default search action
ACM TUR-C 2017: Shanghai, China
- John C. S. Lui, Xinbing Wang, Alexander Wolf, Yunhao Liu, Chuanping Hu:
Proceedings of the ACM Turing 50th Celebration Conference - China, TUR-C 2017, Shanghai, China, May 12-14, 2017. ACM 2017, ISBN 978-1-4503-4873-7 - Ming Zhang, Jile Zhu:
A data-driven analysis of student efforts and improvements on a SPOC experiment. 1:1-1:6 - Xiaohua Tian, Jiaqi Liu, Xinbing Wang:
Streamline architecture of network simulator to facilitate teaching of computer networking. 2:1-2:6 - Yuxiang Zhang, Yu Chen, Xiaojian Ma, Yuhan Tang, Yilin Niu, Shanshan Li, Weidong Liu:
Remote FPGA lab platform for computer system curriculum. 3:1-3:6 - Yunfan Chen, Ming Zhang:
MOOC student dropout: pattern and prevention. 4:1-4:6 - Yao Guo, Junlin Lu, Yifeng Chen, Ming Zhang, Wenxin Li:
Hybrid small class teaching: dividing and conquering large computer systems classes. 5:1-5:6 - Haoyu Zhou, Yushan Zhou, Haifeng Zhang, Houjun Huang, Wenxin Li:
Botzone: a competitive and interactive platform for game AI education. 6:1-6:5 - Yu Zhang, Xianglan Chen, Xin An, Jianliang Lu, Xuejun Li, Xuehai Zhou:
Building step-by-step practical curriculum system for computer systemic ability training. 7:1-7:6 - Bin Xu, Kexin Li, Kening Gao, Changkuan Zhao, Ge Yu, Jinshuang Li:
Matrix completion for SPOC student peer-grading evaluation. 8:1-8:6 - Ruobin Wang, Fengxia Li, Nannan Cheng, Bin Xiao, Jiandong Wang, Chuntao Du:
How does web-based virtual reality affect learning: evidences from a quasi-experiment. 9:1-9:7 - Maoyang Zou, Xi Wu:
Research on quantitative quality evaluation method based on double cycles. 10:1-10:5 - Qiang Liu, Wentao Zhao, Dan Liu, Jiao Ji:
Evaluation of situational case-based teaching technique in engineering education. 11:1-11:7 - Bo Li, Xiaobin Zhang, Ning Wu:
Teaching evaluation for computational-thinking-oriented elementary computer courses. 12:1-12:6 - Hongzhi Wang, Hong Gao, Shengjun Yin, Jie Zhu:
The design of course architecture for big data. 13:1-13:6 - Shumin Shi, Heyan Huang, Jun Zheng:
From the perspective of teaching scheme: cultivating and training undergraduates driven by engineering education accreditation. 14:1-14:4 - Jumin Zhao, Shimin Huo, Yanxia Li, Dengao Li, Xinyan Liu, Jie Zhou:
Tide and shock: the influential modern teaching methods on chinese education reform. 15:1-15:6 - Yanchun Sun, Chao Xin:
Using coursera clickstream data to improve online education for software engineering. 16:1-16:6 - Xiaoou Ding, Hongzhi Wang, Yitong Gao, Jianzhong Li, Hong Gao:
Determining the currency of dynamic data. 17:1-17:6 - Yaoqiang Xu, Yongqing Xie, Jianhua Feng:
Correlation analysis between electricity consumption and economic development. 18:1-18:6 - Amina Belhassena, Hongzhi Wang:
Distributed skyline trajectory query processing. 19:1-19:7 - Haiquan Wang:
An APCA-enhanced compression method on large-scale time-series data. 20:1-20:6 - Ning Yin, Hongyan Li, Hanchen Su:
CLR: coupled logistic regression model for CTR prediction. 21:1-21:9 - Bing Xiao, Jinwei Guo, Weining Qian, Huiqi Hu, Aoying Zhou:
NIOSIT: efficient data access for log-structured merge-tree style storage systems. 22:1-22:10 - Huiying Wang, Jianhua Feng:
FlashSkipList: indexing on flash devices. 23:1-23:10 - Yun Ma, Qing Li, Zhenguo Yang, Wenyin Liu, Antoni B. Chan:
Learning word embeddings via context grouping. 24:1-24:10 - Chuan Li, Zhiheng Jiang, Yijie Li, Yangfan Miao, Daiyan Hu, Guangming Liu, Yijing Liu:
NANI: an efficient community detection algorithm based on nested aggregation of node influence. 25:1-25:10 - Nathan Scrivens, Xiaodong Lin:
Android digital forensics: data, extraction and analysis. 26:1-26:10 - Kai Fan, Hui Li, Wei Jiang, Chengsheng Xiao, Yintang Yang:
U2F based secure mutual authentication protocol for mobile payment. 27:1-27:6 - Jieqiong Hou, Haifeng Qian:
Collaboratively filtering malware infections: a tensor decomposition approach. 28:1-28:7 - Yunxia Feng, Xu Li, Bo Song:
(k, R, r)-anonymity: a light-weight and personalized location protection model for LBS query. 29:1-29:7 - Shuang Liang, Yue Zhang, Bo Li, Xiaojie Guo, Hao Guo, Xiaoyun He, Zheli Liu, Chunfu Jia:
ShadowPWD: practical browser-based password manager with a security token. 30:1-30:6 - Bo Fu, Yang Xiao, Hui Chen:
FNF: flow-net based fingerprinting. 31:1-31:5 - Liang He, Zhixiang Li, Chao Shen:
Performance evaluation of anomaly-detection algorithm for keystroke-typing based insider detection. 32:1-32:7 - Huaxin Li, Qingrong Chen, Haojin Zhu, Di Ma:
Hybrid de-anonymization across real-world heterogeneous social networks. 33:1-33:7 - Ningjia Fu, Jianzhong Zhang, Wenping Yu, Changhai Wang:
Crowdsourcing-based wifi fingerprint update for indoor localization. 34:1-34:9 - Huikang Li, Yi Gao, Wei Dong, Chun Chen:
Taming both predictable and unpredictable link failures for network tomography. 35:1-35:10 - Xiaoshan Yu, Hong Xu, Huaxi Gu:
Thor: a server-level hybrid switching data center network with heterogeneous topologies. 36:1-36:10 - Yi Wang, Zhuyun Qi, Kai Lei, Bin Liu, Chen Tian:
Preventing "bad" content dispersal in named data networking. 37:1-37:8 - Xiaohua Tian, Jiaqi Liu, Wei Liu, Yu Cheng, Lijun Ou, Zilong Zhao:
Security analysis of Bloom filter based multicast forwarding. 38:1-38:10 - Shuzhuang Zhang, Hao Luo, Zhi-Gang Wu, Yi Wang:
Composed sketch framework for quantiles and cardinality queries over big data streams. 39:1-39:10 - Lei Xu, Ke Xu, Meng Shen, Kui Ren, Jingyuan Fan, Chaowen Guan, Wenlong Chen:
MINOS: regulating router dataplane actions in dynamic runtime environments. 40:1-40:10 - Cunlu Li, Dezun Dong, Xiangke Liao:
Exploiting contention and congestion aware switch allocation in network-on-chips. 41:1-41:10 - Jiandian Zeng, Tian Wang, Md. Zakirul Alam Bhuiyan:
Cooperative relay tracking with multiple mobile camera sensors. 42:1-42:7 - Liang Liu, Huadong Ma, Bo Chen, Wenbo Yang:
GlobeSen: an open interconnection framework based on named sensory date for IoT. 43:1-43:10 - Xiaolei Zhou, Deke Guo, Xiaoqiang Teng:
MagSpider: a localization-free approach for constructing global indoor map for navigation purpose. 44:1-44:10 - Yubo Yan, Panlong Yang, Xiang-Yang Li, Yafei Zhang:
COFFEE: coexist wifi for ZigBee networks: a frequency overlay approach. 45:1-45:6 - Chunbin Lin, Jianguo Wang, Chuitian Rong:
Towards heterogeneous keyword search. 46:1-46:6 - Chunlin Xu, Shengli Wu:
The early fusion strategy for search result diversification. 47:1-47:6 - Haoyang Zhu, Peidong Zhu, Xiaoyong Li, Qiang Liu:
Computing skyline groups: an experimental evaluation. 48:1-48:6 - Cai Fu, Chenchen Peng, Xiao-Yang Liu:
Search engine drives the evolution of social networks. 49:1-49:5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.