Abstract is missing.
- Solution Space Adjustable CNF Obfuscation for Privacy-Preserving SAT SolvingYing Qin, Yan Ding, Yusong Tan, Qingbo Wu. 1-8 [doi]
- Joint Optimization of Stateful VNF Placement and Routing Scheduling in Software-Defined NetworksJiugen Shi, Ji Wang, Huawei Huang, Lulu Shen, Jin Zhang, Hao Xu. 9-14 [doi]
- A Low Cost Method for Determining the Entire Network Path Bandwidths of Indirect High-Performance Computer NetworksBaicheng Yan, Yi Zhou, Limin Xiao, Zhang Yang, Hongyu Wu, Bing Wei. 15-22 [doi]
- Efficient Parallel CTL Model-Checking for Pushdown SystemsXinyu Chen, Hansheng Wei, Xin Ye, Li Hao, Yanhong Huang, Jianqi Shi. 23-30 [doi]
- Acoustics Simulation on Sunway TaihuLight Based on Solving the Integral of Ffowcs Williams-Hawkings EquationWenhao Zhu, Wu Zhang, Bohan Ding, Kangle Xu. 31-38 [doi]
- An Effective Clustering Method for Finding Density PeaksRui-dong Qi, Jian-Tao Zhou, Xiaoyu Song. 39-46 [doi]
- WEAVER: An Energy Efficient, General-Purpose Acceleration Architecture for String Operations in Big Data ApplicationsWenming Li, Xiaochun Ye, Da Wang, Hao Zhang, Dongdong Wu, Zhimin Zhang, Dongrui Fan. 47-54 [doi]
- Tail-PASS: Resource-Based Cache Management for Tiled Graphics Rendering HardwareGermán Ceballos, Erik Hagersten, David Black-Schaffer. 55-63 [doi]
- A Truthful Profit-Oriented Mechanism for Mobile CrowdsensingYu Qiao, Yi Gu, Jun Wu, Lei Zhang, Chongjun Wang. 64-71 [doi]
- A False-Name-Proof Protocol for Multicast Routing AuctionsYu Qiao, Yue Song, Nan Wang, Jun Wu, Lei Zhang, Chongjun Wang. 72-79 [doi]
- SLA-Aware and Energy-Efficient VM Consolidation in Cloud Data Centers Using Host States Naive Bayesian Prediction ModelLianpeng Li, Jian Dong, Decheng Zuo, Jiaxi Liu. 80-87 [doi]
- Parallel Model Checking on Pushdown SystemsHansheng Wei, Xinyu Chen, Xin Ye, Neng Fu, Yanhong Huang, Jianqi Shi. 88-95 [doi]
- Effective Clustering Analysis Based on New Designed Clustering Validity Index and Revised K-Means Algorithm for Big DataErzhou Zhu, Peng Wen, Binbin Zhu, Feng Liu, Futian Wang, Xuejun Li. 96-102 [doi]
- Distributed Parallelizability Analysis of Legacy CodeJunfeng Zhao, Zhimei Zhao, Hongji Yang. 103-110 [doi]
- Efficient Online Stream Deduplication for Network Block StorageHongli Lu, Guangping Xu, Bo Tang, Shengli Li, Mian Zhou. 111-119 [doi]
- A Partition Matching Method for Optimal Attack Path AnalysisHui Xie, Kun Lv, Changzhen Hu. 120-126 [doi]
- Big Data Processing in Fog - Smart Parking Case StudySang Nguyen, Zoran Salcic, Xuyun Zhang. 127-134 [doi]
- Asynchronous Group-Based ADMM Algorithm under Efficient Communication StructureJianhui Zhou, Yongmei Lei. 135-140 [doi]
- Exploring Parallelism in MiBench with Loop and Procedure Level SpeculationDeqing Bu, Yaobin Wang, Ling Li, Zhiqin Liu, Wenxin Yu, Manasah Musariri. 141-146 [doi]
- Reducing Time and/or Memory Consumption of the SOG Construction in a Parallel ContextHiba Ouni, Kais Klai, Chiheb Ameur Abid, Belhassen Zouari. 147-154 [doi]
- FLAC Decoding Using GPU AccelerationHaolei Ye, Eric McCreath. 155-162 [doi]
- Loop Perforation in OpenACCAhmad Lashgar, Ehsan Atoofian, Amirali Baniasadi. 163-170 [doi]
- Accelerating Blockchain Transfer System Using FPGA-Based NICYuma Sakakibara, Yuta Tokusashi, Shin Morishima, Hiroki Matsutani. 171-178 [doi]
- An Energy and Robustness Adjustable Optimization Method of File Distribution ServicesDongchao Ma, Hongchao Li, Xingguo Sun, Li Ma, Chengan Zhao. 179-186 [doi]
- Subgroup Discovery Method Based on User Behavior AnalysisYue Yang Yang, Wangqiaohong Wang, Yangjing Yang, zhangjianpei zhang, Maxiaoyang Ma. 187-192 [doi]
- Neighboring and Non-Neighboring Features for Pedestrian DetectionYouze Zhu, Yanqin Yang, Wenchao Xu. 193-198 [doi]
- Fisher: An Efficient Container Load Prediction Model with Deep Neural Network in CloudsXuehai Tang, Qiuyang Liu, Yangchen Dong, Jizhong Han, Zhiyuan Zhang. 199-206 [doi]
- High-Performance and Energy-Efficient Fault Tolerance Scheduling Algorithm Based on Improved TMR for Heterogeneous SystemShigan Yu, Zhimin Tang, Xiaochun Ye, Zhimin Zhang, Dongrui Fan, Zhiying. 207-214 [doi]
- Site-Effect-Based Semi-Synchronous Label Propagation Algorithm for Community DetectionTianqi Liu, Xuefeng Yan, Cen Shenzhi. 215-222 [doi]
- Adaptive Centre-Weighted Oversampling for Class Imbalance in Software Defect PredictionQi Zha, Xuefeng Yan, Yong Zhou. 223-230 [doi]
- LogoPhish: A New Two-Dimensional Code Phishing Attack Detection MethodWenbin Yao, Yuanhao Ding, Xiaoyong Li 0003. 231-236 [doi]
- Fault-Tolerant Edge-Pancyclicity of Möbius Cube MQ_nXirong Xu, Huifeng Zhang, Pir Soomro. 237-243 [doi]
- Acceleration of Anomaly Detection in Blockchain Using In-GPU CacheShin Morishima, Hiroki Matsutani. 244-251 [doi]
- Gaia Scheduler: A Kubernetes-Based Scheduler FrameworkShengbo Song, Lelai Deng, Jun Gong, Hanmei Luo. 252-259 [doi]
- Design of a Compact and Reconfigurable Onboard Data Handling SystemQing Zhou, Qingjie Zhao, Li Zhou, Junshe An, Changbin Xue, Yuyin Tan, Jianing Rao. 260-264 [doi]
- URL2Vec: URL Modeling with Character Embeddings for Fast and Accurate Phishing Website DetectionHuaping Yuan, Zhenguo Yang, Xu Chen, Yukun Li, Wenyin Liu. 265-272 [doi]
- Personalized Commodity Recommendations of Retail Business Using User Feature Based Collaborative FilteringFeiran Wang, Yiping Wen, Tianhang Guo, Jinjun Chen, Buqing Cao. 273-278 [doi]
- A Transition State Cost Sensitive Virtual Machines ConsolidationNajet Hamdi, Walid Chainbi, Mohamed-Ali Mahjoub. 279-286 [doi]
- Efficient Coflow Scheduling of Multi-Stage Jobs with Isolation GuaranteeZifan Liu, Haipeng Dai, Bingchuan Tian, Wajid Rafique, Wanchun Dou. 287-294 [doi]
- Effective Cooperative UAV Searching Using Adaptive STGM Mobility Model in a FANETXianfeng Li, Jianfeng Li, Jie Chen. 295-301 [doi]
- A Data Related Behaviors Automatic Detection Method for Parallel Software TestingTao Sun, Wenjie Zhong. 302-307 [doi]
- A Blockchain-Based Offloading Approach in Fog Computing EnvironmentWenda Tang, Xuan Zhao, Wajid Rafique, Wanchun Dou. 308-315 [doi]
- Managing Heterogeneous Substrate Resources by Mapping and Visualization Based on Software-Defined NetworkAmir Javadpour, Guojun Wang, Xiaofei Xing. 316-321 [doi]
- On Real-Time Monitoring on Data Stream for Traffic Flow AnomaliesXinzhou Dong, Beihong Jin, Bo Tang, Hongyin Tang. 322-329 [doi]
- Asymmetric-ReRAM: A Low Latency and High Reliability Crossbar Resistive Memory ArchitectureYang Zhang, Dan Feng 0001, Zhipeng Tan, Jingning Liu, Wei Tong, Chengning Wang. 330-337 [doi]
- Hierarchical Attention Based Recurrent Neural Network Framework for Mobile MOBA Game Recommender SystemsQiongjie Yao, Xiaofei Liao, Hai Jin 0001. 338-345 [doi]
- Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud FrameworkYang Yang 0050, Xiaolin Chang, Zhen Han, Lin Li. 346-353 [doi]
- A Comprehensive Detection of Memory Corruption Vulnerabilities for C/C++ ProgramsYuHan Gao, Liwei Chen, Gang Shi, Fei Zhang. 354-360 [doi]
- Using Centralized I/O Scheduling Service (CISS) to Improve Cloud Object Storage PerformanceXiao Shi, Detian Hu, Hongwei Tang, Xiaohui Zheng, Xiaofang Zhao. 361-368 [doi]
- Adjusting Matching Algorithm to Adapt to Dynamic Subscriptions in Content-Based Publish/Subscribe SystemsWeichao Mao, Jian Cao, Guangtao Xue, Jiadi Yu, Yanmin Zhu, Minglu Li, Wenjuan Li, Shiyou Qian. 369-376 [doi]
- Improving Branch Prediction Accuracy on Multi-Core Architectures for Big DataQi Yu, Libo Huang, Hui Guo, Cheng Qian, Sheng Ma, Zhiying Wang. 377-382 [doi]
- AALB: Adaptive Algorithm of Load Balance for CAM Physics on Sunway TaihuLight SupercomputerHeng Guo, Zuoning Chen, Xin Liu. 383-390 [doi]
- An Online Sockpuppet Detection Method Based on Subgraph Similarity MatchingJingli Wang, Wei Zhou, Jiacheng Li, Zhou Yan, Jizhong Han, Songlin Hu. 391-398 [doi]
- Proportion Scheduler to Improve the Mismatched Locality in YARNJie Xu, Jingyu Wang, Qi Qi 0001, Jianxin Liao. 399-406 [doi]
- Memory Cache Attacks on Alluxio Impede High Performance ComputingYizhe Yang, Qingni Shen, Wu Xin, Wenjun Qian, Yahui Yang, Zhonghai Wu. 407-414 [doi]
- On Extending a Fixed Size, Persistent and Lock-Free Hash Map Design to Store Sorted KeysMiguel Areias, Ricardo Rocha 0001. 415-422 [doi]
- Wi-Fi Radar Placement for Coverage in Collapsed StructuresMuhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Shuhong Chen. 423-430 [doi]
- A Hierarchical CPN Model Automatically Generating Method Aiming at Multithreading Program Algorithm Error DetectionTao Sun, Yangyang Liu. 431-437 [doi]
- Heuristic Prefetching Caching Strategy to Enhance QoE in Edge ComputingMeng Sun, Haopeng Chen. 438-445 [doi]
- Parallel Software Testing Sequence Generation Method Based on State PruningTao Sun, Ting Zhang, Xin Guo. 446-453 [doi]
- A Topology-Based Approach to Pattern Recognition on Graph-Structured DataJun Chen, Haopeng Chen. 454-461 [doi]
- Pricing Cloud Resource Based on Multi-Agent Reinforcement Learning in the Competing EnvironmentBing Shi, Han Yuan, Rongjian Shi. 462-468 [doi]
- GaiaGPU: Sharing GPUs in Container CloudsJing Gu, Shengbo Song, Ying Li, Hanmei Luo. 469-476 [doi]
- A Revised DNA Computing Model of Inversion and Division over Finite Field GF (2^n)Yongnan Li. 477-484 [doi]
- Re-Running Large-Scale Parallel Programs Using Two NodesYayu Guo, Fang Lin, Yi Liu, Depei Qian. 485-492 [doi]
- A Co-Location-Based Approach for Business Site Selection Using OntologiesXuguang Bao, Lizhen Wang. 493-500 [doi]
- Working Set Size Estimation with Hugepages in VirtualizationJingyuan Hu, Xiaokuang Bai, Sai Sha, Yingwei Luo, Xiaolin Wang, Zhenlin Wang. 501-508 [doi]
- Web Service Recommendation via Combining Doc2Vec-Based Functionality Clustering and DeepFM-Based Score PredictionXiangping Zhang, Jianxun Liu, Buqing Cao, Qiaoxiang Xiao, Yiping Wen. 509-516 [doi]
- Maximizing Influence Propagation in Networks by User-Relational Iterative Ranking AlgorithmWenbin Yao, Lijuan Zhang, Xiaoyong Li 0003. 517-524 [doi]
- Performance Optimization of Large Files Writes to Ceph Based on Multiple Pipelines AlgorithmKe Zhan, Lili Xu, Zimu Yuan, Weijuan Zhang. 525-532 [doi]
- Fast Real-Time Scheduling for Ethernet-Based Train Control NetworksQinghan Yu, Tian Wang, Xibin Zhao, Hai Wang, Yue Gao, Chenyang Lu, Ming Gu 0001. 533-540 [doi]
- DEARS: A Deep Learning Based Elastic and Automatic Resource Scheduling Framework for Cloud ApplicationsMuhammad Hassan, Haopeng Chen, Yutong Liu. 541-548 [doi]
- Secure Spatial Network Queries on Cloud PlatformYiping Teng, Jinyan Liu, Xiaoting Liu, Guohui Ding, Chunlong Fan. 549-556 [doi]
- A Demand-Driven Pointer-Range Analysis Technique for Data Transmission OptimizationBo Zhao 0010, Xiaoyan Xu, Peng Liu, Yingying Li, Rongcai Zhao, Ramin Yahyapour. 557-564 [doi]
- MalFilter: A Lightweight Real-Time Malicious URL Filtering System in Large-Scale NetworksGuolin Tan, Peng Zhang, Qingyun Liu, Xinran Liu, Chunge Zhu, Li Guo. 565-571 [doi]
- Cymbalo: An Efficient Graph Processing Framework for Machine LearningXinhui Tian, Biwei Xie, Jianfeng Zhan. 572-579 [doi]
- Contract-Based Demand Response Model for High Performance Computing SystemsKishwar Ahmed, Jesse Bull, Jason Liu. 580-589 [doi]
- Towards Energy-Efficient Scheduling with Batch Processing for Instance-Intensive Cloud WorkflowsZhibin Wang, Yiping Wen, Jinjun Chen, Buqing Cao, Feiran Wang. 590-596 [doi]
- Fisher Discriminant Analysis Random Forest for Online Class Incremental LearningWang Xiong, Yijie Wang, Li Cheng. 597-604 [doi]
- Accelerating Lattice QCD on Sunway Many-Core ProcessorZengxiao Zhang, Zhongzhi Luan, Chongyang Xu, Ming Gong, Shun Xu. 605-612 [doi]
- Secure Virtual Machine Placement and Load Balancing Algorithms with High EfficiencyYuchen Wong, Qingni Shen. 613-620 [doi]
- PacketCache: Improving OS Stacks for Streaming with Identical ContentsXiaohui Luo, Danfeng Shan, Tong Zhang, Hao Zhang, Xunli Fan, Fengyuan Ren. 621-628 [doi]
- Energy-Efficient Strategy for Placement of Online Services on Dynamic Availability Resources in Volunteer CloudOmar Ben Maaouia, Hazem Fkaier, Christophe Cérin, Mohamed Jemni. 629-636 [doi]
- Optimizing Tiled Matrix-Matrix Product According to Cache Performance EnhancementEmna Hammami, Yosr Slama. 637-644 [doi]
- Deep Learning for Phishing DetectionWenbin Yao, Yuanhao Ding, Xiaoyong Li 0003. 645-650 [doi]
- Making Userspace TCP Stacks Transparent to ApplicationsXiaohui Luo, Dong Liu, Xing Wu, Xunli Fan, Fengyuan Ren. 651-658 [doi]
- Robot Patrol Path Planning Based on Combined Deep Reinforcement LearningWenqi Li, Dehua Chen, Jiajin Le. 659-666 [doi]
- DataFall: A Policy-Driven Algorithm for Decentralized Placement and Reorganization of Replicated DataFereydoun Farrahi Moghaddam, Wubin Li, Abdelouahed Gherbi. 667-675 [doi]
- An Extensible Search Engine Platform for Efficiency ResearchZhaohua Zhang, Naiyong Ao, Gang Wang, Xiaoguang Liu. 676-683 [doi]
- S2R: Service Trading Based Response Time Optimization in Mobile Edge ComputingPritish Mishra, Mayank Tiwary, Laurence T. Yang, Deepak Puthal. 684-691 [doi]
- CRSP: Network Congestion Control through Credit ReservationTianye Yang, Dezun Dong, Cunlu Li, Liquan Xiao. 692-699 [doi]
- Enhanced Self-Coding for Available MemcachedLiangfeng Cheng, Yuchong Hu, Wei Wei, Renzhi Xiao. 700-707 [doi]
- A Novel Approach for Identifying Lateral Movement Attacks Based on Network EmbeddingMingyi Chen, Yepeng Yao, Junrong Liu, Bo Jiang, Liya Su, Zhigang Lu. 708-715 [doi]
- A Parallel Algorithm for Instruction Dependence Graph Analysis Based on MultithreadingLei Wang, Yu Deng, Rui Gong, Wei Shi, Zhenyu Zhao, Qiang Dou. 716-721 [doi]
- Deadlock-Free Adaptive Routing Based on the Repetitive Turn Model for 3D Network-on-ChipYuan Cai, Dong Xiang, Xiang Ji. 722-728 [doi]
- To Compress, or Not to Compress: Characterizing Deep Learning Model Compression for Embedded InferenceQing Qin, Jie Ren, Jialong Yu, Hai Wang, Ling Gao, Jie Zheng 0005, Yansong Feng, Jianbin Fang, Zheng Wang. 729-736 [doi]
- Dynamic Data Histogram Publishing Based on Differential PrivacyRuichao Gao, Xuebin Ma. 737-743 [doi]
- A CTR Prediction Approach for Advertising Based on Embedding Model and Deep LearningShu Gao, Zilong Jiang, Yunhui Shi, Guanyu Wang, Liangchen Chen, Abdoulaye Sidibe. 744-750 [doi]
- Tearing Down the Face of Algorithmic Complexity Attacks for DPI EnginesLikun Liu, Jiantao Shi, Hongli Zhang 0001, Xiangzhan Yu. 751-758 [doi]
- Effective Phishing Website Detection Based on Improved BP Neural Network and Dual Feature EvaluationErzhou Zhu, Dong Liu, Chengcheng Ye, Feng Liu, Xuejun Li, Hui Sun. 759-765 [doi]
- Effective Clustering Analysis Based on New Designed CVI and Improved Clustering AlgorithmsErzhou Zhu, Binbin Zhu, Peng Wen, Feng Liu, Xuejun Li, Futian Wang. 766-772 [doi]
- An On-the-Fly Scheduling Strategy for Distributed Stream Processing PlatformWenan Wang, Chuang Zhang, Xiaojun Chen, Zhao Li, Hong Ding, Xin Wen. 773-780 [doi]
- An Effective Neural Network Phishing Detection Model Based on Optimal Feature SelectionErzhou Zhu, Chengcheng Ye, Dong Liu, Feng Liu, Futian Wang, Xuejun Li. 781-787 [doi]
- A Periodic Task-Oriented Scheduling Architecture in Cloud ComputingPeng Zhang, Yan Li, Hailun Lin, Jianwu Wang, Chuang Zhang. 788-794 [doi]
- Bayesian Networks-Based Data Publishing Method Using Smooth SensitivityMingzhu Li, Xuebin Ma. 795-800 [doi]
- Achieving Privacy-Preserving CP-ABE Access Control with Multi-CloudChunhua Li, Jinbiao He, Cheng Lei, Chan Guo, Ke Zhou 0001. 801-808 [doi]
- 2D Otsu Segmentation Algorithm Improvement Based on FOCPSOYingjie Zhang, Liang Zeng, Ying Zhang, Jie Meng. 809-815 [doi]
- Delay-Aware Resource Allocation for Data Analysis in Cloud-Edge SystemXin Li, Zhen Lian, Xiaolin Qin, Jemal H. Abawajyz. 816-823 [doi]
- An Efficient Checkpoint and Recovery Mechanism for Real-Time Embedded SystemsGuangqiang Luan, Yuebin Bai, Chunyang Wang, Junfang Zeng, Qingbin Chen. 824-831 [doi]
- Efficient VM Selection Heuristics for Dynamic VM Consolidation in Cloud DatacentersHammad Qaiser, Gao Shu. 832-839 [doi]
- Redis++: A High Performance In-Memory Database Based on Segmented Memory Management and Two-Level Hash IndexPeng Zhang, Lichao Xing, Ninggou Yang, Guolin Tan, Qingyun Liu, Chuang Zhang. 840-847 [doi]
- An Optimized Assisted Hybridcast Transmission Scheme in Mobile Wireless NetworksWeijia Jia, Hanwu Wang. 848-855 [doi]
- FATES: A Framework with Adaptive Track-Explore Strategy for Moving Targets Search by a FANETXianfeng Li, Jie Chen, Jianfeng Li. 856-861 [doi]
- Peapods: OS-Independent Memory Confidentiality for Cryptographic EnginesCongwu Li, Jingqiang Lin, Quanwei Cai, Bo Luo. 862-869 [doi]
- Utilizing Deep Architecture Networks of VAE in Software Fault PredictionYuanyuan Sun, Lele Xu, Ye Li, Lili Guo, Zhongsong Ma, Yongming Wang. 870-877 [doi]
- An Energy Efficient Smartphone Pedometer Based on an Auto-Correlation AnalysisRunze Yang, Baoqi Huang, Jian Song, Bing Jia, Wuyungerile Li. 878-885 [doi]
- Acinonyx: Dynamic Flow Scheduling for Virtual Machine Migration in SDN-Enabled CloudsAdel Nadjaran Toosi, Rajkumar Buyya. 886-894 [doi]
- A Method for Privacy-Preserving in IoT-SDN Integration EnvironmentMehdi Gheisari, Guojun Wang, Shuhong Chen, Ali Seyfollahi. 895-902 [doi]
- Web Service Recommendation Based on Word Embedding and Topic ModelTing Chen, Jianxun Liu, Buqing Cao, Zhenlian Peng, Yiping Wen, Run Li. 903-910 [doi]
- Red Blood Cells Segmentation: A Fully Convolutional Network ApproachArio Sadafi, Martin Radolko, Iosif Serafeimidis, Steffen Hadlak. 911-914 [doi]
- An OpenMP Based Parallelization Compiler for C ApplicationsHamid Arabnejad, João Bispo, Jorge G. Barbosa, João M. P. Cardoso. 915-923 [doi]
- iSTEP, an Integrated Self-Tuning Engine for Predictive Maintenance in Industry 4.0Daniele Apiletti, Claudia Barberis, Tania Cerquitelli, Alberto Macii, Enrico Macii, Massimo Poncino, Francesco Ventura. 924-931 [doi]
- A Cyber Risk Based Moving Target Defense Mechanism for Microservice ArchitecturesKennedy A. Torkura, Muhammad I. H. Sukmana, Anne V. D. M. Kayem. 932-939 [doi]
- Best-Fit Containerization as a Brokered ServiceSantonu Sarkar, Sreekrishnan Venkateswaran. 940-947 [doi]
- Predicting Execution Time of CUDA Kernel Using Static AnalysisGargi Alavani, Kajal Varma, Santonu Sarkar. 948-955 [doi]
- LCRC: A Dependency-Aware Cache Management Policy for SparkBo Wang, Jie Tang, Rui Zhang, Wei Ding, Deyu Qi. 956-963 [doi]
- MWPoW - Multi-Winner Proof of Work Consensus Protocol: An Immediate Block-Confirm Solution and an Incentive for Common Devices to Join BlockchainYibin Xu, Yangyu Huang. 964-971 [doi]
- A Neural Network Model for Cache and Memory Prediction of Neural NetworksSai Sha, Yingwei Luo, Zhenlin Wang, Xiaolin Wang. 972-978 [doi]
- On the Effectiveness of Communication-Centric Modelling of Complex Embedded SystemsHugo Meyer, Uraz Odyurt, Simon Polstra, Evangelos Paradas, Ignacio Gonzalez Alonso, Andy D. Pimentel. 979-986 [doi]
- Fog Computing with the Integration of Internet of Things: Architecture, Applications and Future DirectionsHeena Wadhwa, Rajni Aron. 987-994 [doi]
- Automatic Energy Efficient HPC Programming: A Case StudyIssam Raïs, Hélène Coullon, Laurent Lefèvre, Christian Pérez. 995-1002 [doi]
- Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal LatticesZechao Liu, Zoe L. Jiang, Xuan Wang, Yulin Wu, S. M. Yiu. 1003-1008 [doi]
- HLS-Based Performance and Resource Optimization of Cryptographic ModulesArthur Silitonga, Florian Schade, Guanru Jiang, Jürgen Becker. 1009-1016 [doi]
- Evaluation of the Use of Streaming Graph Processing Algorithms for Road Congestion DetectionZainab Abbas, Thorsteinn Thorri Sigurdsson, Ahmad Al-Shishtawy, Vladimir Vlassov. 1017-1025 [doi]
- Routing and Spectrum Allocation for Time Varying Traffic by Artificial Bee Colony Algorithm in Elastic Optical NetworksGang Xu, Xiaoxiao Li, Guojun Yuan, Zhan Wang, Guangming Tan, Xuejun An. 1026-1033 [doi]
- A Business Site Selection System Using Co-Locations and OntologiesXuguang Bao, Lizhen Wang. 1034-1035 [doi]
- A Blockchain Based Online Trading System for DDoS Mitigation ServicesXue Yang, Bingyang Liu, Fei Yang, Chuang Wang. 1036-1037 [doi]
- COMEC: Computation Offloading for Video-Based Heart Rate Detection APP in Mobile Edge ComputingXuejun Li, Ruimiao Ding, Xiao Liu, Wenqiang Yan, Jia Xu, Han Gao, Xi Zheng. 1038-1039 [doi]
- Refactoring OpenMP Code Based on MapReduce ModelJunfeng Zhao, Minjia Zhang. 1040-1041 [doi]
- Code Refactoring Based on MapReduce in Cloud MigrationJunfeng Zhao, Wenmeng Wang, Hongji Yang. 1042-1043 [doi]
- Network Optimizations on Prediction Server with Multiple PredictorsKaho Okuyama, Yuta Tokusashi, Takuma Iwata, Mineto Tsukada, Kazumasa Kishiki, Hiroki Matsutani. 1044-1045 [doi]
- Design of a Visual Front-End for Parallel Signal Processing on Underwater Search DroneBoguslaw Cyganek, Kazimierz Wiatr. 1046-1047 [doi]
- A Cloud Environment for Ubiquitous Medical Image ReconstructionEstefania Serrano, Javier García Blas, Jesús Carretero. 1048-1055 [doi]
- An Ontology Based Context-Aware Architecture for Smart Campus ApplicationsNicolas Verstaevel, Guillaume Garzone, Thierry Monteil 0001, Nawal Guermouche, Johan Barthelemy, Pascal Perez. 1056-1063 [doi]
- A Technology Assisted Framework for Medical Emergencies Involving Formal and Informal CaregiversMd. Akbar Hossain. 1064-1070 [doi]
- A Hybrid Indoor Localization System Running Ensemble Machine LearningDuy Nguyen Phuong, Thanh Pham Chi. 1071-1078 [doi]
- Low Dimensional Representation of Space Structure and Clustering of Categorical DataJianjun Cao, Qibin Zheng, Nianfeng Weng, Xingchun Diao. 1079-1086 [doi]
- On Scheduling of High-Throughput Scientific Workflows under Budget Constraints in Multi-Cloud EnvironmentsRuxia Li, Chase Q. Wu, Aiqin Hou, Yongqiang Wang, Tianyu Gao, Mingrui Xu. 1087-1094 [doi]
- Storage-Aware Task Scheduling for Performance Optimization of Big Data WorkflowsQianwen Ye, Chase Q. Wu, Huiyan Cao, Nageswara S. V. Rao, Aiqin Hou. 1095-1102 [doi]
- Human Activity Recognition Using Federated LearningKonstantin Sozinov, Vladimir Vlassov, Sarunas Girdzijauskas. 1103-1111 [doi]
- Radix: Enabling High-Throughput Georeferencing for Phenotype Monitoring over Voluminous Observational DataSangmi Pallickara, Maxwell Roselius. 1112-1119 [doi]
- Fog Computing and Its Role in Development of Smart ApplicationsMandeep Kaur Saroa, Rajni Aron. 1120-1127 [doi]
- Estimating Top-k Betweenness Centrality Nodes in Online Social NetworksKazuki Nakajima, Kenta Iwasaki, Toshiki Matsumura, Kazuyuki Shudo. 1128-1135 [doi]
- Comparing Graph Sampling Methods Based on the Number of QueriesKenta Iwasaki, Kazuyuki Shudo. 1136-1143 [doi]
- Dynamic CNN Models for Fashion Recommendation in InstagramShatha Jaradat, Nima Dokoohaki, Kim Hammar, Ummul Wara, Mihhail Matskin. 1144-1151 [doi]
- The Incorporation of Social Media in an Emergency Supply and Demand Framework in Disaster ResponseMeng Seng Wong, Hideki Nishimoto, Nishigaki Yasuyuki. 1152-1158 [doi]
- A Novel Graph Analytic Approach to Monitor Terrorist NetworksKaustav Basu, Chenyang Zhou, Arunabha Sen, Victoria Horan Goliber. 1159-1166 [doi]
- On the Usability of Big (Social) DataSunil Choenni, Niels Netten, Mortaza Shoae-Bargh, Rochelle Choenni. 1167-1174 [doi]
- Deriving the Political Affinity of Twitter Users from Their FollowersGiorgos Stamatelatos, Sotirios Gyftopoulos, George Drosatos, Pavlos S. Efraimidis. 1175-1182 [doi]
- Predicting Hacker Adoption on Darkweb Forums Using Sequential Rule MiningEricsson Marin, Mohammed Almukaynizi, Eric Nunes, Jana Shakarian, Paulo Shakarian. 1183-1190 [doi]
- Negotiating Consumerism and Feminism on InstagramMathilde Hogsnes, Kjeld Hansen. 1191-1192 [doi]