default search action
DASC/PiCom/DataCom/CyberSciTech 2016: Auckland, New Zealand
- 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2016, Auckland, New Zealand, August 8-12, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-4065-0
CyberSciTech 2016
Regular Papers
- Jianhua Ma, Kim-Kwang Raymond Choo, Hui-Huang Hsu, Qun Jin, William Liu, Kevin I-Kai Wang, Yufeng Wang, Xiaokang Zhou:
Perspectives on Cyber Science and Technology for Cyberization and Cyber-Enabled Worlds. 1-9 - Li Zhou, Jiao Zhang, Boon-Chong Seet, Lei Zuo, Xiping Hu, Jiaxun Li, Shan Wang, Jibo Wei:
Software Defined Small Cell Networking under Dynamic Traffic Patterns. 10-17 - Qingyong Li, Yunqiang Tan, Huayan Zhang, Shengwei Ren, Peng Dai, Weiyi Li:
A Visual Inspection System for Rail Corrugation Based on Local Frequency Features. 18-23 - W. G. C. W. Kumara, Timothy K. Shih, Hui-Huang Hsu, Shih-Jung Wu, Stanislav V. Klimenko, Andrei Klimenko:
Surface Construction from Kinect RGB-D Stream. 24-30 - Fei Wang, Hongbo Wang:
Record Linkage Using the Combination of Twice Iterative SVM Training and Controllable Manual Review. 31-38 - Xiaokang Zhou, Bo Wu, Qun Jin, Jianhua Ma, Weimin Li, Neil Y. Yen:
Personal Data Analytics to Facilitate Cyber Individual Modeling. 39-46
Regular Papers
- Sadia Din, Anand Paul, Awais Ahmad, Seungmin Rho:
Emerging Mobile Communication Technologies for Healthcare System in 5G Network. 47-54 - Huitao Yang, Boon-Chong Seet, Syed Faraz Hasan, Peter Han Joo Chong, Min Young Chung:
Radio Resource Allocation for D2D-Enabled Massive Machine Communication in the 5G Era. 55-60 - Ying-Hong Wang, Cheng-Han Tsai:
Applying Virtual Coordination Anchor Node to Routing Mechanism in Wireless Sensor Networks. 61-68 - Yufeng Wang, Jiabing Chen, Qun Jin, Jianhua Ma:
Message Forwarding Strategies in Device-to-Device Based Mobile Social Networking in Proximity (MSNP). 69-74 - Su-Wan Park, Jeong-Nyeo Kim:
A Scheme for Controlling Functionality of Mobile Device Using Specialized Codes. 75-82
Poster Papers
- Haitao Liu, Yu Huang, Guangxian Lv, Peng Jin, Xueyuan Su:
A Fault Injection Simulation Method Based on Petri Net. 83-86 - Hua-An Zhao:
A Cyber Voice Recognition with Low SNR. 87-90 - Santosh Kumar, Anuradha Negi, Keshav Prasad, Aniket Mahanti:
Evaluation of Network Risk Using Attack Graph Based Security Metrics. 91-93 - Songlak Sakulwichitsintu:
What Influences the Students' Learning Experience? The Impact of Peer Learning in an Online Environment. 94-96
Special Sessions
Cyber Data Mining for Natural Language Processing
- Xiali Li, Songting Deng, Xinyang Wang, Yongji Li, Licheng Wu, Junxian Duan:
Review of Research on Computer Games for Tibetan Chess. 97-99 - Qiumei Pu:
The Design and Implementation of a High-Efficiency Distributed Web Crawler. 100-104 - Qiumei Pu, Hong Zhang:
Ontology Modeling and Application of Multi-agent for Negotiation System. 105-108 - Xiaoxu Li, Yiming Zhang, Junli Wang, Qiumei Pu:
A Preliminary Study of Plant Domain Ontology. 109-112
User Modeling Driven Personalized Services in Social Cyberspace
- Hang Zhou, Qing Li, Ningning Dong, Xinying Zhu, Xiaodong Liu:
A Proportional Multi-resource Scheduling Model in SDCloud. 113-118 - Lei Wang, Lingyu Xu, Jie Yu, Yunlan Xue, Gaowei Zhang, Xiang Yu, Bofeng Zhang:
The Construction and Analysis of Baidu Baike Entry Network. 119-123 - Mingqing Huang, Bofeng Zhang, Guobing Zou, Chengwei Gu, Peiye Wu, Shulin Cheng, Zhu Zhang:
Socialized User Modeling in Microblogging Scenarios for Interest Prediction. 124-131 - Sulan Zhang, Yi Jin, Yunfu Shen, Junjie Peng, Shan Ouyang, Cong Peng:
Overview of the Task Management System of Ternary Optical Computer. 132-135 - Ling Fang, Yongmei Lei:
An Asynchronous Distributed ADMM Algorithm and Efficient Communication Model. 136-140
Cyber Social Computing and Cyber-Enabled Applications
- Yaya Liu, Jiulei Jiang:
Analysis and Modeling for Interaction with Mobility Based on Pi-Calculus. 141-146 - Shuanghu Luo, Jun Xie:
A Probabilistic Perspective Model for Recommendation Considering Long Tail Effect. 147-150 - Wei Liu, Yue Tan, Ning Ding, Yujia Zhang, Zongtian Liu:
An Ontology Pattern for Emergency Event Modeling. 151-156 - Weimin Li, Shu Jiang, Huaikou Miao, Xiaokang Zhou, Qun Jin:
Overlap Community Detection Based on Node Convergence Degree. 163-167
Cyber Security and Privacy with Network Log Analytics
- Zijian Zhang, Ange Tong, Liehuang Zhu, Mingxin Chen, Pengchuan Su:
An Anonymous Scheme for Current Taxi Applications. 168-172 - Yajun Liu, Xuan Zhang:
Intrusion Detection Based on IDBM. 173-177 - Ruoyu Chen, Yangsen Zhang, RongRong Bi, Yuru Jiang, Yanhua Zhang:
A MapReduce-Based Framework for Analyzing Web Logs in Offline Streams. 178-183 - Ziheng Wei, Jiamou Liu:
Measuring Structural Resilience through a Carrier Network Model. 184-189
Big Data Techniques and Image Processing under Cyber
- Quansheng Dou, Jinjiang Li, Hui Fan, Yuehao Pan:
Noisy Problem on Discrete Linear Consensus Protocol in Networked Multi-agent Systems. 190-195 - Hui Fan, Yan Zhang, Zhen Hua, Jinjiang Li, Tao Sun, Menglin Ren:
ShapeNets: Image Representation Based on the Shape. 196-201 - Hongyan Wang, Xingwei Hao, Wenjiang Jiao, Xingwu Jia:
Causal Association Analysis Algorithm for MOOC Learning Behavior and Learning Effect. 202-206 - Mingliang Hou, Xingwei Hao, Shuo Tian, Yi Liu:
Construction of Learning Partners Based on Learning Interest. 207-210 - Liang Guo, Guizhong Wang, Fan Zhang, Xuemei Li:
Single Image Super-resolution Based on Self-Similarity and Dictionary Neighborhood. 211-216 - Qinglan Fan, Yunfeng Zhang, Xunxiang Yao, Fangxun Bao, Xiaohong Shen:
A New Interpolation Algorithm Based on the Frequency Transform. 217-222 - Chaoqun Zheng, Xiaozhi Zheng, Guizhong Wang, Shuo Tian, Qiang Guo:
Saliency Detection Based on Multi-scale Image Features. 223-227 - Jingqi Song, Hui Liu, Fenghuan Geng, Caiming Zhang:
Weakly-Supervised Classification of Pulmonary Nodules Based on Shape Characters. 228-232 - Wenhua Zhang, Shanshan Gao, Jing Chi, Hui Liu, Yuanfeng Zhou:
Single Image Dehazing Method under the Influence of Un-uniform Illumination. 233-238
Cyber-Physical System for Sustainability
- Asif Iqbal, Colin Pattinson, Ah-Lian Kor:
Managing Energy Efficiency in the Cloud Computing Environment Using SNMPv3: A Quantitative Analysis of Processing and Power Usage. 239-244 - Michail Papanderou, Ah-Lian Kor, Colin Pattinson:
Evaluation of ICT Environmental Impact for an SME. 245-250 - Latifah M. AlHarbi, Colin Pattinson:
Effective Green IT Strategy in a UK Higher Education Institute. 251-256 - Jeanette Shaw, Ah-Lian Kor, Colin Pattinson:
An Evaluation of the Impact of Remote Collaboration Tools on Corporate Sustainability. 257-262
DASC 2016
Regular Papers
- Nitin Naik, Paul Jenkins:
Enhancing Windows Firewall Security Using Fuzzy Reasoning. 263-269 - Jelena Milosevic, Alberto Ferrante, Miroslaw Malek:
MalAware: Effective and Efficient Run-Time Mobile Malware Detector. 270-277 - Nazia Majadi, Jarrod Trevathan, Neil Bergmann:
uAuction: Analysis, Design, and Implementation of a Secure Online Auction System. 278-285 - Md. Zakirul Alam Bhuiyan, Jie Wu:
Collusion Attack Detection in Networked Systems. 286-293 - Li Liao, Bixin Li, Chao Li:
A Model to Evaluate the Credibility of Service in Cloud Computing Environment. 294-301 - Chunsheng Zhu, Yinjia Huo, Victor C. M. Leung, Laurence T. Yang:
Sensor-Cloud and Power Line Communication: Recent Developments and Integration. 302-308 - Raneel Kumar, Sunil Pranit Lal, Alok Sharma:
Detecting Denial of Service Attacks in the Cloud. 309-316 - Shahryar Khan Afridi, Daud Khan, Latif Jan, Aftab Khan:
Multi-stakeholders' Policy Enforcement for Android. 317-321 - Marina Purgina, Maxim Mozgovoy, Vitaly Klyuev:
Developing a Mobile System for Natural Language Grammar Acquisition. 322-325 - Vijay Naidu, Ajit Narayanan:
Needleman-Wunsch and Smith-Waterman Algorithms for Identifying Viral Polymorphic Malware Variants. 326-333 - Zaher Owda, Moisés Urbina, Roman Obermaisser, Mohammed Abuteir:
Hierarchical Transactional Memory Protocol for Distributed Mixed-Criticality Embedded Systems. 334-343 - Kengo Imae, Naohiro Hayashibara:
ChainVoxel: A Data Structure for Scalable Distributed Collaborative Editing for 3D Models. 344-351 - Malte Burkert, Heiko Krumm:
Dependency Management in Component-Based Building Automation Systems. 352-359 - Christian Esposito, Aniello Castiglione, Francesco Palmieri, Florin Pop:
Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification. 360-367 - Andreas Ibing, Julian Kirsch, Lorenz Panny:
Autocorrelation-Based Detection of Infinite Loops at Runtime. 368-375 - Christian Esposito, Aniello Castiglione, Francesco Palmieri, Massimo Ficco, Kim-Kwang Raymond Choo:
A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things. 376-383 - Jun O. Seo, Sathiamoorthy Manoharan, Aniket Mahanti:
A Discussion and Review of Network Steganography. 384-391 - Bruno Costa, Paulo F. Pires, Flávia Coimbra Delicato, Wei Li, Albert Y. Zomaya:
Design and Analysis of IoT Applications: A Model-Driven Approach. 392-399 - Yen-Lun Tseng, Guey-Yun Chang, Chun-Chung Shih, Yue-Xin Liu, Tien-Hsiang Wu:
Range Encoding-Based Network Verification in SDN. 400-405 - Sayantan Guha, Stephen S. Yau, Arun Balaji Buduru:
Attack Detection in Cloud Infrastructures Using Artificial Neural Network with Genetic Feature Selection. 414-419 - Kaixuan Lu, Wei Zhu:
Stereoscopic Image Quality Assessment Based on Cyclopean Image. 420-423
Poster Papers
- Chuangming Xia, Jing Tian, Erqing Li, Junwei Zhou, Jianwen Xiang, Jin Wang, Liang Bai, Yueying He:
An Efficient Tool for Industrial Control System Security Analysis. 424-427 - Nitin Naik, Paul Jenkins:
An Analysis of Open Standard Identity Protocols in Cloud Computing Security Paradigm. 428-431
The 2nd International Workshop on Social Computing in Health Informatics (Social Health 2016)
- Haiping Zhang, Gang Wang, Hongjun Qiu, Weitong Hu, Lanping Yu:
Tolerance-Based Group Scoring Scheme Promotes Cooperation in Public Goods Game. 432-436 - Fei Lin, Linyao Zhang, Haitao Xu, Yong Sun:
An Improved Exponential Smoothing Model on Rental Trends Prediction of Public Bicycle Stations. 437-441 - Hong Ding, Xiangyu Chen, Benyun Shi, Yanming Ye, Yizhi Ren:
Effect of Different Migration Strategies on Evolution of Cooperation in Spatial Prisoner's Dilemma Game. 442-447
International Workshop on Emerging Dependable Computing System Technologies and Applications (EDCSTA 2016)
- Eduardo B. Fernández:
Threat Modeling in Cyber-Physical Systems. 448-453 - Toshihiro Uchibayashi, Bernady O. Apduhan, Norio Shiratori:
An Ontology-Based Framework for Hybrid Cloud Resiliency Mechanism. 454-458
PICom 2016
Regular Papers
- Khushnood Abbas, Xin Luo, Mingsheng Shang:
Discovering Items with Potential Popularity on Social Media. 459-466 - Hania Aslam, Hamid Mukhtar, Farhana Seemi, Djamel Belaïd:
Harnessing Smartphones as a Personal Informatics Tool towards Self-Awareness and Behavior Improvement. 467-474 - Nai-Wei Lo, Shau-Kang Lu, Yo-Hsuan Chuang:
A Framework for Third Party Android Marketplaces to Identify Repackaged Apps. 475-482 - Emmanuel Ndashimye, Nurul I. Sarkar, Sayan Kumar Ray:
A Novel Network Selection Mechanism for Vehicle-to-Infrastructure Communication. 483-488 - Ahmed Murkaz, Riaz Hussain, Syed Faraz Hasan, Min Young Chung, Boon-Chong Seet, Peter Han Joo Chong, Syed Tariq Shah, Shahzad Ali Malik:
Architecture and Protocols for Inter-cell Device-to-Device Communication in 5G Networks. 489-492 - Debraj Basu, Syed Faraz Hasan:
Assessing Device-Free Passive Localization with a Single Access Point. 493-496 - Hong Yao, Cai Fu, Qingfeng Huang, Zhicun Fang, JieHua Zeng, Lansheng Han:
Communities Evolution Analysis Based on Events in Dynamic Complex Network. 497-503 - Lizhi Peng, Haibo Zhang, Bo Yang, Yuehui Chen, Xiaoqing Zhou:
Early Stage Internet Traffic Identification Using Data Gravitation Based Classification. 504-511 - Abbas Arghavani, Haibo Zhang, Zhiyi Huang:
LPA: Learning-Based Power Aware Communication Protocol in WBANs. 512-519 - Krzysztof Pawelec, Artem Lenskiy:
A Moment-Based Classification Algorithm and Its Comparison to the K-Nearest Neighbours for 2-Dimensional Data. 520-525 - Hong-Chan Chang, Cheng-Chien Kuo, Yuan-Sheng Li:
An Intelligent Defects Identification for Motors Using Partial Discharge Signals. 526-529 - Syed Omer Gilani, Mohsin Jamil, Zahra Fazal, Muhammad Naveed, Rabiel Sakina:
Automated Scene Analysis by Image Feature Extraction. 530-536 - Jing Gao, Liang Zhao, Zhikui Chen, Peng Li, Han Xu, Yueming Hu:
ICFS: An Improved Fast Search and Find of Density Peaks Clustering Algorithm. 537-543 - Ramon Sanchez-Iborra, Juan F. Inglés-Romero, Ginés Doménech-Asensi, José-Luis Moreno-Cegarra, María-Dolores Cano:
Proactive Intelligent System for Optimizing Traffic Signaling. 544-551 - David Airehrour, Jairo A. Gutiérrez, Sayan Kumar Ray:
A Lightweight Trust Design for IoT Routing. 552-557 - N. M. Abdul Latiff, Nik Noordini Nik Abdul Malik, Lhassane Idoumghar:
Hybrid Backtracking Search Optimization Algorithm and K-Means for Clustering in Wireless Sensor Networks. 558-564 - Yan-Wun Qiu, Jen-Ing G. Hwang:
A Two-Level Load Balancing Method with Dynamic Strategy for Cloud Computing. 565-571 - Yidong Li, Xiangjun Meng, Hairong Dong:
A Simulated Annealing Combined Genetic Algorithm for Virtual Machine Migration in Cloud Datacenters. 572-577 - Kambiz Ghazinour, Tahani Albalawi:
A Usability Study on the Privacy Policy Visualization Model. 578-585 - Abhishek Kumar Jain, Douglas L. Maskell, Suhaib A. Fahmy:
Are Coarse-Grained Overlays Ready for General Purpose Application Acceleration on FPGAs? 586-593 - Deyuan Liu, Xingang Liu, Yayong Li:
Fast CU Size Decisions for HEVC Intra Frame Coding Based on Support Vector Machines. 594-597 - Wentao Yang, Yiming Pi:
A Low-Complexity Intra Prediction Mode Selection Algorithm in HEVC. 598-603
DataCom 2016
Regular Papers
- Mark A. Oxley, Sudeep Pasricha, Anthony A. Maciejewski, Howard Jay Siegel, Patrick J. Burns:
Online Resource Management in Thermal and Energy Constrained Heterogeneous High Performance Computing. 604-611 - ShiouCheng Yu, Quey-Liang Kao, Che-Rung Lee:
Performance Optimization of the SSVD Collaborative Filtering Algorithm on MapReduce Architectures. 612-619 - Yongmei Wei, Fengmin Chen:
expanCodes: Tailored LDPC Codes for Big Data Storage. 620-625 - Jie Xu, Wei Ding, Jian Gong, Xiaodong Zang:
Backbone Traffic Pattern Analysing Based on Joint Entropy. 626-633 - Julie Yixuan Zhu, Jialing Xu, Victor O. K. Li:
A Four-Layer Architecture for Online and Historical Big Data Analytics. 634-639 - Farhad Mehdipour, Bahman Javadi, Aniket Mahanti:
FOG-Engine: Towards Big Data Analytics in the Fog. 640-646 - Haitao Tang, Kaj Stenberg:
Self-Operation of a Network. 647-653 - Ming Zhao, Arun Kumar, G. G. Md. Nawaz Ali, Peter Han Joo Chong:
A Cloud-Based Network Architecture for Big Data Services. 654-659 - Li Xu, Hui Li, Jingting Sun, Kai Pan, Guanghui Zhang:
QoS Oriented Embedding for Network Virtualization. 660-665 - Parinaz Ameri, Nico Schlitter, Jörg Meyer, Achim Streit:
NoWog: A Workload Generator for Database Performance Benchmarking. 666-673 - Guoyu Yang, Qibo Sun, Ao Zhou, Jinglin Li, Xiang Yuan, Hanyi Tang:
A Context-Aware Trust Prediction Method Based on Behavioral Data Analysis in Distributed Network Environments. 674-680 - Eileen Kuehn, Achim Streit:
Online Distance Measurement for Tree Data Event Streams. 681-688 - Mathupayas Thongmak:
Comparing Intention and Behavior: Characteristics of Valuable Information and Information Verification. 689-695 - Ren-Shiou Liu, Tian-Chih Yang:
Improving Recommendation Accuracy by Considering Electronic Word-of-Mouth and the Effects of Its Propagation Using Collective Matrix Factorization. 696-703 - Gang Wang, Zun Lin, Jie Wu:
On the Role of Mobility and Network Coding on Multi-message Gossip in Random Geometric Graph. 704-709 - Zhen Wang, Sihai Zhang:
CDR Based Temporal-Spatial Analysis of Anomalous Mobile Users. 710-714 - Hossein Jafari, Xiangfang Li, Lijun Qian:
Efficient Processing of Uncertain Data Using Dezert-Smarandache Theory: A Case Study. 715-722 - Elayaraja Aruchunan, Nathnarong Khajohnsaksumeth, Benchawan Wiwatanapataphee:
A New Algorithm of Geometric Mean for Solving High-Order Fredholm Integro-differential Equations. 723-729 - Jie Xu, Mengji Shi, Chao-Yuan Chen, Zhen Zhang, Jigao Fu, Chi Harold Liu:
ZQL: A Unified Middleware Bridging Both Relational and NoSQL Databases. 730-737 - Yi-Ren Chen, Che-Rung Lee:
G-Storm: A GPU-Aware Storm Scheduler. 738-745 - Wonchul Seo, Namhyoung Kim, Sungchul Choi:
Big Data Framework for Analyzing Patents to Support Strategic R&D Planning. 746-753 - Divya Rao, Wee Keong Ng:
Information Pricing: A Utility Based Pricing Mechanism. 754-760 - Han Jiao, Lu Lu, Zhanhua Xin:
On the Incentive Effect of Reputation Systems. 761-768 - Hojjat Baghban, Jerry Chou, Ching-Hsien Hsu, Yeh-Ching Chung:
Modeling of Resource Granularity and Utilization with Virtual Machine Splitting. 769-772 - Sharyar Wani, Mohamed Ridza Wahiddin, Tengku Mohd Tengku Sembok:
Logico-linguistic Semantic Representation of Documents. 773-780 - Dingkun Li, Hyun Woo Park, Ibrahim M. Ishag, Erdenebileg Batbaatar, Keun Ho Ryu:
Design and Partial Implementation of Health Care System for Disease Detection and Behavior Analysis by Using DM Techniques. 781-786 - Dandan Miao, Weijian Sun, Xiaowei Qin, Weidong Wang:
MSFS: Multiple Spatio-temporal Scales Traffic Forecasting in Mobile Cellular Network. 787-794 - Eugenio Cesario, Charlie Catlett, Domenico Talia:
Forecasting Crimes Using Autoregressive Models. 795-802 - Chih-Wei Ho, Chun-Ting Chou, Yu-Chun Chien, Chia-Fu Lee:
Unsupervised Anomaly Detection Using Light Switches for Smart Nursing Homes. 803-810 - Dillon Chrimes, Belaid Moa, Hamid Zamani, Mu-Hsing Kuo:
Interactive Healthcare Big Data Analytics Platform under Simulated Performance. 811-818 - Eugenio Cesario, Carmela Comito, Domenico Talia:
A Comprehensive Validation Methodology for Trajectory Pattern Mining of GPS Data. 819-826 - Cheng Wu, Jigao Fu, Zhen Zhang, Chi Harold Liu:
Efficient On/Off-Line Query Pre-processing for Telecom Social Streaming Data. 827-834 - Jie Yang, Ahm Mehbub Anwar:
Social Media Analysis on Evaluating Organisational Performance a Railway Service Management Context. 835-841 - Makoto Komazawa, Kenichi Itao, Hiroyuki Kobayashi, Zhiwei Luo:
Analysis of Human Autonomic Nervous Activity Based on Big Data Measurement via SmartPhone. 842-847 - Marthinus J. Booysen, A. H. Cloete:
Sustainability through Intelligent Scheduling of Electric Water Heaters in a Smart Grid. 848-855 - Smain Femmam, Mohamed Ikbal Benakila:
A New Topology Time Division Beacon Construction Approach for IEEE802.15.4/ZigBee Cluster-Tree Wireless Sensor Networks. 856-860 - Shuilin Guo, Rui Wang, Bin Liu, Qiyue Wei, Yanping Li:
Vehicle Classification in Acoustic Sensor Networks Based on Hybrid Dictionary Learning. 861-865 - Carson K. Leung, Fan Jiang, Hao Zhang, Adam G. M. Pazdor:
A Data Science Model for Big Data Analytics of Frequent Patterns. 866-873
Poster Papers
- Jian Wei, Jianhua He, Kai Chen, Yi Zhou, Zuoyin Tang:
Collaborative Filtering and Deep Learning Based Hybrid Recommendation for Cold Start Problem. 874-877 - Jong-Hyuk Im, Jinchun Choi, DaeHun Nyang, Mun-Kyu Lee:
Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption. 878-881 - Peng Xu, Yadong Zhang, Kai Shuang:
Log on Cloud: A SaaS Data Collection, Storage, and Analysis Framework. 882-885 - Lekha R. Nair, Sarath Saleem, Sujala D. Shetty:
Scalable Interactive Geo Visualization Platform for GIS Data Analysis. 886-889 - Sergey A. Lesko, Dmitry O. Zhukov:
Stochastic Self-Organisation of Poorly Structured Data and Memory Realisation in an Information Domain When Designing News Events Forecasting Models. 890-893 - Miguel Tasende:
Generation of the Single Precision BLAS Library for the Parallella Platform, with Epiphany Co-processor Acceleration, Using the BLIS Framework. 894-897 - Hanafy M. Ali:
Enhancing Mobility Management and Supporting 3d Visualization. 898-904 - Khandelwal Veena, Chaturvedi Anand, Chandra Prakash Gupta:
Temporal and Spatial Trend Analysis of Cloud Spot Instance Pricing in Amazon EC2. 909-912 - Carson K. Leung, Vadim V. Kononov, Adam G. M. Pazdor, Fan Jiang:
PyramidViz: Visual Analytics and Big Data Visualization for Frequent Patterns. 913-916 - Wei-Fa Liao, Hung-Min Sun, Wei Wu:
A Distributed and Autonomous Guard System Based on Cloud Environments. 917-920
International Workshop on Big Data Programming and System Software (BDPSS) and Data Intensive Computing and Communications for Sustainable Development (DICC4SD)
- Guang Yang, Pingpeng Yuan, Hai Jin:
Fast Processing SPARQL Queries on Large RDF Data. 921-926 - Huizhong Zhong, Shaofeng Li, Feng Zhao, Hai Jin, Qin Zhang:
A Semantic-Based Approach to Building Auxiliary System for Screen-Based Reading. 927-932 - Zheng-Wu Lu:
Research about New Media Security Technology Base on Big Data Era. 933-936 - Zheng-Wu Lu, Gang Zhou:
Design and Implementation of Hybrid Shingled Recording RAID System. 937-942 - David Parry, Samaneh Madanian, Tony Norris:
Disaster EHealth-Sustainability in the Extreme. 943-946 - Ambreen Memon, William Liu, Adnan Al-Anbuky:
CatchMe If You Can: Enable Sustainable Communications Using Internet of Movable Things. 947-952
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.