Abstract is missing.
- Min-Max Movement of Sink-Based Mobile Sensors in the Plane for Barrier CoverageWenjie Zou, Longkun Guo, Peihuang Huang. 1-6 [doi]
- Base Station Positioning in Single-Tiered Wireless Sensor NetworksXinchen Li, Huan Cai, Gang Liu, Kezhong Lu. 7-12 [doi]
- An Energy-Saving Routing Algorithm for Opportunity Networks Based on Sleeping ModeChunyue Zhou, Hui Tian, Yaocong Dong, Baitong Zhong. 13-18 [doi]
- A Timely VANET Multi-hop Routing Method in IoTMaede Fotros, Mohammad Mansour Riahi Kashani, Javad Rezazadeh, John Ayoade. 19-24 [doi]
- Parallel Tracking and Reconstruction of States in Heuristic Optimization Systems on GPUsMarcel Köster, Julian Groß, Antonio Krüger. 25-30 [doi]
- FPGA-Based Parallel Multi-Core GZIP Compressor in HDFSHaoxin Luo, Ye Cai, Qiuming Luo, Rui Mao. 31-35 [doi]
- GPU Parallel Acceleration of Frequency Domain Algorithm for Calculating Radar Target EchoesNaixuan Zhao, Ge Zhang, Zijian Wang, Ling Kuang. 36-40 [doi]
- Accelerating Alignment for Short Reads Allowing Insertion of Gaps on Multi-Core ClusterYongjie Yang, Cheng Zhong, Danyang Chen. 41-45 [doi]
- Real-Time Stream Data Processing at ScaleM. Reza Hoseinyfarahabady, Ali Jannesari, Wei Bao, Zahir Tari, Albert Y. Zomaya. 46-51 [doi]
- I/O Scheduling for Limited-Size Burst-Buffers Deployed High Performance ComputingBenbo Zha, Hong Shen. 52-57 [doi]
- Task Merging and Scheduling for Parallel Deep Learning Applications in Mobile Edge ComputingXin Long, Jigang Wu, Yalan Wu, Long Chen 0006. 58-62 [doi]
- Coordinated and Hindsight Resources Allocation in Distributed ComputingVictor V. Toporkov, Dmitry Yemelyanov. 63-68 [doi]
- Plaintext Recovery Attacks and Their Mitigation in an Application-Specific SHE SchemeTikaram Sanyashi, Anasuya Acharya, Bernard Menezes. 69-74 [doi]
- Finite Approximate Consensus for Privacy in Distributed Sensor NetworksMatthew O'Connor, W. Bastiaan Kleijn. 75-77 [doi]
- Modeling Data Transmission in Mobile Ad-hoc Networks for Characterizing Black-Hole AttacksMnar Saeed Alnaghes, Hong Shen. 78-83 [doi]
- Privacy Preservation for Network Traffic ClassificationYue Lu, Hui Tian, Jingjing Yu. 84-89 [doi]
- D2D-Assisted Computation Offloading for Mobile Edge Computing Systems with Energy HarvestingMolin Li, Tong Chen, Jiaxin Zeng, Xiaobo Zhou, Keqiu Li, Heng Qi. 90-95 [doi]
- Ultra Reliable Communication : Availability Analysis in 5G Cellular NetworksYosra Benchaabene, Noureddine Boujnah, Faouzi Zarai. 96-102 [doi]
- Adaptive Clustering Strategy Based on Capacity WeightXingchun Liu, Zhipeng Feng, Jingjing Yu, Ying Tao, Shubo Ren. 103-108 [doi]
- Low-Energy Dynamic Clustering Scheme for Wireless Sensor NetworksWenqi Zhang, Jingjing Yu, Xingchun Liu, Ying Tao, Shubo Ren. 109-114 [doi]
- Implementing the Matrix Multiplication with DFC on Kunlun Small Scale ComputerZheng Du, Jing Zhang, Shihao Sha, Qiuming Luo. 115-120 [doi]
- Accelerating Conjugate Gradient using OmpSsSandra Catalán, Xavier Martorell, Jesús Labarta, Tetsuzo Usui, Leonel Antonio Toledo Díaz, Pedro Valero-Lara. 121-126 [doi]
- Tasking in Accelerators: Performance EvaluationLeonel Toledo, Antonio J. Peña, Sandra Catalán, Pedro Valero-Lara. 127-132 [doi]
- Adaptive Power Reallocation for Value-Oriented Schedulers in Power-Constrained HPCNirmal Kumbhare, Aniruddha Marathe, Ali Akoglu, Salim Hariri, Ghaleb Abdulla. 133-139 [doi]
- Research on Differential Privacy for Medical Health Big Data ProcessingYugu Hu, Lina Ge, Guifen Zhang, Donghong Qin. 140-145 [doi]
- Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical InvestigationFaheem Ullah, Muhammad Ali Babar. 146-153 [doi]
- A Hybrid Trust Management Model for Secure and Resource Efficient Vehicular Ad hoc NetworksAdnan Mahmood, Sarah Ali Siddiqui, Wei Emma Zhang, Quan Z. Sheng. 154-159 [doi]
- Scalable Anomaly Detection Method for Blockchain Transactions using GPUShin Morishima. 160-165 [doi]
- Fault-Tolerant Logical Hadamard Gates Implementation in Reed-Muller Quantum CodesDongxiao Quan, Li Niu, Lili Zhu, Changxing Pei. 166-172 [doi]
- Efficient Fault-Tolerant Syndrome Measurement of Quantum Error-Correcting Codes Based on "Flag"QiFei Wei, Dongxiao Quan, Jing Liu, Changxing Pei. 173-178 [doi]
- Faithful Multi-Hop Qubit Transmission Based on GHZ StatesNa Chen 0005, Bin Yan, Shuangshuang Shuai, Changxing Pei. 179-183 [doi]
- Peering Into the Anneal Process of a Quantum AnnealerElijah Pelofske, Georg Hahn, Hristo Djidjev. 184-189 [doi]
- A Virtual Machine Placement Algorithm Combining NSGA-II and Bin-Packing HeuristicWenting Wei, Kun Wang 0001, Kexin Wang, Shengjun Guo, Huaxi Gu. 190-195 [doi]
- New Parallel Algorithms for All Pairwise Computation on Large HPC ClustersTao Tang, Hao Wu, Wei Bao, Pengyi Yang, Dong Yuan, Bing Bing Zhou. 196-201 [doi]
- A Holistic Stream Partitioning Algorithm for Distributed Stream Processing SystemsKejian Li, Gang Liu, Minhua Lu. 202-207 [doi]
- Acceleration of Genetic Algorithm on GPU CUDA PlatformDylan Matthew Janssen, Alan Wee-Chung Liew. 208-213 [doi]
- An Economical and High-Quality Encryption Scheme for Cloud Servers with GPUsXiongwei Fei, Kenli Li, Shui Yu, Keqin Li. 214-219 [doi]
- DOCKERANALYZER : Towards Fine Grained Resource Elasticity for Microservices-Based Applications Deployed with DockerMohamed Hedi Fourati, Soumaya Marzouk, Khalil Drira, Mohamed Jmaiel. 220-225 [doi]
- CAAVI-RICS Model for Analyzing the Security of Fog Computing Systems: AuthenticationSasa Pesic, Milos Radovanovic, Mirjana Ivanovic, Costin Badica, Milenko Tosic, Ognjen Ikovic, Dragan Boskovic. 226-231 [doi]
- Protecting Sensitive Location Visits Against Inference Attacks in Trajectory PublishingXiangyu Liu, Manish Singh, Xiufeng Xia. 232-239 [doi]
- Outlier Removal for the Reliable Condition Monitoring of Telecommunication ServicesGünter Fahrnberger. 240-246 [doi]
- Machine Learning Based Performance Analysis and Prediction of Jobs on a HPC ClusterZhengxiong Hou, Shuxin Zhao, Chao Yin, Yunlan Wang, Jianhua Gu, Xingshe Zhou. 247-252 [doi]
- Research on Case Preprocessing Based on Bert -CNN-LSTM ModelChuyue Zhang, Manchun Cai, Xiaofan Zhao. 253-258 [doi]
- Hybrid Model Featuring CNN and LSTM Architecture for Human Activity Recognition on Smartphone Sensor DataSamundra Deep, Xi Zheng. 259-264 [doi]
- The Library for Hadoop Deflate Compression Based on FPGA Accelerator with Load BalanceHaixin Du, Jiankui Zhang, Shihao Sha, Cai Ye, Qiuming Luo. 265-270 [doi]
- Introducing PulseAT: A Tool for Analyzing System Utilization in Distributed SystemsUwe Jahn, Vladimir Poliakov, Meghadoot Gardi, Peter Schulz, Carsten Wolff. 271-276 [doi]
- Development of Filled Circle Drawing in High-Level Synthesis Oriented Game Programming LibraryYuki Yamagata, Akira Yamawaki. 277-281 [doi]
- An OpenCL-Like Offload Programming Framework for SX-Aurora TSUBASAHiroyuki Takizawa, Shinji Shiotsuki, Naoki Ebata, Ryusuke Egawa. 282-288 [doi]
- Concurrent Failure Recovery for Product Matrix Regenerating CodeJingyao Zhang. 289-294 [doi]
- Scalability of Parareal for Large Power Grid SimulationsFrancis C. Joseph, Gurunath Gurrala. 295-300 [doi]
- Improving Recommender Systems Accuracy in Social Networks Using PopularityKasra Majbouri Yazdi, Adel Majbouri Yazdi, Saeid Khodayi, Jingyu Hou, Wanlei Zhou, Saeid Saedy, Mehrdad Rostami. 301-307 [doi]
- A Distributed Genetic Algorithm with Adaptive Diversity Maintenance for Ordered ProblemsRyoma Ohira, Md. Saiful Islam 0003. 308-313 [doi]
- A Model Driven-Based Approach for Managing Unanticipated Runtime Adaptation of RTE SystemsNissaf Fredj, Yessine Hadj Kacem, Mohamed Abid. 314-319 [doi]
- SMT Solvers as Efficient Tools for Automatic Time Properties Verification of Security ProtocolsAgnieszka M. Zbrzezny, Olga Siedlecka-Lamch, Sabina Szymoniak, Miroslaw Kurkowski. 320-327 [doi]
- A Scalable Parallel Computing Framework for Large-Scale Astrophysical Fluid Dynamics Numerical SimulationIgor M. Kulikov, Igor G. Chernykh, Andrei Tchernykh. 328-333 [doi]
- TrustZone for Supervised Asymmetric Multiprocessing SystemsMahdi Amiri-Kordestani, David Eyers, Zhiyi Huang, Morteza Biglari-Abhari. 334-339 [doi]
- RNC: Reliable Network Property Classifier Based on Graph EmbeddingHao Liao, Qi-xin Liu, Alexandre Vidmer, Ming Yang Zhou, Rui Mao. 340-345 [doi]
- Optimising Deep Learning Split Deployment for IoT Edge NetworksCailen Robertson, Jia Li, Ryoma J. Ohira, Quoc Viet Hung Nguyen, Jun Jo. 346-351 [doi]
- Event Causality Detection in Tweets by Context Word Extension and Neural NetworksHumayun Kayesh, Md. Saiful Islam 0003, Junhu Wang. 352-357 [doi]
- Imbalanced Data Classification Using Improved Clustering Algorithm and Under-Sampling MethodLu Cao, Hong Shen. 358-363 [doi]
- Right Ventricle Segmentation of Cine MRI Using Residual U-net Convolutinal NetworksZexiong Liu, Yuhong Feng, Xuan Yang. 364-368 [doi]
- Color Distortion Removal for Heart Rate Monitoring in Fitness ScenarioQuoc-Viet Tran, Shun-Feng Su, Minh Quang Tran. 369-374 [doi]
- Automated Segmentation of Substantia Nigra and Red Nucleus in Quantitative Susceptibility Mapping ImagesDibash Basukala, Ramakrishnan Mukundan, Tracy R. Melzer, Anthony Lim. 375-380 [doi]
- Modeling Power Consumption of The Code Execution Using Performance Counters StatisticsGuang-wei, Depei Qian, Hailong Yang, Zhongzhi Luan. 381-385 [doi]
- A CloudSim-Extension for Simulating Distributed Functions-as-a-ServiceHongseok Jeon, Chunglae Cho, SeungJae Shin, Seunghyun Yoon 0003. 386-391 [doi]
- New List Skeletons for the Python Skeleton LibraryFrédéric Loulergue, Jolan Philippe. 392-397 [doi]
- Reachability in Multithreaded Programs Is Polynomial in the Number of ThreadsAlexander Malkis. 398-403 [doi]
- Disk Throughput Controller for Cloud Data-CentersM. Reza Hoseinyfarahabady, Zahir Tari, Albert Y. Zomaya. 404-409 [doi]
- Low Computational Data Fusion Approach Using INS and UWB for UAV Navigation Tasks in GPS-Denied EnvironmentsXiaoying Kong, Gengfa Fang, Li Liu, Tich Phuoc Tran. 410-414 [doi]
- NFV Optimization Algorithm for Shortest Path and Service Function AssignmentArvind Kalyan. 415-420 [doi]
- An Improved MCB Localization Algorithm Based on Received Signal Strength IndicatorQiao Yan, Chunyue Zhou, Baitong Zhong, Hui Tian. 421-426 [doi]
- Succinct Representations in Collaborative Filtering: A Case Study using Wavelet Tree on 1, 000 CoresXiangjun Peng, Qingfeng Wang, Xu Sun 0002, Chunye Gong, Yaohua Wang. 427-432 [doi]
- Comparison of Binary Rain Prediction on HIMAWARI using MPI and CUDAAisya Nafiisyanti. 433-438 [doi]
- Attention-Based Supply-Demand Prediction for Autonomous VehiclesZikai Zhang, Hairong Dong, Yidong Li, Yizhe You, Fengping Zhao. 439-444 [doi]
- In the Quest of Trade-off between Job Parallelism and Throughput in Hadoop: A Stochastic Learning Approach for Parameter Tuning on the FlyRamesh Pokhrel, Ashish Rauniyar, Anis Yazidi. 445-450 [doi]
- Fengyun-4A Meteorological Satellite Data Service SystemYonggang Qi, Jiashen Zhang, Zhe Xu, Di Xian. 451-454 [doi]
- Logistics Scheduling for UAV Based on Tabu Search AlgorithmKe Zhao, Shoubao Su, Haiping Huang, Jie Zhu 0002. 455-460 [doi]
- Blockchain Consensus Algorithm Design Based on Consistent Hash AlgorithmJian Yang, Hong Shen. 461-466 [doi]
- A Map-Reduce-Based Relation Inference Algorithm for Autonomous SystemTing Lv, Donghong Qin, Lina Ge, Song Wen. 467-470 [doi]
- A Parallel Uncertain Frequent Itemset Mining Algorithm with SparkJiaman Ding, Haibin Li, Yuanyuan Wang, Lianyin Jia, Jinguo You, Yang Yang. 471-474 [doi]
- Multi-Thread Concurrent Compression Algorithm for Genomic Big DataYimu Ji, Shuai Chen, Haichang Yao, Houzhi Fang, Kui Li, Shangdong Liu, Zhengyuan Xie, Kairui Wang. 475-478 [doi]
- An Improved Online Multidimensional Bin Packing AlgorithmVincent Portella, Hong Shen. 479-482 [doi]
- Dark Web Along With The Dark Web Marketing And SurveillanceKithmini Godawatte, Mansoor Raza, Mohsin Murtaza, Ather Saeed. 483-485 [doi]
- An Improved DV-hop Algorithm Based on Iterative Computation and two Communication Ranges for Sensor Network LocalizationXiu Xu, Changzheng Zhu. 486-489 [doi]
- A Gird-Based Joint Routing and Energy Replenish Scheme for Rechargeable Wireless Sensor NetworksZhansheng Chen, Hong Shen 0001. 490-495 [doi]
- Joint Mobile Data Collection and Energy Supply Scheme for Rechargeable Wireless Sensor NetworksZhansheng Chen, Hong Shen 0001. 496-500 [doi]
- A Temporal Caching-Aware Dummy Selection Location AlgorithmXuejiao Mu, Hong Shen 0001, Zhigang Lu. 501-504 [doi]
- Development of Semantic Model of Multi-Level-Building Navigation Using Indoor Ontology and Dijkstra's AlgorithmYe Yuan, Xiaoying Kong, Gengfa Fang, Li Liu, Sanya Khruahong. 505-508 [doi]
- A Modified Community-Level Diffusion Extraction in Social NetworkHuajian Chang, Hong Shen 0001. 509-512 [doi]
- Overlapping Community Detection of Complex Network: A SurveyQi Chen, Lingwei Wei. 513-516 [doi]
- Information Management Software Systems for Improving ReliabilityKyaw Zaw Ye, Soe Myint Maung, Zaw Htet, Kyaw Thu Aung, Aung Myat Kyaw, Pyae Sone Ko Ko, Sithu Thant Zin. 517-520 [doi]
- Image Preprocessing Algorithm Based on K-MeansXiaofan Zhao, Manchun Cai, Yuan Ren, Fan Yang. 521-524 [doi]
- Effect of Parallel Processing by Duplicating Histogram in Automatic Image Binarization for High-Level SynthesisMoena Yamasaki, Akira Yamawaki. 525-528 [doi]
- Infinite Propagation Speed for a Two-Component Camassa-Holm EquationWenjun Cui, Yidong Li. 529-533 [doi]