Abstract is missing.
- Differentially Private Auctions for Private Data CrowdsourcingMingyu Shi, Yu Qiao, Xinbo Wang. 1-8 [doi]
- An Improved LFM Algorithm Based on Fitness Function and Community SimilarityLingxiao Zhang, Xuefeng Yan. 9-15 [doi]
- The Impact of Application Mapping on Non-Random and Random Network TopologiesYao Hu, Michihiro Koibuchi. 16-25 [doi]
- Understanding the Performance of In-Network Computing: A Case StudyFan Yang, Zhan Wang, Xiaoxiao Ma, Guojun Yuan, Xuejun An. 26-35 [doi]
- SwitchAgg: A Further Step Towards In-Network ComputingFan Yang, Zhan Wang, Xiaoxiao Ma, Guojun Yuan, Xuejun An. 36-45 [doi]
- ExpressPass++: Credit-Effecient Congestion Control for Data CentersZejia Zhou, Dezun Dong, Shan Huang, Zihao Wei. 46-52 [doi]
- Cloud Resource Provision of Competitive Content Providers: Models and AnalysisXiaodong Dong, Xiaobo Zhou, Laiping Zhao, Keqiu Li. 53-60 [doi]
- Self-Adaptive Address Mapping Mechanism for Access Pattern Awareness on DRAMChundian Li, Mingzhe Zhang, Zhiwei Xu, Xianhe Sun. 61-70 [doi]
- Dynamic Virtual Machine Number Selection for Processing-Capacity Constrained Workflow Scheduling in Cloud Computing EnvironmentsEmmanuel Bugingo, Wei Zheng 0002, Defu Zhang, Jinjun Chen. 71-78 [doi]
- Latency Optimization for Mobile Edge Computing with Dynamic Energy HarvestingYifei Sun, Jigang Wu, Long Chen 0006, Tonglai Liu, Mianyang Yao, Weijun Sun. 79-83 [doi]
- To Shift Tasks or To Shift Energy by ESDs? An Economical Scheduling for Cloud Data CenterChonglin Gu, Yi Chen, Wenye Li, Chunyan Liu. 84-91 [doi]
- Accurate and Automatic Detection of Oblique RFID-Enabled Objects in Mobile MannerChuanqing Zhang, Zijuan Liu, Keqiu Li. 92-99 [doi]
- An Efficient Secure Coded Edge Computing Scheme Using Orthogonal VectorWei Zhou, Jin Wang 0009, Lingzhi Li, Jianping Wang, Kejie Lu, Xiaobo Zhou. 100-107 [doi]
- Feature Reorganization Based Human Activity Recognition in IoT-Enabled ApplicationsMin Zhou, Ming Tao, Pinghua Chen. 108-115 [doi]
- TaskAlloc: Online Tasks Allocation for Offloading in Energy Harvesting Mobile Edge ComputingSongtao Guo, Qiucen Jiang, Yifan Dong, Quyuan Wang. 116-123 [doi]
- A Time-Driven Workflow Scheduling Strategy for Reasoning Tasks of Autonomous Driving in Edge EnvironmentKai Lin, Bing Lin, Xing Chen, Yu Lu, Zhigao Huang, Yuchang Mo. 124-131 [doi]
- Green Power Constrained Scheduling for Sequential Independent Tasks on Identical Parallel MachinesAyham Kassab, Jean-Marc Nicod, Laurent Philippe 0001, Veronika Rehn-Sonigo. 132-139 [doi]
- Prediction Method of Energy Consumption Based on Multiple Energy-Related Features in Data CenterYang Liang, Zhigang Hu. 140-146 [doi]
- Perishable Digital Goods Trading Mechanism for Blockchain- Based Vehicular NetworkRui Xi, Kang Liu, Shuo Liu, Wuhui Chen, Shenghui Li. 147-154 [doi]
- Low-Latency Cooperative Computation Offloading for Mobile Edge ComputingXinxiang Zhang, Jigang Wu, Wenjun Shi, Yalan Wu, Yuqing Miu. 155-159 [doi]
- Game-Based Attack Defense Model to Provide Security for Relay Selection in 5G Mobile NetworksWided Boubakri, Walid Abdallah, Noureddine Boudriga. 160-167 [doi]
- Asymmetry & Locality-Aware Cache Bypass and Flush for NVM-Based Unified Persistent MemoryYuanchao Xu, Yuanyuan Xu, Min Tang, LiangLiang Zhang, Yazhu Lan. 168-175 [doi]
- Task Offloading and Service Migration Strategies for User Equipments with Mobility Consideration in Mobile Edge ComputingYan Ding, Chubo Liu, Kenli Li, Zhuo Tang, Keqin Li 0001. 176-183 [doi]
- Tensor Layout Optimization of Convolution for Inference on Digital Signal ProcessorXiaoyang Zhang, Junmin Xiao, Xiaobin Zhang, Zhongzhe Hu, Hongrui Zhu, Zhongbo Tian, Guangming Tan. 184-193 [doi]
- Multi-Granularity Power Prediction for Data Center Operations via Long Short-Term Memory NetworkZiyu Shen, Xusheng Zhang, Bin Xia 0003, Zheng Liu 0001, Yun Li. 194-201 [doi]
- Mobility-Aware Resource Allocation in Multi-Access Edge Computing Using Deep Reinforcement LearningNajamul Din, Haopeng Chen, Daud Khan. 202-209 [doi]
- Register before Publishing with Smart Forwarding, Mitigate Content Poisoning Attack in ICNPengfei Yue, Ru Li, Bin Pang. 210-217 [doi]
- Intelligent Identification Method for Natural Disasters along Transmission Lines Based on Inter-Frame Difference and Regional Convolution Neural NetworkFangrong Zhou, Junbo Huang, Bing Sun, Gang Wen, Ye Tian. 218-222 [doi]
- A Message-Oriented Message Dissemination and Authentication Scheme for Vehicular Ad Hoc NetworksXincheng Li, Yali Liu, Xinchun Yin. 223-228 [doi]
- Random Label Based Security Authentication Mechanism for Large-Scale UAV SwarmLiangjun Liu, Hongyan Qian, Feng Hu. 229-235 [doi]
- Physical Layer Security of Digital Front End Based Internet of Things Communication in Power SystemsGaopeng Yan, Zian Wang, Yongan Qian, Yongpeng Wu. 236-241 [doi]
- Content Aware Task Scheduling Framework for Mobile Workflow Applications in Heterogeneous Mobile-Edge-Cloud Paradigms: CATSA FrameworkAbdullah Lakhan, Xiaoping Li. 242-249 [doi]
- Traffic Image Acquisition and Compression Technology in Vehicular Ad Hoc NetworkFu Pang, Xiangyu Bai. 250-255 [doi]
- Robot-Assisted Sensor Relocation for Confident Information Coverage in Wireless Sensor and Robot NetworksLihua Zhu, Minghua Wang, Kaiwu Jiang, Xianjun Deng, Lingzhi Yi, Xiangbai Liao, Chao Wang. 256-262 [doi]
- Formal Modeling and Verification of Scalable Process-Aware Distributed IoT ApplicationsRakesh Jain, Kais Klai, Samir Tata. 263-270 [doi]
- Identifying Interpretable Link Communities with User Interactions and Messages in Social NetworksWei Li, Meng Qin, Kai Lei. 271-278 [doi]
- A High Efficiency Network Using DAG and Consensus in BlockchainKaituo Cao, Fei Lin, Chaohui Qian, Keyu Li. 279-285 [doi]
- Measuring the Coexistence Competitiveness of ECN- or RTT-Based ExpressPass and TCP in Data CentersZihao Wei, Dezun Dong, Shan Huang, Liquan Xiao. 286-293 [doi]
- Data Optimization CNN Accelerator Design on FPGAWei Hu, Shuang Chen, Zhenhao Li, Tianyi Liu, Yining Li. 294-299 [doi]
- DATRA: A Power-Aware Dynamic Adaptive Threshold Routing Algorithm for Dragonfly Network-on-Chip TopologySongwen Pei, Jihong Yuan, Yanfei Ji, Tianma Shen. 300-307 [doi]
- SwiftFabric: Optimizing Fabric Private Data Transaction Flow TPSMingxuan Li, Dongdong Huo, Chao Liu, Han Wang, Yazhe Wang, Yu Wang, Ping Zou, Yandong Li, Zhen Xu. 308-315 [doi]
- Multi-Parameter Performance Modeling Based on Machine Learning with Basic Block FeaturesMeng Hao, Weizhe Zhang, Yiming Wang, Dong Li, Wen Xia, Hao Wang, Chen Lou. 316-323 [doi]
- The Vessel Tree Segmentation for Retinal Image via Matched Filter Combining Enhanced FrameHeng Dong, Lifang Wei. 324-330 [doi]
- Cost Efficient Offloading Strategy for DNN-Based Applications in Edge-Cloud EnvironmentYinhao Huang, Bing Lin, Yongjie Zheng, Junqin Hu, Yuchang Mo, Xing Chen. 331-337 [doi]
- Fine-Grained Flow Scheduling in WDM Optical Cut-Through SwitchesZhemin Zhang, Weining Dai, Siying Cheng, Lisha Chen, Congren Lin, Yuanyuan Yang 0001. 338-347 [doi]
- Smart DAG Task Scheduling with Efficient Pruning-Based MCTS MethodKui Liu, Zhiwei Wu, Qing Wu, Yuxia Cheng. 348-355 [doi]
- Run Data Run! Re-Distributing Data via Piggybacking for Geo-Distributed Data AnalyticsYefei Li, Yibo Jin 0001, Haiyang Chen, Wenchao Xi, Mingtao Ji, Sheng Zhang 0001, Zhuzhong Qian, Sanglu Lu. 356-363 [doi]
- Resource-Aware Cache Management for In-Memory Data Analytics FrameworksZhengyang Zhao, Haitao Zhang, Xin Geng, Huadong Ma. 364-371 [doi]
- Fast Finding Optimal Redundancy to Satisfy Reliability Requirement for Safety-Critical Parallel Applications on Heterogeneous Distributed Automotive SystemsLizan Wang, Jiang Zhu, Shujuan Tian, Tingrui Pei, Haolin Liu, Yinying Li. 372-379 [doi]
- Personality-Aware VNF Deployment for Profit MaximizationRuiming Yang, Kun Cao, Peijin Cong, Junlong Zhou, Mingsong Chen, Tongquan Wei. 380-387 [doi]
- SAED: A Self-Adaptive Encryption and Decryption ArchitectureYoubing Zhong, Zhou Zhou, Da Li, Meijun Guo, Qingyun Liu, Yang Liu, Li Guo. 388-397 [doi]
- Task Decomposition and Parallelization Planning for Automotive Power-Train ApplicationsZijun Han, Guangzhi Qu, Bo Liu, Feng Zhang. 398-404 [doi]
- Multi-Resource Fair Allocation for Composited Services in Edge Micro-CloudsTongyu Guo, Haitao Zhang, Han Huang, Jianli Guo, Chenze He. 405-412 [doi]
- A Ciphertext Policy Attribute Based Signcryption Scheme with Secure and Flexible Key EvolvingHanshu Hong, Xiaokang Zhou, Bing Hu, Zhixin Sun. 413-418 [doi]
- Fast, Dynamic and Robust Byzantine Fault Tolerance Protocol for Consortium BlockchainAnping Song, Jing Wang, Wenjing Yu, Yi Dai, Hongtao Zhu. 419-426 [doi]
- An Improved Quantum Genetic Algorithms and Application for DDoS Attack DetectionChangqing Gong, Tongyao Shi, Ming Mu, Liang Zhao, Abdullah Gani, Han Qi. 427-434 [doi]
- A Conflict Detection Method for IPv6 Time-Based Firewall PolicyXue Zhang, Yi Yin, Wei Liu, Zhizhen Peng, Guoqiang Zhang, Yun Wang, Yuichiro Tateiwa, Naohisa Takahashi. 435-442 [doi]
- Buffer Management for Identifying Crypto-Ransomware Attack in Environment with No Semantic InformationJoon-Young Paik, Joong-Hyun Choi, Rize Jin, Jianming Wang, Eun-Sun Cho. 443-450 [doi]
- Fault-Tolerant Cycle Embedding into 3-Ary n-Cubes with Structure FaultsWeibei Fan, Yang Wang, Jing Sun, Zhijie Han 0001, Peng Li, Ruchuan Wang. 451-457 [doi]
- Using Resource Use Data and System Logs for HPC System Error Propagation and Recovery DiagnosisEdward Chuah, Arshad Jhumka, Samantha Alt, Juan J. Villalobos, Joshua Fryman, William Barth, Manish Parashar. 458-467 [doi]
- Indoor Fingerprinting Positioning Based on the Least Anticipation LossAyong Ye, Jianfei Shao, Yiqing Diao, Lingyu Meng, Jiaomei Zhang, Li Xu. 468-475 [doi]
- A Variable Batch Size Strategy for Large Scale Distributed DNN TrainingZhongzhe Hu, Junmin Xiao, Zhongbo Tian, Xiaoyang Zhang, Hongrui Zhu, Chengji Yao, Ninghui Sun, Guangming Tan. 476-485 [doi]
- An Intelligent Parallel Hybrid Algorithm for Multi-Objective Multi-Period Portfolio Selection Models with Fuzzy Random ReturnsChen Li, Yulei Wu, Zhonghua Lu, Yonghong Hu. 486-492 [doi]
- A Versatile Acceleration Framework for Machine Learning AlgorithmsXianfeng Li, Yuanxun Wang. 493-500 [doi]
- Ratio and Partition are Revealed in Proposed Graph on Reduced Collatz DynamicsWei Ren. 501-510 [doi]
- swMD: Performance Optimizations for Molecular Dynamics Simulation on Sunway TaihulightKun Li, Shigang Li 0002, Bei Wang, Yifeng Chen, Yunquan Zhang. 511-518 [doi]
- CUDA Optimization Method for Activation Function in Convolution OperationLubin Feng, Dulei Zheng, Jianzhi Yu. 519-525 [doi]
- Parallel Computation of Division over GF(2^n) Covering Divide-by-Zero Based on Tile Assembly ModelYongnan Li, Limin Xiao. 526-533 [doi]
- Improvement of Quantum Genetic Algorithms and Application of DDoS Attack DetectionChangqing Gong, Tongyao Shi, Ming Mu, Liang Zhao, Abdullah Gani, Han Qi. 534-541 [doi]
- The Quantum Shor Algorithm Simulated on FPGAXin Zhang, Yaqian Zhao, RenGang Li, Xuelei Li, Zhenhua Guo 0003, Xiaomin Zhu, Gang Dong. 542-546 [doi]
- Gdarts: A GPU-Based Runtime System for Dataflow Task Programming on Dependency ApplicationsMingfan Li, Qingcai Jiang, Han Lin, Hong An. 547-552 [doi]
- Fast Schedule Tensor Computation on GPU with High Data Reuse and Device UtilizationYuxiang Zhang, Yu Zhang. 553-558 [doi]
- Single Image Super-Resolution Reconstruction of Enhanced Loss Function with Multi-GPU TrainingJianqiang Huang, Kail Li, Xiaoying Wang. 559-565 [doi]
- Evaluation of TSN Dynamic Configuration Model for Safety-Critical ApplicationsMaryam Pahlevan, Jonas Schmeck, Roman Obermaisser. 566-571 [doi]
- Scheduling Multiple Workflows with Time Constraints onto Cloud Computing ResourcesWei Zheng, Lin Shen, Emmanuel Bugingo, Dongzhan Zhang. 572-579 [doi]
- Workload-Aware Scheduling for Data Analytics upon Heterogeneous StorageZhuzhong Qian, Yuan Gao, Mingtao Ji, Hui Peng, Peng Chen, Yibo Jin 0001, Sanglu Lu. 580-587 [doi]
- List Scheduling Algorithm Based on Pre-Scheduling for Heterogeneous ComputingYi Zhao, Suzhi Cao, Lei Yan. 588-595 [doi]
- RPMSP: A Novel Replica Placement Method Inspired by Self-Similarity Propagation of PlantsXingjia Yuan, Yuelong Zhao. 596-601 [doi]
- CSF: An Efficient Parallel Deduplication Algorithm by Clustering Scattered FingerprintsHao Fan, Guangping Xu, Yi Zhang, Liming Yuan, Yanbing Xue. 602-607 [doi]
- Improving Security Data Access Control for Multi-Authority Cloud StorageJian Wang, Kehua Wu, Chunxiao Ye, Xiaofeng Xia, Fei Ouyang. 608-613 [doi]
- DDM: A Demand-Based Dynamic Mitigation for SMT Transient ChannelsYue Zhang, Ziyuan Zhu, Dan Meng. 614-621 [doi]
- Convolutional Neural Network with Character Embeddings for Malicious Web Request DetectionJiahong Wu, Zhenguo Yang, Lingni Guo, Yong Li, Wenyin Liu. 622-627 [doi]
- Fault Detection and Diagnosis in HVAC Systems Using Diagnostic Multi-Query GraphsNadra Tabassam, Sarah Amin, Roman Obermaisser. 628-633 [doi]
- A Privacy-Preserving and Robust Reputation System Based on BlockchainShuai Sun, Yuan Liu, Guibing Guo. 634-639 [doi]
- Model Checking for the Goal-Feedback-Result Pattern in ROSWei Wei, Xiaojuan Li, Yong Guan, Rui Wang 0024, Qian Lu, Jie Zhang. 640-645 [doi]
- MIC-THPCM: MIC-Based Heterogeneous Parallel Optimization for Axial Compressor RotorYu Lei, Xingjun Zhang, Li Han, Xiaoshe Dong, Jingbo Li. 646-653 [doi]
- i2Graph: An Incremental Iterative Computation Model for Large Scale Dynamic GraphsZhuo Tang, Mengsi He, Li Yang, Zhongming Fu. 654-659 [doi]
- Performance Comparison of GPU-Accelerated Fast Motion Estimation MethodPengcheng Chen, Bo Peng, Anxin Zou, Luwen Xu. 660-665 [doi]
- An Improved Programming Model for Thread-Level SpeculationBin Liu, Hao Yang, Yuancheng Li, Yuxiang Li, Dangdang Niu, Zhiming Lv. 666-672 [doi]
- Collaborative Filtering Algorithm Based on Rating Prediction and User CharacteristicsNa Song, Qin Lu, Zhihao Zhang. 673-678 [doi]
- Distributed Parallelizability Analysis and Optimization of Legacy Code in Cloud MigrationJunfeng Zhao, Ziyang Qin, Hongji Yang. 679-684 [doi]
- A Distributed Content Placement Strategy Based on Popularity for ICNYingqi Li, Ru Li, Meiju Yu. 685-689 [doi]
- Attitude Tracking Control for Rigid-Body Aircraft System Based on Neural Network with Bounded Disturbance EnvironmentQiping Wang, Ning Zhou, Riqing Chen, Yan Hu. 690-696 [doi]
- Parallel Stochastic Portfolio Search for Constraint SolvingKe Liu 0006, Sven Löffler, Petra Hofstedt. 697-704 [doi]
- An Optimization Method of WebP Images Lossy Compression Algorithm for FPGAsYaqian Zhao, Zhenhua Guo, Baoyu Fan, Kai Gao, Li Wang, Fang Cao. 705-711 [doi]
- Probabilistic Linguistic VIKOR Method Based on TODIM for Reliable Participant Selection Problem in Mobile CrowdsensingChao Huang 0010, Mingwei Lin, Riqing Chen. 712-717 [doi]
- LearnedCache: A Locality-Aware Collaborative Data Caching by Learning ModelWenlong Ma, Yuqing Zhu 0001, Sa Wang, Yungang Bao. 718-726 [doi]
- Towards a Latin-Square Search EngineWenxiu Fang, Rebecca J. Stones, Trent G. Marbach, Gang Wang, Xiaoguang Liu. 727-735 [doi]
- HEE-Sketch: an Efficient Sketch for Sliding-Window Frequency Estimation over Skewed Data StreamsShuhao Sun, Jingwei Zheng, Dagang Li. 736-743 [doi]
- Feature Selection Algorithm Based on Sparse Score and Correlation AnalysisShanliang Xue, Sijia Cheng, Mengying Li, Yong Yuan. 744-751 [doi]
- A Robust Adversarial Reinforcement Framework for Reading ComprehensionFengcheng Yuan, Zheng Lin, Yue Geng, Weiping Wang 0005, Gang Shi. 752-759 [doi]
- A Multi-Task Service Recommendation Model Considering Dynamic and Static QoSMingyu Li, Qin Lu, Mingge Zhang, Xinmei Liang. 760-767 [doi]
- DCIGAN: A Distributed Class-Incremental Learning Method Based on Generative Adversarial NetworksHongtao Guan, Yijie Wang, Xingkong Ma, Yongmou Li. 768-775 [doi]
- Ensuring Query Completeness in Outsourced Database Using Order-Preserving EncryptionNing Shen, Jyh-haw Yeh, Chien-Ming Chen, Yeh-Cheng Chen, Yunpeng Zhang. 776-783 [doi]
- Reducing Style Overfitting for Character Recognition via Parallel Neural Networks with Style to Content ConnectionWei Tang, Yiwen Jiang, Neng Gao, Ji Xiang, Jiahui Shen, Xiang Li, Yijun Su. 784-791 [doi]
- MMNR: A Network Representation Framework Based on Multi-View Motif FusionJingjing Xu, Aimin Yu, Lijun Cai, Dan Meng. 792-801 [doi]
- A Data Fusion and Data Cleaning System for Smart Grids Big DataZhining Lv, Wei Deng, Zhihan Zhang, Ningxuan Guo, Gangfeng Yan. 802-807 [doi]
- DiffusionGAN: Network Embedding for Information Diffusion Prediction with Generative Adversarial NetsWei Zhuo 0006, Yanan Zhao, Qianyi Zhan, Yuan Liu 0021. 808-816 [doi]
- Blockchain-Based Incentive Announcement System for Internet of VehiclesYang Yang 0026, Jialiang Chen, Xianghan Zheng, Ximeng Liu, Wenzhong Guo, Hairong Lv. 817-824 [doi]
- An Online Face Clustering Algorithm for Face Monitoring and Retrieval in Real-Time VideosYe Cai, HaiYang Gan. 825-830 [doi]
- The Research of Ternary Error-Correcting Output Codes Based on Genetic ProgrammingYifan Liang, Chang Liu, Hanrui Wang 0003, KunHong Liu. 831-837 [doi]
- LSOF: Novel Outlier Detection Approach Based on Local StructureRenmin Wang, Qingsheng Zhu. 838-846 [doi]
- Secure and Scalable Multi-Company Management in Enterprise Cloud Storage Broker SystemMuhammad Ihsan Haikal Sukmana, Marvin Petzolt, Kennedy Aondona Torkura, Hendrik Graupner, Feng Cheng 0002, Christoph Meinel. 847-856 [doi]
- A Vectorization Approach for Graph-Structured Data to Pattern RecognitionLin Sun, Haopeng Chen, Feng Huang, Zhiming Li. 857-864 [doi]
- ADCMO: An Anomaly Detection Approach Based on Local Outlier Factor for Continuously Monitored ObjectShubin Su, Limin Xiao, Li Ruan, Rongbin Xu, Shupan Li, Zhaokai Wang, Qigong He, Wei Li. 865-874 [doi]
- BF-Join: An Efficient Hash Join Algorithm for DRAM-NVM-Based Hybrid Memory SystemsLiu Yang, Peiquan Jin, Shouhong Wan. 875-882 [doi]
- Anomaly Subgraph Mining in Large-Scale Social NetworksShengnan Chen, Jianmin Qian, Haopeng Chen, Si Liu. 883-890 [doi]
- LSB-Based Visual Image Encryption Scheme in Cloud EnvironmentSifei Zheng, Xiaolong Liu 0001, Riqing Chen, Shyan-Ming Yuan, Chia-Chen Lin. 891-896 [doi]
- CSIndex: A Coprocessor-Based Classified Secondary Index Mechanism for Efficient HBase QueryZhe Zou, Linjiang Zheng, Dong Xia, Yiwei Chen, Weining Liu, Yixiong Chen. 897-904 [doi]
- Two Efficient Algorithms for Mining High Utility Sequential PatternsChuankai Zhang, Yiwen Zu, Junli Nie, Linzi Du. 905-911 [doi]
- IAP-Based Self-Learning Real-Time Application Layer DDoS Detection Method on Storm PlatformBin Zhang, Zihao Liu, Shuqin Dong. 912-919 [doi]
- Dynamic Network Embedding for Link PredictionYan Cao, Yihong Dong, Shaoqing Wu, Yu Xin, Jiangbo Qian. 920-927 [doi]
- UCWE: A User-Centric Approach for Web Quality of Experience MeasurementXiaohui Zheng, Yan Jin, Xiao Shi, Yonghao Song, Xiaofang Zhao. 928-935 [doi]
- A Double Non-Negative Matrix Factorization Model for Signed Network AnalysisWei Yu 0016, Rongjian Mu, Ying Sun, Xue Chen, Wenjun Wang, Huaming Wu. 936-943 [doi]
- Taxi Demand Prediction with LSTM-Based Combination ModelYongxuan Lai, Kaixin Zhang, Junqiang Lin, Fan Yang, Yi Fan. 944-950 [doi]
- OMOPredictor: An Online Multi-Step Operator Performance Prediction Framework in Distributed Streaming ProcessingWeimin Mu, Zongze Jin, Fan Liu, Weilin Zhu, Weiping Wang. 951-958 [doi]
- A Deep Temporal Collaborative Filtering Recommendation Framework via Joint Learning from Long and Short-Term EffectsQianqian Ji, Xiaoyu Shi, Mingsheng Shang. 959-966 [doi]
- A Unified Storage System for Whole-Time-Range Data Analytics over Unbounded DataYijie Shen, Guangzhong Yao, Sijie Guo, Jin Xiong, Dejun Jiang. 967-974 [doi]
- FLOWGAN: Unbalanced Network Encrypted Traffic Identification Method Based on GANZixuan Wang, Pan Wang, Xiaokang Zhou, Shuhang Li, Moxuan Zhang. 975-983 [doi]
- Price Prediction of Agricultural Products Based on Wavelet Analysis-LSTMQinglong Chen, Xiaoyu Lin, Yiwen Zhong, Ziyan Xie. 984-990 [doi]
- Using Temporal Conceptual Graphs and Neural Networks for Big Data-Based Attack Scenarios ReconstructionYacine Djemaiel, Boutheina A. Fessi, Noureddine Boudriga. 991-998 [doi]
- Dynamic Block Size Adjustment and Workload Balancing Strategy Based on CPU-GPU Heterogeneous PlatformJuan Fang, Kuan Zhou, Chen Tan, Hui Zhao 0013. 999-1006 [doi]
- OpenMP4.5-Enabled Large-Scale Heterogeneous Lattice Boltzmann Multiphase Flow SimulationsChuanfu Xu, Xi Wang, Dali Li, Yonggang Che, Zhenghua Wang. 1007-1016 [doi]
- An Asynchronous Algorithm for Optimizing the Communication PerformanceZhuo Tian, Yifeng Chen, Lei Zhang. 1017-1024 [doi]
- A High-Performance Self-Learning Antelopes Migration Algorithm (SAMA) for Global OptimizationNa Lin, Luwei Fu, Liang Zhao, Lu Liu, Geyong Min. 1025-1032 [doi]
- Accelerating Swap-Based Tabu Search for Solving Maximum Clique Problems on FPGAKenji Kanazawa. 1033-1040 [doi]
- Underwater Image Enhancement with a Total Generalized Variation Illumination PriorZhengjie Zhao, Yuxiang Dai, Peixian Zhuang. 1041-1048 [doi]
- A Learning Based Human Interaction Modeling Using Mobile SensingTarun Kulshrestha, Divya Saxena, Rajdeep Niyogi. 1049-1058 [doi]
- Utility-Aware Batch-Processing Algorithms for Dynamic Carpooling Based on Double AuctionJiale Huang, Jigang Wu, Long Chen 0006, Jiaquan Yan. 1059-1063 [doi]
- Multi-Sensor Information Fusion and Machine Learning for High Accuracy Rate of Mechanical Pedometer in Human Activity RecognitionMichael Adjeisah, Guohua Liu, Douglas Omwenga Nyabuga, Richard Nuetey Nortey. 1064-1070 [doi]
- Mobility-Aware and Data Caching-Based Task Scheduling Strategy in Mobile Edge ComputingLinyao Kang, Bing Tang, Li Zhang, Lujie Tang. 1071-1077 [doi]
- Sequence to Sequence Network for Learning Network RepresentationQi Liang, Mei Lin Zhou, Lu Ma, Dan Luo, Peng Zhang, Bin Wang. 1078-1084 [doi]
- Improve the Detection of Clustered Outliers via Outlier Score PropagationYongmou Li, Yijie Wang, Hongtao Guan. 1085-1091 [doi]
- Research on Dynamic Graph Layout by Parallel Computing and Markov ProcessShiying Sheng, Chunyuan Wu, Xiaoju Dong, Shengtao Chen. 1092-1098 [doi]
- SELWasm: A Code Protection Mechanism for WebAssemblyJian Sun, Dingyuan Cao, Ximing Liu, Ziyi Zhao, Wenwen Wang, Xiaoli Gong, Jin Zhang. 1099-1106 [doi]
- A Web Services Classification Method Based on GCNHongfan Ye, Buqing Cao, Junjie Chen, Jianxun Liu, Yiping Wen, Jinjun Chen. 1107-1114 [doi]
- Orchestrating Service Function Chains with Joint Resource Optimization in NFV NetworksZhe Wang, Zhiwei Zhao, Chang Shu, Geyong Min, Yunpeng Han, Yuhong Jiang. 1115-1122 [doi]
- CuckooFlow: Achieving Fast Packet Classification for Virtual OpenFlow Switching by Exploiting Network Traffic LocalityBing Xiong, Zhixiong Hu, Yao Luo, Jin Wang. 1123-1130 [doi]
- An Integrative Approach to Robust Hand Detection Using CPM-YOLOv3 and RGBD Camera in Real TimeMuhammad Raza, Vachiraporn Ketsoi, Haopeng Chen. 1131-1138 [doi]
- SecFT-SDN: Securing the Flow-Table for Software-Defined NetworkRuibang You, Bibo Tu, Zimu Yuan, Jie Cheng. 1139-1146 [doi]
- Hand Motion Based Human Computer Interaction Using 3D Convolutional Neural NetworkVachiraporn Ketsoi, Muhammad Raza, Haopeng Chen. 1147-1154 [doi]
- Parsing Indoor Scenes from RGB-D Image Using Superpixel and Region MergingKai He, Zejun Zhang, Xiong Pan, Changcai Yang, Sheng Yang, Xiaoliang Lu, Riqing Chen. 1155-1161 [doi]
- Power Combination Network for Image Classification on Small Samples with Data LossKexin Song, Fenglei Yang, Zhuochen Sun. 1162-1167 [doi]
- Image Fusion via Domain and Feature TransferYicheng Yang, Huabing Zhou, Wei Zhang, Changcai Yang, Zhenghong Yu. 1168-1172 [doi]
- Counting Attention Based on Classification Confidence for Visual Question AnsweringMingqin Chen, Yilei Wang, Shan Chen, Yingjie Wu. 1173-1179 [doi]
- Robust Feature Matching via Two Constraints InteractionYizhang Liu, Yanping Li, Zheling Xu, Xiaoliang Lu, Xin Liu, Luanyuan Dai, Xiong Pan, Changcai Yang. 1180-1186 [doi]
- Robust Feature Matching via Multi-Scale Grid StructureYanping Li, Qian Huang, Yizhang Liu, Yuan Huang, Xiaoqing Sun. 1187-1193 [doi]
- Identification and Prediction of Key Nucleotide Sites Using Machine Learning in Bioinformatics: A Brief OverviewJianhua Cai, Leyi Wei, Kun Zeng, Guobao Xiao. 1194-1200 [doi]
- Detecting Interest-Factor Influenced Abnormal Evaluation of Teaching via Multimodal Embedding and Priori Knowledge Based Neural NetworkYu Mao, Yifan Zhu, Sifan Zhang, Dexiu Zhang, Fuquan Zhang, Xiaozhong Fan. 1201-1209 [doi]
- An Application Model of GNN in Session RecommendationYong Feng, Fuhai Wang, Kai Zhang, Rongbing Wang, Hongyan Xu. 1210-1216 [doi]
- Clean-First Adaptive Buffer Replacement Algorithm for NAND Flash-Based Consumer ElectronicsQiongxia Huang, Riqing Chen, Mingwei Lin, Changcai Yang, Quan Chen, Xiaohan Li. 1217-1223 [doi]
- Research on Intelligent Portrait of Chinese Elderly Based on Big Data and Deep LearningHui Long, Dingju Zhu. 1224-1232 [doi]
- Long-Term Trend Prediction Algorithm Based on Neural Network for Short Time SeriesZexi Xin, Haiyang Zhang, Yue Ma. 1233-1238 [doi]
- Statistic Chinese New Word Recognition by Combing Supervised and Unsupervised LearningFei Wang. 1239-1243 [doi]
- Network Log Anomaly Detection Based on GRU and SVDDShirong Liu, Xiong Chen, Xingxiong Peng, Ruliang Xiao. 1244-1249 [doi]
- MD5 Encryption Algorithm Enhanced Competitive Swarm Optimizer for Feature SelectionYanhong Lin, Shiguo Huang, Minglin Hong, Shiting Chen, Xiaolin Li, Dakun Lin. 1250-1254 [doi]
- Parallelized Top-k Route Search with User's PreferencesSen Zhang, Youming Ge, Qun Jiang, Haihang Li, Yubao Liu. 1255-1261 [doi]
- Aspect Based Sentiment Analysis by Pre-Trained Language RepresentationsTianxin Liang, Xiaoping Yang, Xibo Zhou, Bingqian Wang. 1262-1265 [doi]
- Agricultural Product Traceability System Based on Blockchain TechnologyWeipeng Xie, Xianghan Zheng, Xiaoliang Lu, Xiaowei Lin, Xionghui Fan. 1266-1270 [doi]
- Copyright Protection Application Based on Blockchain TechnologyOuyang Yi, Xianghan Zheng, Xiaoliang Lu, Xiaowei Lin, Shengyin Zhang. 1271-1274 [doi]
- Accelerated Stochastic Variational InferencePingbo Hu, Yang Weng. 1275-1282 [doi]
- A Dynamic Ensemble Selection Strategy for Improving Error Correcting Output Codes AlgorithmJiaYu Zou, KunHong Liu, YeFan Huang. 1283-1290 [doi]
- Boosting Temporal Community Detection via Modeling Community Evolution CharacteristicsWei Yu 0016, Wenjun Wang 0002, Xue Chen, Huaming Wu, Minghu Tang, Yang Yu. 1291-1296 [doi]
- An Efficient Machine Reading Comprehension Method Based on Attention MechanismWenzhen Jin, Guocai Yang, Hong Zhu. 1297-1302 [doi]
- DKDR: An Approach of Knowledge Graph and Deep Reinforcement Learning for Disease DiagnosisYuanyuan Jia, Zhiren Tan, Junxing Zhang. 1303-1308 [doi]
- Speech Synthesis of Shanghai Dialect Based on DNN and LSTM-RNNYuren You, Yun Zhou, Hongwu Yang, Hui Wang, Lijia Chen. 1309-1315 [doi]
- A Fast Algorithm for Hiding High Utility Sequential PatternsChunkai Zhang, Yiwen Zu, Junli Nie, Linzi Du, Jingqi Du, Siyuan Hong, Wenping Wu. 1316-1322 [doi]
- Research on Web Service Selection Based on Improved Skyline AlgorithmXinmei Liang, Qin Lu, Mingyu Li. 1323-1328 [doi]
- Architectural Implications in Graph Processing of Accelerator with Gardenia Benchmark SuiteYang Zhang, Jie Shen, Zhen Xu 0004, Shikai Qiu, Xuhao Chen. 1329-1339 [doi]
- Prediction of Short-Imminent Heavy Rainfall Based on ECMWF ModelHuosheng Xie, Wei Xie, Lidong Wu, Qing Lin, Ming Liu, Yongjing Lin. 1340-1345 [doi]
- Research on Gold ETF Forecasting Based on LSTMZiyan Xie, Xiaoyu Lin, Yiwen Zhong, Qinglong Chen. 1346-1351 [doi]
- MDDRSPF: A Model Driven Distributed Real-Time Stream Processing FrameworkYijun Wen, Li Zhang, Cheng Wang. 1352-1358 [doi]
- Sequence Data Enhancement Method Based on Knowledge GraphHuosheng Xie, Wenda Chai, Shufeng Lin. 1359-1364 [doi]
- Underwater Image Enhancement Based on Dehazing and Color CorrectionHanyu Li, Peixian Zhuang, Wei Wang 0061, Jingjing Li. 1365-1370 [doi]
- Performance Optimization of High-Performance LINPACK Based on GPU-Centric Model on Heterogeneous SystemsJiawen Huang, Lu Lu. 1371-1377 [doi]
- An Efficient Parallel Successive Cancellation List Polar Decoder Based on GPUsXin Zhou, Rongchun Li, Shijie Li, Yuntao Liu, Yong Dou. 1378-1385 [doi]
- CuPhylo: A CUDA Based Application Program Interface and Library for Phylogenetic AnalysisMingming Ren, Xiaomin Huang, Yuyang Gao, Gang Wang, Xiaoguang Liu. 1386-1393 [doi]
- An SDN-Based QoS Guaranteed Mechanism for Geospatial FlowsFeilong Huang, Jianzhong Zhang 0003, Jingdong Xu, Yiran Shao, Lingjun Pu. 1394-1401 [doi]
- Research on Strategy Optimization of OpenFlow Switch Flow Table Based on "Bus Route" IdeaZhaohui Ma, Gansen Zhao, Chengchuang Lin, Haoyu Luo, Chunyun Deng, Shuangyin Li, Qinglan Wu, Zefeng Mo, Zanbo Zhang. 1402-1409 [doi]
- Timber Transportation Vehicle Detection Based on SSD-GIoUXiaojuan Zhang, Changying Wang, Li Cheng, Shuihan Jiang, Junting Qi. 1410-1415 [doi]
- A Summarization Generation Method for E-Courseware on the Internet PlatformGang Cui, Yan Wang, Hao Yu, Hong Liu, Shibin Liang, Xiaodong Guo. 1416-1420 [doi]
- An Optimizing Algorithm for Deadline Constrained Scheduling of Scientific Workflows in IaaS Clouds Using Spot InstancesShujin Cao, Kefeng Deng, Kaijun Ren, Xiaoyong Li, Tengfei Nie, Junqiang Song. 1421-1428 [doi]
- Small Deep Learning Models for Hand Gesture RecognitionAdam Ahmed Qaid Mohammed, Jiancheng Lv, Md. Sajjatul Islam. 1429-1435 [doi]
- FUsing Global and Semantic-Part Features with Multiple Granularities for Person Re-IdentificationLeyuan Liu, Yukang Zhang, Jingying Chen, Changxin Gao. 1436-1440 [doi]
- Enhanced Knowledge Distillation for Face RecognitionHao Ni, Jie Shen 0013, Chong Yuan. 1441-1444 [doi]
- An Improved Vehicle Detection Algorithm Based on YOLOV3Xiaoqing Sun, Qian Huang, Yanping Li, Yuan Huang. 1445-1450 [doi]
- TriBHMM: An Energy-Efficient and Latency-Aware Hybrid Main MemoryHong Zhang, Xiaojun Wang. 1451-1456 [doi]
- Low SNR Sonar Image Restoration Based on Mixed Probability Statistical Model in Wavelet DomainPing Xia, Qiang Ren, Dong-xia Shi, Bang Jun Lei, Yao-bin Zou, Guang-zhu Xv. 1457-1465 [doi]
- The Model of Potential Violation Discovery Based on KNN and Spatio-Temporal Trajectory of Commercial VehicleGang Xu, Xinyue Wang, Xiaodong Guo, Shibin Liang, Fengqi Wei. 1466-1471 [doi]
- A Novel Architecture of Pedestrian DetectionWenshu Li, Menghui Ruan, Xiaoying Guo, Hongyan Wang, Hancui Hancui, Yang Han. 1472-1477 [doi]
- A Video Semantic Segmentation Method Based on FCN and Data ArgumentationYuan Huang, Qian Huang, Qinglong Chen, Yanping Li, Xiaoqing Sun. 1478-1483 [doi]
- Medical Image Registration Based on Moving Manifold RegularizationWei Zhang, Huabing Zhou, Yicheng Yang, Changcai Yang, Zhenghong Yu. 1484-1489 [doi]
- Deep Convolutional Network for Citrus Leaf Diseases RecognitionQuan Chen, Xin Liu, Caixia Dong, Tong Tong, Changcai Yang, Riqing Chen, Tengyue Zou, Xiaolang Yang. 1490-1494 [doi]
- Convolutional Neural Network-Based Approach for Citrus Diseases RecognitionCaixia Dong, Zheling Xu, Luanyuan Dai, Weinan Liu, Quan Chen, Yizhang Liu, Changcai Yang, Tengyue Zou. 1495-1499 [doi]
- Weighted Feature Pyramid Networks for Object DetectionXiaohan Li, Taotao Lai, Shuaiyu Wang, Quan Chen, Changcai Yang, Riqing Chen, Jinxun Lin, Fu Zheng. 1500-1504 [doi]
- An Attention-Based Recommendation AlgorithmYan Chu 0001, Shuhao Qi, Yue Yang, Chenqi Shan, Lina Wang, Zhengkui Wang. 1505-1510 [doi]
- A Traceability Method Based on Blockchain and Internet of ThingsXueying Dong, Xianghan Zheng, Xiaoliang Lu, Xiaowei Lin. 1511-1518 [doi]
- Binary Competitive Swarm Optimizer Algorithm for Feature Selection in Identification of Chinese Fir FamilyShiguo Huang, Minglin Hong, Yanhong Lin, Xiaolin Li, Dakun Lin. 1519-1523 [doi]
- Adaptively Extracting Structured Data from Web PagesYingnan Guo, Jiajun Zhang, Xing Chen. 1524-1525 [doi]
- Class Mapping between Different Versions of Android Applications without Source CodeXiaona Chen, Chuanshumin Hu, Xing Chen. 1526-1527 [doi]
- Self-Adaptive Resource Management Framework for Software Services in CloudHaijiang Wang, Yun Ma 0003, Xianghan Zheng, Xing Chen, Longkun Guo. 1528-1529 [doi]
- User-Scene-Based Recommendation of App ServiceZhenghao Li, Jiarui Chen, Xing Chen. 1530-1531 [doi]
- Stacked Sparse Auto-Encoder for Deep ClusteringJinyu Cai, Shiping Wang, Wenzhong Guo. 1532-1538 [doi]
- Image Cosegmentation via Cosaliency Guided and Spline RegressionHaiping Xu, Geng Lin, Meiqing Wang. 1539-1544 [doi]
- Pixel-Level Dehazed Image Quality Assessment Based on Dark Channel Prior and DepthChuansheng Wang, Haoyi Fan, Hong Zhang, Zuoyong Li. 1545-1549 [doi]
- Saliency Detection Based on Weighted Saliency ProbabilityZuoyong Li, Taotao Lai, Xiaogen Zhou. 1550-1555 [doi]
- Metropolis-Hastings Random Walk with a Reduced Number of Self-LoopsToshiki Matsumura, Kazuyuki Shudo. 1556-1563 [doi]
- Predicting Future Alleviation of Mental Illness in Social Media: An Empathy-Based Social Network PerspectiveYibo Chai, Fengyang Wu, Rui Sun, Zhongliang Zhang, Jie Bao, Runxin Ma, Qizhou Peng, Danqin Wu, Yexing Wan, Keyu Li. 1564-1571 [doi]
- Methods for User Profiling across Social NetworksRishabh Kaushal, Vasundhara Ghose, Ponnurangam Kumaraguru. 1572-1579 [doi]
- Mining Health Discussions on Suomi24Moamen Ibrahim, Matti Eteläperä, Sercan Türkmen, Mina Maged, Mourad Oussalah 0002, Jouko Miettunen. 1580-1585 [doi]
- Facial-Based Personality Prediction Models for Estimating Individuals Private TraitsRaad Bin Tareaf, Seyed Ali Alhosseini, Christoph Meinel. 1586-1594 [doi]
- An Internet of Vehicles Intrusion Detection System Based on a Convolutional Neural NetworkRuxiang Peng, Weishi Li, Tao Yang, Huafeng Kong. 1595-1599 [doi]
- Modified Image Haze Removal Algorithm Based on Dark Channel PriorJunpeng Hu, Zuoyong Li, Xinwei Chen. 1600-1605 [doi]
- Automatic Text Summarization Based on Transformer and Switchable NormalizationTao Luo, Kun Guo, Hong Guo. 1606-1611 [doi]
- Financial Big Data Hot and Cold Separation Scheme Based on HBase and RedisKunhui Li, Kun Guo, Hong Guo. 1612-1617 [doi]
- Mixed Word Embedding Method Based on Knowledge Graph Augment for Text ClassificationHongzhong Wang, Kun Guo, Zhanghui Liu. 1618-1623 [doi]
- The Influence of Bandit-Based User Openness Feature on Recommendation Diversity and AccuracyYuxiang Lin, Shaozhen Ye. 1624-1628 [doi]
- A Novel Information Diffusion Model Inspired by Particle-Collision Dynamics for Online Social NetworksZhenche Xia, Zhenhua Tan, Yuling Zhang, Shaocheng Zhang, Yi Ma. 1629-1634 [doi]
- Exploration of Quantitative Factors Affecting the Popularity of Users in an Online CommunityMatti Eteläperä, Mourad Oussalah 0002. 1635-1640 [doi]
- Rumor Spreading with Cross Propagation in Multilayer Social NetworksQiyi Han, Musong Gu, Lei You, Fang Miao. 1641-1645 [doi]
- Finding Potential Empathizers in an Online Mental Health Community: A Deep Graph Embedding ApproachYibo Chai, Yahu Cong, Rui Sun, Fengyang Wu, Zhongliang Zhang, Yexing Wan, Lixin Cui. 1646-1651 [doi]
- Chinese Lexical Based Sentiment Analysis Framework in MeteorologyYinan Li, Fuquan Zhang, Yifan Zhu, Sifan Zhang, Yu Mao, Zhendong Niu. 1652-1658 [doi]