via SDN. 1-8 - Jingxiu Su, Zhenyu Li, Stéphane Grumbach, Muhammad Ikram, Kavé Salamatian, Gaogang Xie:
Web Tracking Cartography with DNS Records. 1-8 - Madhuri Siddula, Zhipeng Cai, Dongjing Miao:
Privacy Preserving Online Social Networks using Enhanced Equicardinal Clustering. 1-8 - Raed Alsurdeh, Rodrigo N. Calheiros, Kenan M. Matawie, Bahman Javadi:
Cloud Resource Provisioning for Combined Stream and Batch Workflows. 1-8 - Shumin Cao, Xin He, Peide Zhu, Mingshi Chen, Xiangyang Li, Panlong Yang:
iPand: Accurate Gesture Input with Ambient Acoustic Sensing on Hand. 1-8 - Zhi Cao, Honggang Zhang, Benyuan Liu, Bo Sheng:
A Game-theoretic Framework for Revenue Sharing in Edge-Cloud Computing System. 1-8 - Walid Mokhtar Bennaceur, Leïla Kloul:
Reliability and Performance Analysis of a Data Center's Network Architecture. 1-8 - Zeyan Li, Wenxiao Chen, Dan Pei:
Robust and Unsupervised KPI Anomaly Detection Based on Conditional Variational Autoencoder. 1-9 - Go Nakagawa, Yusuke Ito, Yurino Sato, Hiroyuki Koga:
An Effective Scheme to Utilize Caches for Streaming Services in Mobile CCN. 1-2 - Yang Zhang, Daniel Zhang, Qi Li, Dong Wang:
Towards Optimized Online Task Allocation in Cost-Sensitive Crowdsensing Applications. 1-8 - Qian Wang, Zhipeng Gao, Xiaojiang Du, Liehuang Zhu:
An Optimal LTE-U Access Method for Throughput Maximization and Fairness Assurance. 1-8 - Baihong Chen, Hongwei Du, Chuang Liu, Qiang Ye:
On the Impact of Sweep Radius and Energy Limitation on Sweep Coverage in Wireless Sensor Networks. 1-7 - Jiayu Gan, Jianhui Zhang, Siwen Zheng:
Where You Really Are: User Trip Based City Functional Zone Ascertainment. 1-8 - Yi Yue, Bo Cheng:
EasyOrchestrator: A NFV-based Network Service Creation Platform for End-users. 1-2 - Guolin Sun, Gebrekidan Tesfay Zemuy, Kun Xiong:
Dynamic Reservation and Deep Reinforcement Learning based Autonomous Resource Management for wireless Virtual Networks. 1-4 - (Withdrawn) HCache: A Hybrid Caching Strategy in Information-Centric Networking. 1-2
- Dongbiao He, Jinlei Jiang, Guangwen Yang, Cédric Westphal:
CODA: Achieving Multipath Data Transmission in NDN. 1-8 - Kenneth Lamar, Ramin Izadpanah, Jim M. Brandt, Damian Dechev:
An Efficient Latch-free Database Index Based on Multi-dimensional Lists. 1-2 - Yulong Zhan, Jihong Zhu:
A More Scalable Scheduling Algorithm for FPGA-based Time-Triggered Network. 1-2 - Dongxiao Yu, Longlong Lin, Yong Zhang, Jiguo Yu, Yifei Zou, Qiang-Sheng Hua, Xiuzhen Cheng:
Fully Dynamic Broadcasting under SINR. 1-8 - Junjiao Liu, Libo Yin, Yan Hu, Shichao Lv, Limin Sun:
A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition. 1-8 - Quanquan Chu, Shiyu Liu, Xiaofeng Gao, Fan Wu, Guihai Chen, Qianni Deng:
Binoclt: A New Binomial Classification Scheme for Long-Text Mining in Online Social Network. 1-8 - Zirui Zhuang, Jingyu Wang, Qi Qi, Haifeng Sun, Jianxin Liao:
A Case-Based Decision System for Routing in Packet-Switched Networks. 1-2 - Tianming Yang, Haitao Wu, Wei Sun:
GD-FTL: Improving the Performance and Lifetime of TLC SSD by Downgrading Worn-out Blocks. 1-8 - Jian Wang, Yongxin Liu, Alfaidi Amal, Houbing Song, Richard S. Stansbury, Jiawei Yuan, Tianyu Yang:
Fountain Code Enabled ADS-B for Aviation Security and Safety Enhancement. 1-7 - Weidong Zhang, Hong Li, Hui Wen, Hongsong Zhu, Limin Sun:
A graph neural network based efficient firmware information extraction method for IoT devices. 1-8 - Yang Liu, Ying Zhang, Jianfeng Guan, Changqiao Xu, Yu Wang:
When Group Buying Meets Wi-Fi Advertising. 1-8 - Kuldip Singh Atwal, Mostafa A. Bassiouni:
DeepSDN: Connecting the Dots Towards Self-driving Networks. 1-8 - Ghanshyam Bhutra, Amar A. Rasheed, Rabi N. Mahapatra:
Privacy-Preserving ECG based Active Authentication (PPEA2) for IoT Devices. 1-7 - Yaodong Huang, Fan Ye, Yuanyuan Yang:
Peer Data Caching Algorithms in Large-Scale High-Mobility Pervasive Edge Computing Environments. 1-8 - Zhiqiang Guo, Xiaodong Dong, Sheng Chen, Xiaobo Zhou, Keqiu Li:
How to Set Timeout: Achieving Adaptive Load Balance in Asymmetric Topology Based on Flowlet Switching. 1-6 - Sen Wang, Biao Zhang:
Centralized In-network Caching for Information Centric Networking with Decoupling Data and Control Planes. 1-2 - Gabriel Meyer-Lee, Jiacheng Shang, Jie Wu:
Location-leaking through Network Traffic in Mobile Augmented Reality Applications. 1-8 - Hao Zhang, Shumin Dai, Yongdan Li, Wenjun Zhang:
Real-time Distributed-Random-Forest-Based Network Intrusion Detection System Using Apache Spark. 1-7 - Dingde Jiang, Yihang Zhang, Houbing Song, Wenjuan Wang:
Intelligent Optimization-Based Energy-Efficient Networking in Cloud Services for Multimedia Big Data. 1-6 - Amardeep Mehta, Ewnetu Bayuh Lakew, Johan Tordsson, Erik Elmroth:
Utility-based Allocation of Industrial IoT Applications in Mobile Edge Clouds. 1-10 - Suzhen Wang, Jingjing Luo, Yuan-Hsun Lo, Wing Shing Wong:
Forwarding and Optical Indices in an All-Optical BCube Networks. 1-8 - Haitao Wang, Zhanhuai Li, Xiao Zhang, Xiaonan Zhao, Xingsheng Zhao, Weijun Li, Song Jiang:
OC-Cache: An Open-channel SSD Based Cache for Multi-Tenant Systems. 1-6 - Weilan Lin, Meng Ma, Disheng Pan, Ping Wang:
FacGraph: Frequent Anomaly Correlation Graph Mining for Root Cause Diagnose in Micro-Service Architecture. 1-8 - Lanying Guo, Chao Peng, Siyuan Chen, Cheng He:
Reversible Programming Techniques for Shortest-Path Algorithms. 1-2 - Chao Liu, Jianan Li, Min Yu, Gang Li, Bo Luo, Kai Chen, Jianguo Jiang, Weiqing Huang:
URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls. 1-7 - Jiachen Yang, Qiming Zhao, Chang Wang, Bin Jiang, Tianyuan Zhang, Houbing Song:
Oceanic Data Processing System Based on Multi-sensor Interaction through Internet of Things. 1-8 - Jiang Zhi, Jun Li, Haibo Wu, Yongmao Ren:
GAC: Gain-Aware 2-Round Cooperative Caching Approach in Information-Centric Networking. 1-8 - Suhan Jiang, Jie Wu:
2-Dominant Resource Fairness: Fairness-Efficiency Tradeoffs in Multi-resource Allocation. 1-8 - Pinglan Liu, Wensheng Zhang:
A New Game Theoretic Scheme for Verifiable Cloud Computing. 1-8 - Ionut Cardei, Mihaela Cardei, Rafael Papa:
UAV-enabled Data Gathering in Wireless Sensor Networks. 1-8 - Nafiseh Sharghivand, Farnaz Derakhshan, Lena Mashayekhy:
QoS-Aware Matching of Edge Computing Services to Internet of Things. 1-8 - Yaobin Qin, Brandon Hoffmann, David J. Lilja:
HyperProtect: Enhancing the Performance of a Dynamic Backup System Using Intelligent Scheduling. 1-8 - Jonghyun Kim, Stephan Bohacek, Pratik K. Biswas, Siamak Samoohi, Sharon J. Mackey, Mitesh P. Patel:
Friendly-Jamming-Aware Routing Protocols for Tactical Networks. 1-6 - Jingrong Wang, Kaiyang Liu, George Tzanetakis, Jianping Pan:
Learning-based Cooperative Sound Event Detection with Edge Computing. 1-8 - Sajad Sameti, Mea Wang, Diwakar Krishnamurthy:
Stride: Distributed Video Transcoding in Spark. 1-8 - Rixin Xu, Qiang Zeng, Liehuang Zhu, Haotian Chi, Xiaojiang Du:
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study. 1-8 - Adriana Collaguazo Jaramillo, Ronny Alcivar, Joffre Pesantez, Ronald Ponguillo:
Cost Effective test-bed for Comparison of SDN Network and Traditional Network. 1-2 - Tong Shen, Xinyi Zhang, Gaogang Xie, Yuanmei Meng, Dafang Zhang:
CoDE: Fast Name Lookup and Update using Conflict-driven Encoding. 1-8 - Shuyi Zhang, Shiran Pan, Wei Wang, Qiongxiao Wang:
A Fast Secure Outsourcing of Ridge Regression Based on Singular-Value Decomposition. 1-8 - Zhen Chen, Jianxin Lin, Sen Liu, Jun Xia, Weiping Li:
Decouple and Stretch: A Boost to Channel Pruning. 1-6 - Chengshang Hou, Junzheng Shi, Cuicui Kang, Zigang Cao, Xiong Gang:
Classifying User Activities in the Encrypted WeChat Traffic. 1-8 - Pouya Ostovari, Jie Wu, Alireza Jolfaei:
Data Exchange in Delay Tolerant Networks using Joint Inter- and Intra-Flow Network Coding. 1-8 - Sen Wang, Biao Zhang:
On the Use of Q-Learning to Solve the Selectable Virtual Network Embedding Problem. 1-2 - Donghe Li, Qingyu Yang, Wei Yu, Dou An, Xinwen Fu:
Towards Incentive Mechanism for Taxi Services Allocation with Privacy Guarantee. 1-8 - Shuting Xu, Shuhua Lai, Yongjian Li:
A Deep Learning Based Framework for Cloud Masquerade Attack Detection. 1-2 - Hao Yan, Armin Haj Aboutalebi, Lide Duan:
Efficient Allocation and Heterogeneous Composition of NVM Crossbar Arrays for Deep Learning Acceleration. 1-8 - Yanal Alahmad, Tariq Daradkeh, Anjali Agarwal:
Availability-Aware Container Scheduler for Application Services in Cloud. 1-6 - Shohei Karaguchi, Kazuya Sakai, Satoshi Fukumoto:
Quality-Aware Task Assignment in Opportunistic Network-Based Crowdsourcing. 1-7 - Maria Valero, Fangyu Li, WenZhan Song, Xiangyang Li:
Imaging Subsurface Civil Infrastructure with Smart Seismic Network. 1-8 - Jiahao Bu, Ying Liu, Shenglin Zhang, Weibin Meng, Qitong Liu, Xiaotian Zhu, Dan Pei:
Rapid Deployment of Anomaly Detection Models for Large Number of Emerging KPI Streams. 1-8 - Muhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya:
U-PoT: A Honeypot Framework for UPnP-Based IoT Devices. 1-8 - Xiaokun Zhang, Yan Liu, Jing Chen:
Network Embedding based on External Word Vectors. 1-2 - Yuhua Guo, Weijun Xiao, Qing Liu, Xubin He:
A Cost-effective and Energy-efficient Architecture for Die-stacked DRAM/NVM Memory Systems. 1-2 - Wenjie Yang, Guodong Sun, Xingjian Ding, Xiaoyue Zhang:
Budget-feasible User Recruitment in Mobile Crowdsensing with User Mobility Prediction. 1-10 - Paulo Pereira, Jean Araujo, Rúbens de Souza Matos Júnior, Nuno M. Preguiça, Paulo R. M. Maciel:
Software Rejuvenation in Computer Systems: An Automatic Forecasting Approach Based on Time Series. 1-8 - Jingyi Zheng, Xiaoheng Deng, Honggang Zhang:
A Novel Method to Generate Frequent Itemsets in Distributed Environment. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.