Abstract is missing.
- Congestion Detection and Link Control via Feedback in RDMA TransmissionTianshi Wang, Hongwei Kan, Qibo Sun, Shan Xiao, Shangguang Wang. 1-4 [doi]
- A Non-standardized Chinese Express Delivery Address Identification Model Based on Enhanced RepresentationZi Ye, Xuefeng Piao, Fanchao Meng, Bo Cao, Dianhui Chu. 5-11 [doi]
- An Open-source Repository Retrieval Service Using Functional Semantics for Software DevelopersJiawei Wu, Yanchun Sun, Jiaqi Zhang. 12-20 [doi]
- The Processing Method of the Message Based on the In-band Network Telemetry TechnologyCongcong Min, Dongcheng Zhao, Hua Lu. 21-24 [doi]
- A Study on Sentiment Analysis for Smart TourismZhiwei Ma, Chunyang Ye, Hui Zhou. 25-32 [doi]
- Ring-Overlap: A Storage Scaling Mechanism For Consortium BlockchainWenxuan Liu, Donghong Zhang, Jindong Zhao. 33-40 [doi]
- Security Evaluation of Smart Contracts based on Code and Transaction - A SurveyJianzhong Su, Jiyi Liu, Yuhong Nan, Yin Li. 41-48 [doi]
- A Worker Selection Scheme for Vehicle Crowdsourcing BlockchainXinran Ma, Shulin Sun, Zehua Liu, Lijun Sun. 49-56 [doi]
- Fast Probabilistic Consensus Protocol (FPC) under Different Network TopologiesFu Chen, Huizhu Li, Zhiyuan Sui, Kun Liu, Wenying Tang. 57-63 [doi]
- A Short Survey on Inductive Biased Graph Neural NetworksYuqi Zhang, Nancy Wang, Jian Yu, Sira Yongchareon, Mo Nguyen. 64-71 [doi]
- Service-Based Event Penetration from IoT Sensors to Businesses: a Case StudyGuiling Wang 0002, Jun Fang, Jing Wang, Jian Yu, Liang Zhang, Yanbo Han. 72-79 [doi]
- On the Uncertainty in IoT-enabled Business Processes using Artificial Intelligence ComponentsMarc Hesenius, Nils Schwenzfeier, Ole Meyer, Volker Gruhn. 80-87 [doi]
- IoTDM4BPMN: An IoT-Enhanced Decision Making Framework for BPMN 2.0Yusuf Kirikkayis, Florian Gallik, Manfred Reichert. 88-95 [doi]
- Modeling, Executing and Monitoring IoT-Aware Processes with BPM TechnologyFlorian Gallik, Yusuf Kirikkayis, Manfred Reichert. 96-103 [doi]
- Generalizing STNU to Model Non-functional Constraints for Business ProcessesJun Peng, Jingwei Zhu, Liang Zhang. 104-111 [doi]
- Multifunctional Module Design Based on Hybrid CMOS-Memristor Logic CircuitChao Ji, Tuo Li, Xiaofeng Zou. 112-116 [doi]
- Multi-Granularity Decomposition based Task Scheduling for Migration Cost MinimizationZiliang Wang, Tingting Zhang, Ying Li, Sheng Wang, Fanqin Zhou, Lei Feng 0001, Wenjing Li 0001. 117-124 [doi]
- Service Information Informing in Computing Aware NetworkingZongpeng Du, Zhiqiang Li, Xiaodong Duan, Jing Wang. 125-130 [doi]
- Mobile Computing Force Network (MCFN): Computing and Network Convergence Supporting Integrated Communication ServiceXiaonan Shi, Qin Li, Dan Wang, Lu Lu. 131-136 [doi]
- A computing-aware routing protocol for Computing Force NetworkHuijuan Yao, Xiaodong Duan, Yuexia Fu. 137-141 [doi]
- Base station computing force resource load balancing strategy for distributed machine learningMingkang Song, Mengke Yao, XiaoBin Wang, Jianming Zhou, Tenghui Ke, Peng Dai, Weidong Li, Xiaolong Zhou. 142-146 [doi]
- Optimization of Service Scheduling in Computing Force NetworkYongqiang Dong, Chenchen Guan, Yunli Chen, Kun Gao, Lu Lu, Yuexia Fu. 147-153 [doi]
- Automatic Scheduling Technology of Computing Power Network Driven by Knowledge GraphYanheng Bi, Yingchi Long, Yanzheng Jin, Shengwen Zheng, Huaiyuan Liu, Hongzhi Wang. 154-160 [doi]
- Overbooking-enabled Virtual Machine Deployment Approach in Mobile Edge ComputingBingyi Hu, Jixun Gao, Quanzhen Huang, Huaichen Wang, Yanxin Hu, Jialei Liu, Yanmin Ge. 161-166 [doi]
- Cache Replacement Algorithm Based on Dynamic Constraints in Microservice PlatformLiwen Li, Chunyang Ye, Hui Zhou. 167-174 [doi]
- SUAM: A Service Unified Access Model for Microservice ManagementYu Jiang, Chengkai Li, Ying Li. 175-180 [doi]
- Task-role Performance Evaluation via Business Process Monitoring with BPMN ExtensionHangyu Cheng, Guosheng Kang, Jianxun Liu, Yiping Wen, Buqing Cao, Bowen Liang. 181-187 [doi]
- eBPF-based Working Set Size Estimation in Memory ManagementZhilu Lian, Yangzi Li, Zhixiang Chen, Shiwen Shan, Baoxin Han, Yuxin Su. 188-195 [doi]
- A Novel Science and Technology Resource Recommendation Service based on Knowledege Graph and Collaborative FilteringXinyu Zhao, Chen Liu, Shuo Zhang, Xin You. 196-202 [doi]
- HRET: Heterogeneous Information Network for Recommendation in testing and inspectionLiwen Zhang, Weiping Li, Tong Mo, Weijie Chu. 203-208 [doi]
- MRNN-SA: A Multi-dimensional Time Series Fault Prediction Service for Power Equipment through Self-attention NetworkYongyan Yang, Lihong Yang, Mengda Xing. 209-216 [doi]
- A Process Evaluation Method for Crossover Service RecommendationYushuang Fang, Min Yuan, Hangrui Zhang, Ruzhen Wang. 217-224 [doi]
- A Machine Learning Method and Device Based on Programmable SwitchCongcong Min, Dongcheng Zhao, Hua Lu. 225-228 [doi]
- Improve the performance of CenterNet through hybrid attention mechanism CBAMTianyang Li, Tibing Zhang, Jian Wang, Zhongjie Wang, Ting He, Yufeng Zhang. 229-236 [doi]
- Distributed machine learning based link allocation strategyYi Yang, Mingkang Song, Jianming Zhou, Peng Dai, Tenghui Ke, Weidong Li, Zhengguang Wu, Xiayan Zheng, Xijin Li. 237-240 [doi]
- Game difficulty prediction algorithm based on improved Monte Carlo treeBoqin Hu, Chen Fu. 241-247 [doi]
- A Graph Neural Network-based Code Recommendation Method for Smart Contract DevelopmentXiuwen Tang, Jiazhen Gan, Zigui Jiang. 248-254 [doi]
- A DTP and SoLiD based Service for Multi-Source Semantically-Heterogeneous Personal Data ManagementZhenxiang Zhao, Chao Ma, Haochen Yuan, Zhongjie Wang. 255-262 [doi]
- A Smart Contract-based Service Platform for Trustworthy Crowd Funding and Crowd InnovationWenjie Teng, Hanchuan Xu, Zhe Huang, Yu Bai, Zhongjie Wang. 263-270 [doi]
- Identifying Prerequisite Relations Between Concepts In WikipediaKui Xiao, Yuming Fu, Ying Deng, Lingmei Xia. 271-276 [doi]
- Medical service oriented blockchain data credibility evaluation methodMeng Wang, Rong Jiang, Yue Yang, Chenguang Wang, Lin Zhang, Liang Yang, Xuetao Pu. 277-282 [doi]
- Threat identification model for suspected Internet of Things attack groupsRui Yu, Fu Chen, Wenmao Liu, Hongqing Sang. 283-288 [doi]
- FSC: File Storage in Coded Blockchain with C-PBFT Consensus ProtocolRuize Yu, Changlin Yang, Ying Liu. 289-296 [doi]
- Probing the Mystery of Cryptocurrency Exchange: The Case Study Based on Mt.GoxYuanjun Ding, Weili Chen. 297-304 [doi]
- Differentially Private Auction for Federated Learning with Non-IID DataKean Ren. 305-312 [doi]