Abstract is missing.
- SPM: Modeling Spark Task Execution Time from the Sub-stage PerspectiveWei Li, Shengjie Hu, Di Wang, Tianba Chen, Yunchun Li. 3-10 [doi]
- Improving the Parallelism of CESM on GPUZehui Jin, Ming Dun, Xin You, Hailong Yang, Yunchun Li, Yingchun Lin, Zhongzhi Luan, Depei Qian. 11-18 [doi]
- Parallel Approach to Sliding Window SumsRoman Snytsar, Yatish Turakhia. 19-26 [doi]
- Rise the Momentum: A Method for Reducing the Training Error on Multiple GPUsYu Tang, Lujia Yin, Zhaoning Zhang, Dongsheng Li. 27-41 [doi]
- Pimiento: A Vertex-Centric Graph-Processing Framework on a Single MachineJianqiang Huang, Wei Qin, Xiaoying Wang, Wenguang Chen. 42-56 [doi]
- Parallel Software Testing Sequence Generation Method Target at Full Covering Tested BehaviorsTao Sun, Xiaoyun Wan, Wenjie Zhong, Xin Guo, Ting Zhang. 59-67 [doi]
- Accurate Network Flow Measurement with Deterministic Admission PolicyHongchao Du, Rui Wang, Zhaoyan Shen, Zhiping Jia. 68-81 [doi]
- A Comparison Study of VAE and GAN for Software Fault PredictionYuanyuan Sun, Lele Xu, Lili Guo, Ye Li, Yongming Wang. 82-96 [doi]
- A Framework for Designing Autonomous Parallel Data WarehousesSoumia Benkrid, Ladjel Bellatreche. 97-104 [doi]
- Stable Clustering Algorithm for Routing Establishment in Vehicular Ad-Hoc NetworksJieying Zhou, Pengfei He, Yinglin Liu, Weigang Wu. 107-115 [doi]
- Utility-Based Location Distribution Reverse Auction Incentive Mechanism for Mobile Crowd Sensing NetworkChunxiao Liu, Huilin Wang, Yanfeng Wang, Dawei Sun 0001. 116-127 [doi]
- Safeguarding Against Active Routing Attack via Online LearningMeng Meng, Ruijuan Zheng, Mingchuan Zhang, Junlong Zhu, Qingtao Wu. 128-134 [doi]
- Reliability Aware Cost Optimization for Memory Constrained Cloud WorkflowsE. Cao, Saira Musa, Jianning Zhang, Mingsong Chen, Tongquan Wei, Xin Fu, Meikang Qiu. 135-150 [doi]
- Null Model and Community Structure in Heterogeneous NetworksXuemeng Zhai, Wanlei Zhou, Gaolei Fei, Hangyu Hu, Youyang Qu, Guangmin Hu. 151-163 [doi]
- An Asynchronous Algorithm to Reduce the Number of Data ExchangesZhuo Tian, Yifeng Chen, Lei Zhang. 167-174 [doi]
- Two-Stage Clustering Hot Event Detection Model for Micro-blog on SparkYing Xia, Hanyu Huang. 175-183 [doi]
- Mobility-Aware Workflow Offloading and Scheduling Strategy for Mobile Edge ComputingJia Xu, Xuejun Li, Xiao Liu 0004, Chong Zhang, Lingmin Fan, Lina Gong, Juan Li. 184-199 [doi]
- HSPP: Load-Balanced and Low-Latency File Partition and Placement Strategy on Distributed Heterogeneous Storage with Erasure CodingJiazhao Sun, Yunchun Li, Hailong Yang. 200-214 [doi]
- Adaptive Clustering for Outlier Identification in High-Dimensional DataSrikanth Thudumu, Philip Branch, Jiong Jin, Jugdutt Jack Singh. 215-228 [doi]
- Penguin Search Aware Proactive Application PlacementAmira Rayane Benamer, Hana Teyeb, Nejib Ben Hadj-Alouane. 229-244 [doi]
- A Data Uploading Strategy in Vehicular Ad-hoc Networks Targeted on Dynamic Topology: Clustering and CooperationZhipeng Gao, Xinyue Zheng, Kaile Xiao, Qian Wang 0015, Zijia Mo. 245-260 [doi]
- Cloud Server Load Turning Point Prediction Based on Feature Enhanced Multi-task LSTMLi Ruan, Yu Bai, Limin Xiao. 261-266 [doi]
- Neuron Fault Tolerance Capability Based Computation Reuse in DNNsPengnian Qi, Jing Wang 0055, Xiaoyan Zhu, Weigong Zhang. 269-276 [doi]
- Reliability Enhancement of Neural Networks via Neuron-Level Vulnerability QuantizationKeyao Li, Jing Wang, Xin Fu, Xiufeng Sui, Weigong Zhang. 277-285 [doi]
- A Fault Detection Algorithm for Cloud Computing Using QPSO-Based Weighted One-Class Support Vector MachineXiahao Zhang, Yi Zhuang. 286-304 [doi]
- ParaMoC: A Parallel Model Checker for Pushdown SystemsHansheng Wei, Xin Ye, Jianqi Shi, Yanhong Huang. 305-312 [doi]
- FastDRC: Fast and Scalable Genome Compression Based on Distributed and Parallel ProcessingYimu Ji, Houzhi Fang, Haichang Yao, Jing He 0004, Shuai Chen, Kui Li, Shangdong Liu. 313-319 [doi]
- A Parallel Approach to Advantage Actor Critic in Deep Reinforcement LearningXing Zhu, Yunfei Du. 320-327 [doi]
- Blockchain-PUF-Based Secure Authentication Protocol for Internet of ThingsAkash Suresh Patil, Rafik Hamza, Hongyang Yan, Alzubair Hassan, Jin Li. 331-338 [doi]
- Selective Velocity Distributed Indexing for Continuously Moving Objects ModelImene Bareche, Ying Xia. 339-348 [doi]
- A New Bitcoin Address Association Method Using a Two-Level Learner ModelTengyu Liu, Jingguo Ge, Yulei Wu, Bowei Dai, Liangxiong Li, Zhongjiang Yao, Jifei Wen, Hongbin Shi. 349-364 [doi]
- Fog Computing Based Traffic and Car Parking Intelligent SystemWalaa Alajali, Shang Gao, Abdulrahman D. Alhusaynat. 365-380 [doi]
- Semi-supervised Deep Learning for Network Anomaly DetectionYuanyuan Sun, Lili Guo, Ye Li, Lele Xu, Yongming Wang. 383-390 [doi]
- A Vulnerability Assessment Method for Network System Based on Cooperative Game TheoryChenjian Duan, Zhen Wang, Hong Ding, Mengting Jiang, Yizhi Ren, Ting Wu. 391-398 [doi]
- Enhancing Model Performance for Fraud Detection by Feature Engineering and Compact Unified ExpressionsIkram Ul Haq, Iqbal Gondal, Peter Vamplew 0001. 399-409 [doi]
- Network Intrusion Detection Framework Based on Embedded Tree ModelJieying Zhou, Pengfei He, Rongfa Qiu, Weigang Wu. 410-417 [doi]
- Generative Adversarial Nets Enhanced Continual Data Release Using Differential PrivacyStella Ho, Youyang Qu, Longxiang Gao, Jianxin Li, Yong Xiang 0001. 418-426 [doi]
- Data Poisoning Attacks on Graph Convolutional Matrix CompletionQi Zhou, Yizhi Ren, Tianyu Xia, Lifeng Yuan, Linqiang Chen. 427-439 [doi]
- Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog ComputingFuyou Zhang, Saiyu Qi, Haoran Yuan, Meng Zhang. 440-455 [doi]
- Practical IDS on In-vehicle Network Against Diversified Attack ModelsJunchao Xiao, Hao Wu, Xiangxue Li, Yuan Linghu. 456-466 [doi]
- Ultragloves: Lowcost Finger-Level Interaction System for VR-Applications Based on Ultrasonic Movement TrackingSi Li, Yanchao Zhao, Chengyong Liu. 467-481 [doi]
- Adaptive Detection Method for Packet-In Message Injection Attack in SDNXinyu Zhan, Mingsong Chen, Shui Yu, Yue Zhang. 482-495 [doi]
- PMRS: A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud DataJingjing Bao, Hua Dai 0003, Maohu Yang, Xun Yi, Geng Yang, Liang Liu 0006. 496-511 [doi]
- Privacy-Preserving Fine-Grained Outsourcing PHR with Efficient Policy UpdatingZuobin Ying, Wenjie Jiang, Ximeng Liu, Maode Ma. 512-520 [doi]
- Lightweight Outsourced Privacy-Preserving Heart Failure Prediction Based on GRUZuobin Ying, Shuanglong Cao, Peng Zhou 0006, Shun Zhang, Ximeng Liu. 521-536 [doi]
- DAPS: A Decentralized Anonymous Payment Scheme with SupervisionZhaoyang Wang, Qingqi Pei, Xuefeng Liu, Lichuan Ma, Huizhong Li, Shui Yu. 537-550 [doi]
- An Approach of Secure Two-Way-Pegged Multi-sidechainJinnan Guo, Keke Gai, Liehuang Zhu, Zijian Zhang. 551-564 [doi]
- DCRRDT: A Method for Deployment and Control of RFID Sensors Under Digital Twin-Driven for Indoor SupervisionSiye Wang, Mengnan Cai, Qinxuan Wu, Yijia Jin, Xinling Shen, Yanfang Zhang. 567-576 [doi]
- A Binary Code Sequence Based Tracking Algorithm in Wireless Sensor NetworksYang Zhang, Qianqian Ren, Yu Pan, Jinbao Li. 577-583 [doi]
- Sampling Based Katz Centrality Estimation for Large-Scale Social NetworksMingkai Lin, Wenzhong Li, Cam-Tu Nguyen, Xiaoliang Wang 0001, Sanglu Lu. 584-598 [doi]
- Location Prediction for Social Media Users Based on Information FusionGaolei Fei, Yang Liu, Yong Cheng, Fucai Yu, Guangmin Hu. 599-612 [doi]
- Concurrent Software Fine-Coarse-Grained Automatic Modeling Method for Algorithm Error DetectionTao Sun, Jing Zhang, Wenjie Zhong. 615-623 [doi]
- EC-ARR: Using Active Reconstruction to Optimize SSD Read PerformanceShuo Li 0007, Mingzhu Deng, Fang Liu 0002, Zhiguang Chen, Nong Xiao. 624-641 [doi]
- Research of Benchmarking and Selection for TSDBFeng Ye, Zihao Liu, Songjie Zhu, Peng Zhang, Yong Chen 0009. 642-655 [doi]
- HDF5-Based I/O Optimization for Extragalactic HI Data Pipeline of FASTYiming Ji, Ce Yu, Jian Xiao, Shanjiang Tang, Hao Wang, Bo Zhang. 656-672 [doi]
- Understanding the Resource Demand Differences of Deep Neural Network TrainingJiangsu Du, Xin Zhu, Nan Hu, Yunfei Du. 673-681 [doi]
- Twitter Event Detection Under Spatio-Temporal ConstraintsGaolei Fei, Yong Cheng, Yang Liu, Zhuo Liu, Guangmin Hu. 682-694 [doi]