Abstract is missing.
- PPS: A Low-Latency and Low-Complexity Switching Architecture Based on Packet Prefetch and Arbitration PredictionYi Dai, Ke Wu, Mingche Lai, Qiong Li, Dezun Dong. 3-16 [doi]
- SWR: Using Windowed Reordering to Achieve Fast and Balanced Heuristic for Streaming Vertex-Cut Graph PartitioningJie Wang, Dagang Li. 17-32 [doi]
- Flexible Data Flow Architecture for Embedded Hardware AcceleratorsJens Froemmer, Nico Bannow, Axel Aue, Christoph Grimm 0001, Klaus Schneider. 33-47 [doi]
- HBL-Sketch: A New Three-Tier Sketch for Accurate Network MeasurementKeyan Zhao, Junxiao Wang, Heng Qi, Xin Xie, Xiaobo Zhou 0003, Keqiu Li. 48-59 [doi]
- Accelerating Large Integer Multiplication Using Intel AVX-512IFMATakuya Edamatsu, Daisuke Takahashi. 60-74 [doi]
- A Communication-Avoiding Algorithm for Molecular Dynamics SimulationBei Wang, Yifeng Chen, Chaofeng Hou. 75-88 [doi]
- Out-of-Core GPU-Accelerated Causal Structure LearningChristopher Schmidt, Johannes Huegle, Siegfried Horschig, Matthias Uflacker. 89-104 [doi]
- Accelerating Lattice Boltzmann Method by Fully Exposing Vectorizable LoopsBin Qu, Song Liu 0007, Hailong Huang, Jiajun Yuan, Qian Wang, Weiguo Wu. 107-121 [doi]
- A Solution for High Availability Memory AccessChunjing Gan, Bin Wang, Zhi-jie Wang, Huazhong Liu, Dingyu Yang, Jian Yin, Shiyou Qian, Song Guo 0001. 122-137 [doi]
- Verification of Microservices Using Metamorphic TestingGang Luo, Xi Zheng, Huai Liu, Rongbin Xu, Dinesh Nagumothu, Ranjith Janapareddi, Er Zhuang, Xiao Liu 0004. 138-152 [doi]
- A New Robust and Reversible Watermarking Technique Based on Erasure CodeHeyan Chai, Shuqiang Yang, Zoe L. Jiang, Xuan Wang 0002, Yiqun Chen, Hengyu Luo. 153-168 [doi]
- Exit-Less Hypercall: Asynchronous System Calls in Virtualized ProcessesGuoxi Li, Wenhai Lin, Wenzhi Chen. 169-182 [doi]
- Automatic Optimization of Python Skeletal Parallel ProgramsFrédéric Loulergue, Jolan Philippe. 183-197 [doi]
- Impromptu Rendezvous Based Multi-threaded Algorithm for Shortest Lagrangian Path Problem on Road NetworksKartik Vishwakarma, Venkata M. V. Gunturi. 201-222 [doi]
- FANG: Fast and Efficient Successor-State Generation for Heuristic Optimization on GPUsMarcel Köster, Julian Groß, Antonio Krüger. 223-241 [doi]
- DETER: Streaming Graph Partitioning via Combined Degree and Cluster InformationCong Hu, Jiang Zhong, Qi Li, Qing Li 0022. 242-255 [doi]
- Which Node Properties Identify the Propagation Source in Networks?Zhong Li, Chunhe Xia, Tianbo Wang, Xiaochen Liu. 256-270 [doi]
- t/t-Diagnosability of BCube NetworkYuhao Chen, Haiping Huang, Xiping Liu, Hua Dai 0003, Zhijie Han 0001. 271-282 [doi]
- Strark-H: A Strategy for Spatial Data Storage to Improve Query Efficiency Based on SparkWeitao Zou, Weipeng Jing, Guangsheng Chen, Yang Lu. 285-299 [doi]
- Multitask Assignment Algorithm Based on Decision Tree in Spatial Crowdsourcing EnvironmentDunhui Yu, Xiaoxiao Zhang, Xingsheng Zhang, Lingli Zhang. 300-314 [doi]
- TIMOM: A Novel Time Influence Multi-objective Optimization Cloud Data Storage Model for Business Process ManagementErzhou Zhu, Meng Li, Jia Xu, Xuejun Li, Feng Liu 0024, Futian Wang. 315-329 [doi]
- RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services ProvidersHong Zhong, JianZhong Zou, Jie Cui, Yan Xu. 330-344 [doi]
- A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud ComputingZhen Cheng, Jiale Zhang, Hongyan Qian, Mingrong Xiang, Di Wu. 345-358 [doi]
- Utility-Aware Edge Server Deployment in Mobile Edge ComputingJianjun Qiu, Xin Li, Xiaolin Qin, Haiyan Wang, Yongbo Cheng. 359-372 [doi]
- Predicting Hard Drive Failures for Cloud Storage SystemsDongshi Liu, Bo Wang, Peng Li 0026, Rebecca J. Stones, Trent G. Marbach, Gang Wang 0001, Xiaoguang Liu, Zhongwei Li. 373-388 [doi]
- Efficient Pattern Matching on CPU-GPU Heterogeneous SystemsVictoria Sanz, Adrián Pousa, Marcelo R. Naiouf, Armando De Giusti. 391-403 [doi]
- Improving Performance of Batch Point-to-Point Communications by Active Contention Reduction Through Congestion-Avoiding Message SchedulingJintao Peng, Zhang Yang, QingKai Liu. 404-418 [doi]
- An Open Identity Authentication Scheme Based on BlockchainYuxiang Chen, Guishan Dong, Yao Hao, Zhaolei Zhang, Haiyang Peng, Shui Yu. 421-438 [doi]
- RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium BlockchainZhiyu Xu, Tengyun Jiao, Lin Yang, Donghai Liu, Sheng Wen, Yang Xiang 0001. 439-453 [doi]
- Developing Patrol Strategies for the Cooperative Opportunistic CriminalsYanan Zhao, MingChu Li, Cheng Guo 0001. 454-467 [doi]
- Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password GuessingYuan Linghu, Xiangxue Li, Zhenlong Zhang. 468-483 [doi]
- A Fully Anonymous Authentication Scheme Based on Medical EnvironmentJing Lv, Ning Xi 0002, Xue Rao. 484-498 [doi]
- RaNetMalDozer: A Novel NN-Based Model for Android Malware Detection Over Task Kernel StructuresXinning Wang, Chong Li. 501-517 [doi]
- Moving Target Defense Against Injection AttacksHuan Zhang 0002, Kangfeng Zheng, Xiaodan Yan, Shoushan Luo, Bin Wu. 518-532 [doi]
- Tiger Tally: Cross-Domain Scheme for Different Authentication MechanismGuishan Dong, Yuxiang Chen, Yao Hao, Zhaolei Zhang, Peng Zhang, Shui Yu. 533-549 [doi]
- Simultaneously Advising via Differential Privacy in Cloud Servers EnvironmentSheng Shen, Tianqing Zhu, Dayong Ye, Mengmeng Yang, Tingting Liao, Wanlei Zhou. 550-563 [doi]
- Feature Generation: A Novel Intrusion Detection Model Based on Prototypical NetworkShizhao Wang, Chunhe Xia, Tianbo Wang. 564-577 [doi]
- Topic Reconstruction: A Novel Method Based on LDA Oriented to Intrusion DetectionShengwei Lei, Chunhe Xia, Tianbo Wang, Shizhao Wang. 578-594 [doi]
- PDGAN: A Novel Poisoning Defense Method in Federated Learning Using Generative Adversarial NetworkYing Zhao, Junjun Chen, Jiale Zhang, Di Wu, Jian Teng, Shui Yu. 595-609 [doi]
- A Geo-indistinguishable Location Privacy Preservation Scheme for Location-Based Services in Vehicular NetworksLi Luo, Zhenzhen Han, Chuan Xu, Guofeng Zhao. 610-623 [doi]
- A Behavior-Based Method for Distinguishing the Type of C&C ChannelJianguo Jiang, Qilei Yin, Zhixin Shi, Guokun Xu, Xiaoyu Kang. 624-636 [doi]
- Sparse Representation for Device-Free Human Detection and Localization with COTS RFIDWeiqing Huang, Shao-yi Zhu, Siye Wang, Jinxing Xie, Yanfang Zhang. 639-654 [doi]
- A Novel Approach to Cost-Efficient Scheduling of Multi-workflows in the Edge Computing Environment with the Proximity ConstraintYuyin Ma, Junyang Zhang, Shu Wang, Yunni Xia, Peng Chen 0007, Lei Wu, Wanbo Zheng. 655-668 [doi]
- Differential Privacy Preservation for Smart Meter SystemsJunfang Wu, Weizhong Qiang, Tianqing Zhu, Hai Jin 0001, Peng Xu 0003, Sheng Shen. 669-685 [doi]
- Secure Multi-receiver Communications: Models, Proofs, and ImplementationMaomao Fu, Xiaozhuo Gu, Wenhao Dai, Jingqiang Lin, Han Wang. 689-709 [doi]