Abstract is missing.
- A C++ Library for Tensor DecompositionJiapeng Huang, Linghe Kong, Xiao-Yang Liu, Wenhao Qu, Guihai Chen. 1-2 [doi]
- ATuMm: Auto-tuning Memory Manager in Apache SparkDanlin Jia, Janki Bhimani, Son Nam Nguyen, Bo Sheng, Ningfang Mi. 1-8 [doi]
- Emulate Processing of Assorted Database Server Applications on Flash-Based Storage in Datacenter InfrastructuresJanki Bhimani, Rajinikanth Pandurangan, Ningfang Mi, Vijay Balakrishnan. 1-8 [doi]
- Energy and Delay Co-aware Computation Offloading with Deep Learning in Fog Computing NetworksXi Zhu, Siguang Chen, Songle Chen, Geng Yang. 1-6 [doi]
- Uncovering Flaming Events on News Media in Social MediaPraboda Rajapaksha, Reza Farahbakhsh, Noël Crespi, Bruno Defude. 1-8 [doi]
- On Effects of Mobility Management Signalling Based DoS Attacks Against LTE TerminalsChuan Yu, Shuhui Chen. 1-8 [doi]
- Integration of Temporal Contextual Information for Robust Energy DisaggregationPascal A. Schirmer, Iosif Mporas. 1-6 [doi]
- CAN't - An ISOBUS Privacy Proxy for Collaborative Smart FarmingRené Helmke, Jan Bauer, Alexander Bothe, Nils Aschenbruck. 1-3 [doi]
- ALEAP: Attention-based LSTM with Event Embedding for Attack ProjectionShuhan Fan, Songyun Wu, Zhiliang Wang, Zimu Li, Jiahai Yang, Heng Liu, Xinran Liu. 1-8 [doi]
- High-Precision Adaptive Slope Compensation Circuit for System-on-Chip Power ManagementHua Fan, Kelin Zhang, Yuanjun Cen, Kaung Oo Htet, Hadi Heidari, Weiping Cheng, Yang Li, Quanyuan Feng, Hongrui Che, Xuanhong Zeng, Haizhu Wang, Hongquan Wang, Dagang Li. 1-2 [doi]
- An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static AnalysisYaowen Zheng, Zhanwei Song, Yuyan Sun, Kai Cheng, Hongsong Zhu, Limin Sun. 1-8 [doi]
- An Almost-zero Latency Lightweight Mechanism for Caching Decision in ICN Content RouterQifeng Yang, Haojiang Deng, Lingfang Wang, Yiqiang Sheng. 1-8 [doi]
- Query optimization Approach with Shuffle Intermediate Cache Layer for Spark SQLMingyu Zhai, Aibo Song, Jingyi Qiu, Xuechun Ji, Qingxi Wu. 1-6 [doi]
- Intelligent IoT Sensing System Based on Compressive Sensing with Adaptively Learned DictionaryMartina Cilia, Keisuke Yamamoto. 1-8 [doi]
- reZig: Decompose a Collision via Reference Waveform in ZigBeeYifeng Cao, Zhe Wang 0015, Linghe Kong, Guihai Chen. 1-2 [doi]
- Accelerating QUIC's Connection Establishment on High-Latency Access NetworksErik Sy, Tobias Mueller, Moritz Moennich, Hannes Federrath. 1-8 [doi]
- Side-Channel Information Leakage of Traffic Data in Instant MessagingKe Li, Hong Li, Hongsong Zhu, Limin Sun, Hui-Wen. 1-8 [doi]
- A Stochastic based Physical Layer Security in Cognitive Radio Networks: Cognitive Relay to Fusion CenterOluyomi Simpson, Yichuang Sun. 1-7 [doi]
- LT Codes with Feedback: Accelerate the Distributed Matrix-Vector Multiplication with StragglersXiao Yang, Ming Jiang 0012, Chunming Zhao. 1-6 [doi]
- Automatic Data Quality Enhancement with Expert Knowledge for Mobile CrowdsensingJinghan Jiang, Kui Wu 0001, Huan Wang, Rong Zheng. 1-7 [doi]
- A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic DetectionJiang Xie, Shuhao Li, Yongzheng Zhang 0002, Xiaochun Yun, Jia Li. 1-8 [doi]
- QuickR: A Novel Routing Strategy for Wireless Mobile Information-centric NetworksAdita Kulkarni, Anand Seetharam. 1-8 [doi]
- A Deep Learning Approach to Dynamic Passive RTT Prediction Model for TCPDesta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi, Carsten Griwodz. 1-10 [doi]
- Placement optimization of IoT security solutions for edge computing based on graph theoryTanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars. 1-7 [doi]
- Developing the Parallelization Methods for Finding the All-Pairs Shortest Paths in Distributed Memory ArchitectureMohammed AlGhamdi, Ligang He, Yujue Zhou, Junyu Li. 1-8 [doi]
- Typification of Impersonated Accounts on InstagramKoosha Zarei, Reza Farahbakhsh, Noël Crespi. 1-6 [doi]
- VPGA: An SDN-based Location Privacy Zones Placement Scheme for Vehicular NetworksAbdelwahab Boualouache, Ridha Soua, Thomas Engel 0001. 1-8 [doi]
- Malicious Domain Detection via Domain Relationship and Graph ModelsWenxuan He, Gaopeng Gou, Cuicui Kang, Chang Liu, Zhen Li 0011, Gang Xiong. 1-8 [doi]
- Deanonymizing Tor in a Stealthy WayJianjun Lin, Jianbo Gao, Zhenhao Wu, Chengxiang Si, Bo Sun. 1-8 [doi]
- VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud HostsDongzheng Jia, Limin Liu, Shijie Jia, Jingqiang Lin. 1-9 [doi]
- HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoTYongliang Cheng, Yan Xu, Hong Zhong, Yi Liu. 1-7 [doi]
- Cost Efficient Internet Path Tracking Based on Routing Changes PredictionYujia Liu, Changqing An. 1-8 [doi]
- Data Heat Prediction in Storage Systems Using Behavior Specific Prediction ModelsLu Pang, Anis Alazzawe, Krishna Kant, Jeremy Swift. 1-8 [doi]
- Autonomous Detection of Synchronization Attacks in the Industrial Internet Of ThingsMeriem Smache, Alexis Olivereau, Thibault Franco-Rondisson, Assia Tria. 1-9 [doi]
- CLR: A Classification of DNS Tunnel Based on Logistic RegressionKemeng Wu, Yongzheng Zhang, Tao Yin. 1 [doi]
- Hiding and Trapping: A Deceptive Approach for Defending against Network Reconnaissance with Software-Defined NetworkJunchi Xing, Mingliang Yang, Haifeng Zhou, Chunming Wu, Wei Ruan. 1-8 [doi]
- Topology-aware Sparse Allreduce for Large-scale Deep LearningTruong Thao Nguyen, Mohamed Wahib, Ryousei Takano. 1-8 [doi]
- A New C&C Channel Detection Framework Using Heuristic Rule and Transfer LearningJianguo Jiang, Qilei Yin, Zhixin Shi, Meimei Li, Bin Lv. 1-9 [doi]
- Contract-connection: An efficient communication protocol for Distributed Ledger TechnologyYibin Xu, Yangyu Huang. 1-4 [doi]
- Rendering Scheduling Framework in Edge Computing: A Congestion Game-based ApproachBing Zhou, Hongqi Yang. 1-6 [doi]
- I Know What You Are Doing With Remote DesktopMinghao Jiang, Gaopeng Gou, Junzheng Shi, Gang Xiong. 1-7 [doi]
- Improving Latency and Jitter Performance in CDMA-Based Next-Generation Ethernet Passive Optical Networks for 5G ApplicationsRobert Raad, Elie Inaty, Martin Maier 0001. 1-8 [doi]
- Scheduling Dependent Tasks in Edge NetworksMohammed Maray, Arshad Jhumka, Adam P. Chester, Mohamed Younis. 1-4 [doi]
- Adaptive Differentially Private Data Stream Publishing in Spatio-temporal Monitoring of IoTTeng Wang, Xinyu Yang, Xuebin Ren, Jun Zhao, Kwok-Yan Lam. 1-8 [doi]
- Using DCT-based Approximate Communication to Improve MPI Performance in Parallel ClustersQianqian Fan, David J. Lilja, Sachin S. Sapatnekar. 1-10 [doi]
- Towards Industrial IoT-AR Systems using Deep Learning-Based Object Pose EstimationYongbin Sun, Sai Nithin Reddy Kantareddy, Joshua Siegel, Alexandre Armengol-Urpi, Xiaoyu Wu, Hongyu Wang, Sanjay E. Sarma. 1-8 [doi]
- Exploiting Social Network Characteristics for Efficient Routing in Ocean Vessel Ad Hoc NetworksQihang Bing, Ruobing Jiang, Feng Hong 0001. 1-8 [doi]
- Mining Cross-platform User Behaviors for Demographic Attribute InferenceHaoran Xu, Yuqing Sun, Xiangjun Li. 1-2 [doi]
- Jily: Cost-Aware AutoScaling of Heterogeneous GPU for DNN Inference in Public CloudZhaoxing Wang, Xuehai Tang, Qiuyang Liu, Jizhong Han. 1-8 [doi]
- A Comprehensive Study of Accelerating IPv6 DeploymentTianyu Cui, Chang Liu, Gaopeng Gou, Junzheng Shi, Gang Xiong. 1-8 [doi]
- Exploiting Temperature-Varied ECU Fingerprints for Source Identification in In-vehicle Network Intrusion DetectionMiaoqing Tian, Ruobing Jiang, Chaoqun Xing, Haipeng Qu, Qian Lu, Xiaoyun Zhou. 1-8 [doi]
- GPUs Cache Performance Estimation using Reuse Distance AnalysisYehia Arafa, Gopinath Chennupati, Atanu Barai, Abdel-Hameed A. Badawy, Nandakishore Santhi, Stephan J. Eidenbenz. 1-8 [doi]
- Quantitative Analysis of Mobile Application User Interface DesignZexun Jiang, Hao Yin, Yan Luo, Jiaying Gong, Yuannan Yang, Manshan Lin. 1-8 [doi]
- Cooperative Fair Bandwidth Scaling in Contention-based Wireless Networks using Time Token BucketChristopher Kramer, Kiran Mathews, Reinhard Gotzhein. 1-9 [doi]
- Reliability, timeliness and load reduction at the edge for cloud gamingAntonio Franco, Emma Fitzgerald, Björn Landfeldt, Ulf Kömer. 1-8 [doi]
- Sphinx: A Transport Protocol for High-Speed and Lossy Mobile NetworksJunfeng Li, Dan Li, Wenfei Wu, K. K. Ramakrishnan, Jinkun Geng, Fei Gui, Fanzhao Wang, Kai Zheng 0003. 1-8 [doi]
- IoT meets distributed AI - Deployment scenarios of Bonseyes AI applications on FIWARELucien Moor, Lukas Bitter, Miguel de Prado, Nuria Pazos, Nabil Ouerhani. 1-2 [doi]
- Identify OS from encrypted traffic with TCP/IP stack fingerprintingXinlei Fan, Gaopeng Gou, Cuicui Kang, Junzheng Shi, Gang Xiong. 1-7 [doi]
- A Blockchain-Based Authentication Method with One-Time PasswordMingli Zhang, Liming Wang, Jing Yang. 1-9 [doi]
- F2MC: Enhancing Data Storage Services with Fog-toMultiCloud Hybrid ComputingYinjin Fu, Xiaofeng Qiu, Jian Wang. 1-6 [doi]
- piFogBed: A Fog Computing Testbed Based on Raspberry PiQiaozhi Xu, Junxing Zhang. 1-8 [doi]
- Mimic: Fast Recovery from Data Corruption Errors in Stencil ComputationsAnis Alazzawe, Krishna Kant. 1-8 [doi]
- Efficient Attack Correlation and Identification of Attack Scenarios based on Network-MotifsSteffen Haas, Florian Wilkens, Mathias Fischer 0001. 1-11 [doi]
- A Byte-level CNN Method to Detect DNS TunnelsChang Liu, Liang Dai, Wenjing Cui, Tao Lin. 1-8 [doi]