Abstract is missing.
- Secure Similar Document Detection: Optimized Computation Using the Jaccard CoefficientSam Forman, Bharath Kumar Samanthula. 1-4 [doi]
- Fast Activation Function Approach for Deep Learning Based Online Anomaly Intrusion DetectionKhaled Alrawashdeh, Carla Purdy. 5-13 [doi]
- Research on a New Metadata Model of Political Event Data SetBiao Wang, YiWei Zhang, Ding Wang 0004. 14-19 [doi]
- Transferring Age and Gender Attributes for Dimensional Emotion Prediction from Big Speech Data Using Hierarchical Deep LearningHuijuan Zhao, Ning Ye, Ruchuan Wang 0001. 20-24 [doi]
- Big Data Processing and Access Controls in Cloud EnvironmentYenumula B. Reddy. 25-33 [doi]
- An Access Pattern Model Analysis for Online VoD Multimedia Flow for BigdataZhijie Han 0001, Ji-Ao Ma, Hui Zhao. 34-38 [doi]
- A Survey of Network Topology of Data CenterXin He, Mingshu He, Zhijie Han 0001. 39-41 [doi]
- Identify the Maximal Cluster of Hosts Based on Data Fusion and Machine Learning Algorithms for Intrusion DetectionLena Ara, Xiao Luo. 42-46 [doi]
- Method of Maintaining Data Consistency in Microservice ArchitectureWeibei Fan, Zhijie Han 0001, Yujie Zhang, Ruchuan Wang 0001. 47-50 [doi]
- A Locality Live Migration Strategy Based on Docker ContainersZhijie Han 0001, Yujie Zhang, Ruchuan Wang 0001. 51-54 [doi]
- Web Load Balance Strategy with Energy Consumption Constrained Based on DNS CollaborationZhijie Han 0001, Yalu Wang, Hui Zhao. 55-58 [doi]
- A Coverage Algorithm in Circular Area Based on Polar Coordinates for WSNsHui Li, Xiaoyu Du, Zhijie Han 0001. 59-64 [doi]
- Research on Security Public Opinion Based on Declining Value of Big DataYujie Zhang, Weibei Fan, Zhijie Han 0001, Ruchuan Wang 0001. 65-68 [doi]
- Towards Security Monitoring for Cloud Analytic ApplicationsMarwa Elsayed, Mohammad Zulkernine. 69-78 [doi]
- A Summary of Data Analysis Based on Differential PrivacyBo Cai, Xuanxuan Wang, Peng Li 0011, Zhijie Han 0001. 79-82 [doi]
- A Heuristic Virtual Machine Scheduling Method for Load Balancing in Fog-Cloud ComputingXiaolong Xu 0001, Qingxiang Liu, Lianyong Qi, Yuan Yuan 0003, Wanchun Dou, Alex X. Liu. 83-88 [doi]
- Kernel Learning Method on Riemannian Manifold with Geodesic Distance PreservationGuo Niu, Meikang Qiu, Yanchun Gu. 89-94 [doi]
- A Trust Model for Secure and Reliable Cloud Service SystemsWenwen Gong, Chengming Zhang, Qing Cheng, Hang Zhang. 95-99 [doi]
- Big Data Security in Cloud EnvironmentYenumula B. Reddy. 100-106 [doi]
- Secure Sharing of Private Locations through Homomorphic Bloom FiltersYunhe Feng, Zheng Lu 0005, Qing Cao. 107-113 [doi]
- Privacy-Preserving Keyword Search Schemes over Encrypted Cloud Data: An Extensive AnalysisPrasanthi Sreekumari. 114-120 [doi]
- Asymmetric Secure Storage Scheme for Big Data on Multiple Cloud ProvidersParinya Suwansrikham, Kun She 0001. 121-125 [doi]
- Privacy-Preserving Access Control Using Dynamic Programming in Fog ComputingKeke Gai, Meikang Qiu, Meiqin Liu. 126-132 [doi]
- An Approach for End-to-End (E2E) Security of 5G ApplicationsK. Anitha Kumari, G. Sudha Sadasivam, S. Shymala Gowri, Sebastin Arockia Akash, E. G. Radhika. 133-138 [doi]
- A Survey on Automatic Emotion Recognition Using Audio Big Data and Deep Learning ArchitecturesHuijuan Zhao, Ning Ye, Ruchuan Wang 0001. 139-142 [doi]
- The Analysis and Proof of the Hamiltonian Property in GBC3 Network TopologyZhijie Han 0001, Xinjian Zhang, Jie Li. 143-146 [doi]
- The Hamiltonian of Data Center Network BCCCXin He, Qingfang Zhang, Zhijie Han 0001. 147-150 [doi]
- The Hamiltonian Property Analysis and Proof of BCube TopologyXiaoyu Du, Yinhe Huangfu, Zhijie Han 0001. 151-154 [doi]
- A Survey of Malicious Accounts Detection in Large-Scale Online Social NetworksYang Xin, Chensu Zhao, Hongliang Zhu, Mingcheng Gao. 155-158 [doi]
- Timing Prediction for Dynamic Application Migration on Multi-core Embedded SystemsZheng Li 0006, Hao Wu 0021, Shuibing He. 159-164 [doi]
- Real-Time Intelligent Air Quality Evaluation on a Resource-Constrained Embedded PlatformElena Alexandrova, Ali Ahmadinia. 165-170 [doi]
- A Resource Scheduling Algorithm Based on Maximum Discrete VM in Heterogeneity CloudJinhai Wang, Yanchuan Gu, Zhimin He, Meikang Qiu. 171-176 [doi]
- An Event Matching Algorithm of Attribute Value Domain Division for Content-Based Publish/Subscribe SystemGuifang Cao. 177-182 [doi]
- Speech Denoising Using Bayesian NMF with Online Base UpdateWeili Zhou, Zhen Zhu, Changle Zhong, Meikang Qiu. 183-187 [doi]
- Non-local Data Fetch Scheme Based on Delay Distribution for Hadoop Clusters in Public CloudRavindra Sandaruwan Ranaweera, Eiji Oki, Nattapong Kitsuwan. 188-193 [doi]
- Session Key Derivation for Low Power IoT DevicesJason M. McGinthy, Alan J. Michaels. 194-203 [doi]
- The Future Development of Traditional Chinese Medicine from the Perspective of Artificial Intelligence with Big DataJunnan Liu, Xing Zhai, Aiqing Han, Shuang Ding, Min Wang, Peng Yin. 204-209 [doi]
- Design and Implementation of the Distribution Power Network Model Construction TechnologyWanxing Sheng, Yiming Lu, Peipei Jin, Riliang Liu, Jian Du. 210-215 [doi]
- Critical Security Issues in Cloud Computing: A SurveyXiaotong Sun. 216-221 [doi]
- Survey of Load Balancing Method Based on DPDKMengxiao Jin, Canshuai Wang, Peng Li 0011, Zhijie Han 0001. 222-224 [doi]
- Multicast Routing Algorithm for ExCCC NetworksZhijie Han 0001, Yanhao Jing. 225-228 [doi]
- A Survey of the BCube Data Center Network TopologyZhijie Han 0001, Lin Yu. 229-231 [doi]
- Research on the Construction and Application of Burma-Vietnam's Political Event Data SetBiao Wang, Ding Wang 0004, Yingchu Xie. 232-237 [doi]
- Missing Information Management for Massive Sparse DataYuxin Chen, Shun Li, Jiahui Yao. 238-243 [doi]
- Distributed Dynamic Cuckoo Filter System Based on Redis ClusterBaozhou Luo, Wenjun Zhu, Peng Li 0011, Zhijie Han 0001. 244-247 [doi]
- A Survey on Computation Offloading for Mobile Edge Computing InformationXiaoyu Shan, Hanxiao Zhi, Peng Li 0011, Zhijie Han 0001. 248-251 [doi]
- Application of Remote Sensing Technology in Crop EstimationMengfan Wei, Baojun Qiao, Jianhui Zhao, Xianyu Zuo. 252-257 [doi]
- A Fast Security Evaluation of Support Vector Machine Against Evasion AttackZhimin He, Haozhen Situ, Yan Zhou, Jinhai Wang, Fei Zhang, Meikang Qiu. 258-263 [doi]
- Research on the Biological Basis of Treating Different Diseases with Same Method Based on Big Data Mining and Complex NetworkXing Zhai, Junnan Liu, Aiqing Han, Shuang Ding, Youliang Huang, Peng Yin, Min Wang. 264-269 [doi]
- A Summary of the BCCC Data Center Network TopologyZhijie Han 0001, Weiwei Zhang. 270-272 [doi]
- Which Devices are Connected around us?Chang-O Eun, Taehyoung Kim, Im Young Jung. 273-276 [doi]