default search action
9th CBD 2021: Xi'an, China
- Ninth International Conference on Advanced Cloud and Big Data, CBD 2021, Xi'an, China, March 26-27, 2022. IEEE 2022, ISBN 978-1-6654-0745-8
- Haiting Zhu, Junmei Wan, Nan Li, Yingying Deng, Gaofeng He, Jing Guo, Lu Zhang:
Odd-Even Hash Algorithm: A Improvement of Cuckoo Hash Algorithm. 1-6 - Senfan Wu, Xuemei Yang, Kedong Liu, Hong Luo:
A Novel Container Workload Prediction Method Based on Automatic Classification and Attention-based LSTM. 7-12 - Xinrong Liu, Yaoqin Zhu, Qiliang Zhu, Jin Sun:
A Spark-based Parallel NPTSR Algorithm for Hyperspectral Image fusion. 13-18 - Cong Wang, Xiaoyang Chen, Yixin Luo, Guoqi Zhang:
Solving Virtual Network Mapping Fast by Combining Neural Network and MCTS. 19-24 - Yushi Liu, Jingjing Han, Bin Zhao:
Efficient Mining of Regional Semantic Patterns from Semantic Trajectories on Cloud Computing. 25-30 - Weikai Ning, Zebin Wu, Jin Sun, Jiandong Yang, Yi Zhang, Yaoqin Zhu, Zhihui Wei, Lei Xia:
A Distributed and Parallel Tensor Hierarchical Tucker Decomposition on Clouds. 31-36 - Shiqi Wang, Fang Dong, Dian Shen, Wei Zhao:
Flow Characteristics Estimation Based On Multilayer Virtual Active Counter Sharing in Data Center Network. 37-44 - Zhengzhi Xu, Yifei Lu, Jingqi Li, Xu Ma, Lei Qian:
Tailor : Datacenter Load Balancing For Accelerating Distributed Deep Learning. 45-50 - Huan Wang, Lijuan Wang:
FedKG: Model-Optimized Federated Learning for Local Client Training with Non-IID Private Data. 51-57 - Yingchi Mao, Zijian Tu, Hua Nie, Ping Ping, Jianxin Huang, Jun Wu:
DWUPP: Dynamic Weight Update through Pipelined Parallel for Distributed Training Model. 58-63 - Wei Zheng, Peixuan Lin, Tongzhou Yang:
KSTA: a strategy for scheduling data-intensive workflows onto cloud computing resources. 64-69 - Xueying Zhu, Ye Li, Aledia Bilali, Biyun Zhou, Jun Zhang, Hao Dai, Fan Zhang, Rui Zhang, Leong Hou U:
Traffic simulation and impact analysis for alternative mobility services in the city of Shenzhen. 70-76 - Jiajia Yu, Shuyu Gu:
A Spatial-Temporal Information based Traffic-Flow Detection Method for video Surveillance. 77-82 - Chenghua Gong, Xiaoyu Sun, Bin Zhao:
Continuous K-Selection Capacity Constrained Assignment in Road-Networks. 83-88 - Mingming Xu, Lu Zhang, Haiting Zhu:
Finding Collusive Spam in Community Question Answering Platforms: A Pattern and Burstiness Based Method. 89-94 - Xiaoqian Zeng, Zhen Xu, Chao Tan, Genlin Ji:
Label Enhancement with Sample Correlations via Low-dimensional Feature Representation. 95-100 - Zhen Liu, Xiaoqiang Di, Wei Song, Weiwu Ren:
Vulnerability knowledge extraction method based on joint extraction model. 101-106 - Jie Zhang, Xiaosha Qi, Genlin Ji:
Self Attention based Bi-directional Long Short-Term Memory Auto Encoder for Video Anomaly Detection. 107-112 - Tao Fu, Xiaoliang Xu, Yuxiang Wang:
An Execution Cost Model for Aggregate Queries over Knowledge Graphs. 113-120 - Yankai Ma, Jun Yang, Zhendong Li, Ziqiang Ma:
YOLO-Cigarette: An effective YOLO Network for outdoor smoking Real-time Object Detection. 121-126 - Song Tian, Peng Qi, Hongjia Xue, Yan Sun:
C-BERTT: A BERT-based Model For Extractive Summarization Of Chinese Online Judge Questions. 127-132 - Yuanjiao Hu, Zhaoyun Sun, Lili Pei, Wei Li, Yingying Li:
Evaluation of pavement surface roughness performance under multi-features conditions based on optimized random forest. 133-138 - Shiyi Liu, Bo Yang, Feng Wu, Gai Liu:
Joint Deep Dictionary Learning. 139-144 - Pengsen Ma, Tao Xue:
Embedding Chinese Face Painting Into the StyleGAN Latent Space. 145-150 - XuQian Yang, Lijuan Wang:
SDP-CycleGAN: CycleGAN Based on Siamese Data Pairs for Unraveling Data Imbalance Problems in Anomaly Detection. 151-157 - Zhe Yang, Liangkui Xu, Ziyu Bu, Yipeng Chen:
An Optimization Method for Weight Computation in Hypergraph Transductive Learning Model. 158-163 - Qi Li, Peng Qi, JiangSong Min, Yan Sun:
An Automatic Question Classification Model Based on Solving Programs for Online Judge Platforms. 164-169 - Ruimeng Tian, Xuemei Yang, Wanqi Dong, Hong Luo:
A Fast Speech Emotion Conversion Point Detection Algorithm Based on Distance Measurement. 170-175 - Binwei Lin, Zhiyong Yu, Fangwan Huang, Longkun Guo:
Pool-Based Sequential Active Learning For Regression Based on Incremental Cluster Center Selection. 176-182 - Renjie Tang, Jiahui Jin, Junbo Qian, Junzhou Luo:
Handling Imbalanced ECG Heartbeat Classification with Adaptive Sample Masking Update. 183-188 - Shuaiyu Jia, Ling Gao, Hongbo Guo, Qinyu Sun, Hai Wang, Jie Zheng:
Action Recognition Based on Parallel Multi-Granularity Feature Refinement Networks. 189-194 - Qinyu Sun, Ling Gao, Hongbo Guo, Shuaiyu Jia, Hai Wang, Jie Zheng:
Action recognition based on parallel convolutional recurrent neural networks. 195-200 - Junting Lei, Wanqing Zhao, Shaobo Zhang, Jinye Peng:
Multi-branch Prediction Network for Multi-label Social Image Classification. 201-206 - Miao Wan, Jie Ren, Miao Ma, Zhiqiang Li, Rui Cao, Quanli Gao:
Deep Neural Network Based Chinese Dialect Classification. 207-212 - Tao Xiao, Jingfei Jiang, Jinwei Xu, Dong Wen, Junhua Wang, Xuehui Chen:
Compressed LSTM using balanced sparsity. 213-217 - Xiao Xu, You Lu, Qiming Fu:
Applying Graph Neural Network in Deep Reinforcement Learning to Optimize Wireless Network Routing. 218-223 - Jiahui Peng, Chunpei Li, Bo Yuan, Hongwei Meng, Feng Yu, Xianxian Li:
SCPS: A Secure and Copyright-Preserving System for IIoT Based on Hyperledger Fabric. 224-229 - Lei Yang, Xiao Zheng:
Non-Interactive Correlation Differential Privacy for Healthcare Data. 230-235 - Dingyang Lv, Xinyu Cheng, Jinghui Zhang, Wei Zhang, Wei Zhao, He Xu:
DDoS Attack Detection Based on CNN and Federated Learning. 236-241 - Shuren Li, Yifei Lu, Jingqi Li:
Can We Half the Work with Double Results: Rethinking Machine Learning Algorithms for Network Intrusion Detection System. 242-247 - ZheYing Zhang, Lijuan Wang:
An Efficient Intrusion Detection Model Based on Convolutional Neural Network and Transformer. 248-254 - Changzhi Teng, Mingxuan Zhang, Zeng Zeng, Zhen Zhang, Yusen Zhou, Wenjia Wu:
Wi-SL: A Secure Lightweight WiFi Transmission Mechanism for IoT Devices. 255-260 - Xuesong Huo, Ming Zhang, Hongqin Zhu, Wei Li:
A Security Situation Assessment Method based on Support Vector Regression for Power Monitoring System. 261-266 - Haiying Chen, Dongzhan Zhang, Zhiyu Chen, Xiangjin Zhan, Zehai Su, Wei Zheng:
A proof-of-work based on MH-PBKDF2 algorithm. 267-272 - Yihao Wang, Ling Gao, Jie Ren, Rui Cao, Hai Wang, Jie Zheng, Quanli Gao:
ESOD: Edge-based Task Scheduling for Object Detection. 273-278 - Mengyang Liu, Anran Tang, Huitian Wang, Lin Shen, Yun-Han Chang, Guangxing Cai, Daheng Yin, Fang Dong, Wei Zhao:
Accelerating Multi-Object Tracking in Edge Computing Environment with Time-Spatial Optimization. 279-284 - Yue Li, Xiaofang Mu, Hui Qi, Hong Shi, Jiaji Liu:
Surveillance video analysis and compression based on edge computing. 285-292 - Yifeng Gu, Zhenghua Zhang, Qingqing Hong:
Vehicle-mounted Early Warning System Based on Edge Intelligence. 293-301 - Xiaoting Wang, Zhimeng Zhou, Hanjing Chen, Yi Zhang:
Task Offloading and Power Assignment Optimization for Energy-Constrained Mobile Edge Computing. 302-307 - Ruixiang Li, Yingchi Mao, Tao Wu, Jun Wu:
Approximate Matching Based Cache Selection Strategy in Mobile Edge Computing. 308-314 - Shaobo Zhang, Wanqing Zhao, Yan Zhao, Xianlin Peng, Jinye Peng:
A Hybrid framework for mobile augmented reality. 315-320 - Jie Ren, Ling Gao, Quanli Gao, Yumeng Hao, Jiale Hou, Hai Wang, Jie Zheng:
Adaptive Bitrate Encoding Strategy for ROI-based Mobile Augmented Reality. 321-326 - Rui Zhang, Weiwei Miao, Jin Huang, Zeng Zeng, Changzhi Teng, Shihao Li, Zhen Zhang, Mingxuan Zhang:
A IoT Terminal Position Recognition Method Based on RSSI and Magnetic Field in A Low Trust Environment. 327-332
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.