default search action
DASC/PiCom/DataCom/CyberSciTech 2017: Orlando, FL, USA
- 15th IEEE Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA, November 6-10, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1956-8
CyberSciTech Regular Papers
- Peter Kimani Mungai, Runhe Huang, Zhong Chen, Xiaokang Zhou:
Semantic Neuron Networks Based Associative Memory Model. 1-8 - Ao Guo, Jianhua Ma:
An Integrative and Precise Approach in Personality Computing Based on Ontic Personae Modeling. 9-15 - Kehua Guo, Ting Li, Runhe Huang, Jian Kang:
Deep Convolution Neural Network Discriminator for Distinguishing Seborrheic Keratosis and Flat Warts. 16-21 - Zili Li, Li Zeng, Zhigang Luo:
Identifying the Landscape and Trends in Cyberspace Research: From 1989 to 2016. 22-29 - Shan Gao, Guibing Guo, Yusong Lin, Xingjin Zhang, Yongpeng Liu, Zongmin Wang:
Pairwise Preference Over Mixed-Type Item-Sets Based Bayesian Personalized Ranking for Collaborative Filtering. 30-37 - Maximilian Frank, Maria Leitner, Timea Pahi:
Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education. 38-46 - Yuxia Sun, Yunlong Xie, Zhi Qiu, Yuchang Pan, Jian Weng, Song Guo:
Detecting Android Malware Based on Extreme Learning Machine. 47-53 - Tomoya Furukawa, Qianfgu Zhao:
On Extraction of Rules from Deep Learner: The Deeper, the Better? 54-60 - Pan Wang, Xuejiao Chen:
Co_Hijacking Monitor: Collaborative Detecting and Locating Mechanism for HTTP Spectral Hijacking. 61-67 - Shuang Li, Yuezhi Zhou, Di Zhang, Yaoxue Zhang, Xiang Lan:
Learning to Diversify Recommendations Based on Matrix Factorization. 68-74 - Zhe Sun, Zhixin Sun, Xuejian Zhao, Long Jin, Wei Zhang:
Application of Adaptive Genetic Algorithm for Multimodal Transportation Logistics Distribution Routing Problem. 75-80 - BingBing Rao, Liqiang Wang:
A Survey of Semantics-Aware Performance Optimization for Data-Intensive Computing. 81-88 - Stamatios Giannoulakis, Nicolas Tsapatsoulis, Klimis S. Ntalianis:
Identifying Image Tags from Instagram Hashtags Using the HITS Algorithm. 89-94 - Qichao Xu, Zhou Su, Yilong Hui, Qing Yang:
Caching Scheme with Edge Nodes for Mobile Cyber Physical Systems. 95-100 - Xiu Li, Chang Men, Fan Zhang, Zhihui Du:
A Smart Visual Analysis Solution for MOOC Data. 101-106 - Maede Rayatidamavandi, Yu Zhuang, Mahshid Rahnamay-Naeini:
A Comparison of Hash-Based Methods for Trajectory Clustering. 107-112 - Ahmad Jamialahmadi, Yaser P. Fallah:
Analysis of the Impact of Driver Behavior Models on Performance of Forward Collision Warning Systems. 113-118 - Tongtong Xu, Ao Guo, Jianhua Ma, Kevin I-Kai Wang:
Feature-Based Temporal Statistical Modeling of Data Streams from Multiple Wearable Devices. 119-126 - Shengjie Xu, Yi Qian, Rose Qingyang Hu:
A Study on Communication Network Reliability for Advanced Metering Infrastructure in Smart Grid. 127-132 - Dongfeng Fang, Yi Qian, Rose Qingyang Hu:
Interference Management for Physical Layer Security in Heterogeneous Networks. 133-138 - Luis Gabriel Jaimes, Robert Steele:
Incentivization for Health Crowdsensing. 139-146 - Moon Ho Lee:
A Real Example of Jong Nang and Tomb Gate of Cyber Biology Jeju Island: Its Fundamental Principle of DNA Code. 147-155 - Hossein Nourkhiz Mahjoub, Amin Tahmasbi-Sarvestani, Hadi Kazemi, Yaser P. Fallah:
A Learning-Based Framework for Two-Dimensional Vehicle Maneuver Prediction over V2V Networks. 156-163 - Fei Lu, Zhikui Chen, Xu Yuan, Qiu Li, Zedong Du, Li Luo, Fengyi Zhang:
MMHG: Multi-modal Hypergraph Learning for Overall Survival After D2 Gastrectomy for Gastric Cancer. 164-169 - Yongpeng Liu, Yusong Lin, Shan Gao, Hongpo Zhang, Zongmin Wang, Yang Gao, Guanling Chen:
Respiratory Sounds Feature Learning with Deep Convolutional Neural Networks. 170-177 - Jianmei Lei, Dongmei Chen, Fengxi Li, Qingwen Han, Siru Chen, Lingqiu Zeng, Min Chen:
A Bus Arrival Time Prediction Method Based on GPS Position and Real-Time Traffic Flow. 178-184 - Liang Xu, Qianbin Xia, Weijun Xiao:
Locality-Driven Dynamic Flash Cache Allocation. 185-193 - Ahmad O. Aseeri, Yu Zhuang, Mohammed Saeed Alkatheiri:
A Memory Capacity-Aware Algorithm for Fast Clustering of Disk-Resident Big Datasets. 194-201
CyberSciTech Short Papers
- Masoumeh Kalantari Khandani, Wasfy Mikhael, Yaser P. Fallah, Katerina Goseva-Popstojanova:
Data-Based Analysis of Sampling and Estimation Methods for Vehicle Tracking Over Wireless Networks. 202-207 - Zi Wang, Zifei Zhao, Zhiwei Zhao, Geyong Min, Xinyuan Huang, Hancong Duan, Jia Hu:
Exploiting Mobile Sensor Data for Media Caching in Mobile Edge Networks. 208-213 - Tengku Adil Tengku Izhar, Bernady O. Apduhan:
An Ontology-Based Framework for Organization Information Extraction. 214-219 - Ting Wu, Fei Hao, Mijin Kim:
Exploring the Production of "The Belt and Road"-Driven Animations with Crowdsourcing Model. 220-225 - David Maimon, Olga Babko-Malaya, Rebecca Cathey, Steve Hinton:
Re-thinking Online Offenders' SKRAM: Individual Traits and Situational Motivations as Additional Risk Factors for Predicting Cyber Attacks. 232-238 - Arthur A. B. Bucioli, Gabriel Fernandes Cyrino, Gerson Flavio Mendes de Lima, Isabela Cristina dos Santos Peres, Alexandre Cardoso, Edgard Afonso Lamounier, Milton Miranda Neto, Roberto V. Botelho:
Holographic Real Time 3D Heart Visualization from Coronary Tomography for Multi-place Medical Diagnostics. 239-244 - Andre Goode, Robert James Steele:
A Practical Cyber-Physical System for the Self-Capture of the Effect of Exercise on Blood Glucose Levels. 245-250 - Feng Ye, Yujun Sun, Andrew Rettig:
Authentication and Access Control for an IoT Green Roof Monitoring System. 251-256 - Alan Oliveira de Sá, Luiz Fernando Rust da Costa Carmo, Raphael Carlos Santos Machado:
Use of Switching Controllers for Mitigation of Active Identification Attacks in Networked Control Systems. 257-262 - Peipei Wang, Yutong Han, Jing Qin, Bin Wang, Xiaochun Yang:
Anomaly Detection for Streaming Data from Wearable Sensor Network. 263-268 - Marta Chinnici, Davide De Chiara, Andrea Quintiliani:
Data Center, a Cyber-Physical System: Improving Energy Efficiency Through the Power Management. 269-272 - Thomas Friedl, Henning Schneider, Miloslava Plachkinova:
Development of a Platform-Independent Software Tool for Management of X.509 Certificates from Diverse Certificate Stores. 273-275 - Ronald Loui:
Plausible Deniability for ISP Log and Browser Suggestion Obfuscation with a Phrase Extractor on Potentially Open Text. 276-279 - Ronald Loui, Will Hope:
Information Warfare Amplified by Cyberwarfare and Hacking the National Knowledge Infrastructure. 280-283 - Yu-Pei Liang, Shuo-Han Chen, Yi-Han Lien, Tseng-Yi Chen, Heng-Yin Chen, Wei-Kuan Shih:
Enabling High-Resolution Video Support for the Next-Generation Internet-Connected Display. 284-286
Special Session on Cyber-Enabled Smart Environment and Healthcare (Cyber-ESEH)
- Gabriel Ploof, Bassam Alqahtani, Farwan Alghamdi, Garret Flynn, Cai Xia Yang:
Center of Mass Estimation Using Motion Capture System. 287-292 - Xiongyi Liu, Wenbing Zhao:
Buddy: A Virtual Life Coaching System for Children and Adolescents with High Functioning Autism. 293-298 - Qing Wu, Wenbing Zhao:
Towards a Technology-Enabled Environment of Care for Nursing Homes. 299-302 - Hao Qiu, Xianping Wang, Fei Xie:
A Survey on Smart Wearables in the Application of Fitness. 303-307 - Marius Rashid Khan, Sabine Sachweh, Albert Zündorf:
Towards User-Centered Assistance in Smart Environments Based on Device Metadata. 308-311 - Albert Budi Christian, Lokesh Sharma, Shih-Lin Wu:
AED: Adaptive Energy-Efficient Data Transmission Scheme for Heart Disease Detection. 312-317 - Veton Këpuska, Gamal Bohouta:
Improving Wake-Up-Word and General Speech Recognition Systems. 318-321
Special Session on Computing and Applications for Cyber Internet of Things (Cyber-IoT)
- Hui Hui, Rui Xing:
QoE Based Optimization for Cyber Vehicular Networks. 322-325 - Xinzheng Feng, Jun Wu, Kuan Wang, Jianhua Li, Meng Wang:
Security Analysis of Simple Network Management Protocol Based IEEE P21451 Internet of Things. 326-330 - Junjie Pei, Zhuoxuan Ju, Hengdong Ye, Bibo Wu, Shu Fu:
Performance Comparison of Base Station On/Off and Base Station Cooperative Transmission in Ultra-Dense Network. 331-335 - Hengdong Ye, Zhuoxuan Ju, Bibo Wu, Junjie Pei, Shu Fu:
Joint Base Station Cooperative Transmission and ON-OFF Mechanism in Internet of Things Networks. 336-339
Special Session on Cyber-Enabled Intelligent Sensing and Smart Computing (Cyber-ISSC)
- Song Deng, Kun Wang:
An Overview on Key Technologies of Secure and Efficient Data Transmission for Energy Internet. 340-345
Special Session on Cyber Social Computing and Cyber-Enabled Applications (CSC&CEA)
- Ninglin Xu, Jiulei Jiang, Xiaofeng Wang:
Flexible Analysis of Cross-Organizational Process Modeling Based on π Calculus. 346-350 - Yaya Liu, Jiulei Jiang, Lingyu Xu, Lishuang Zhao:
Formalization of Business Process with Flexibility Based on Service Interaction. 351-355 - Liangxu Liu, Dayao Gong, Bo Guan, Junyan Xiao:
CF-Cluster: Clustering Bike Station Based on Common Flows. 356-361
Special Session on ICT Apps, Cyber and Economy Workshop (ACE-2017)
- Yuping Zhao, Geng Li, Wanyue Qu:
A Novel Cluster-Based Ultra-Dense Network Technique for 5G and its Security Issues. 362-367 - Iroshan Abeykoon, Xiaohua Feng, Renxi Qiu:
A Forensic Investigation of Robot Operating System. 368-372 - Xiaohua Feng, Audrey Asante, Emma Short, Iroshan Abeykoon:
Cyberstalking Issues. 373-376
DASC Regular Papers
- Kutalmis Akpinar, Fereshteh Jafariakinabad, Kien A. Hua, Omar Nakhila, Jun Ye, Cliff C. Zou:
Fault-Tolerant Network-Server Architecture for Time-Critical Web Applications. 377-384 - Md. Arafatur Rahman, Md. Munirul Hasan, A. Taufiq Asyhari, Md. Zakirul Alam Bhuiyan:
A 3D-Collaborative Wireless Network: Towards Resilient Communication for Rescuing Flood Victims. 385-390 - Yaohang Li, Ravi Mukkamala, Michael Mascagni:
Validating the Correctness of Outsourced Computational Tasks Using Pseudorandom Number Generators. 391-398 - Jake Fairbrother, Matthew Leeke:
On Basis Variables for Efficient Error Detection. 399-406 - Bruno Costa, Paulo F. Pires, Flávia Coimbra Delicato:
Specifying Functional Requirements and QoS Parameters for IoT Systems. 407-414 - Shigeki Yoneda, Naohiro Hayashibara:
Adaptive Zone Replication for Structured Peer-to-Peer Systems. 415-422 - Koji Hasebe, Mitsuaki Tsuji, Kazuhiko Kato:
Deadlock Detection in the Scheduling of Last-Mile Transportation Using Model Checking. 423-430 - D. Frank Hsu, Xiaojie Lan, Gabriel Miller, David Baird:
A Comparative Study of Algorithm for Computing Strongly Connected Components. 431-437 - Mohammad Asadul Hoque, Phil Pfeiffer, Sanford Gabrielle, Edward Hall, Elizabeth Turbyfill:
SAFARI-Taxi: Secure, Autonomic, FAult-Resilient, and Intelligent Taxi Hailing System. 438-445 - Shameek Bhattacharjee, Mehrdad Salimitari, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Preserving Data Integrity in IoT Networks Under Opportunistic Data Manipulation. 446-453 - Joachim Fellmuth, Paula Herber, Tobias F. Pfeffer, Sabine Glesner:
Securing Real-Time Cyber-Physical Systems Using WCET-Aware Artificial Diversity. 454-461 - Igor Khokhlov, Leon Reznik:
Colluded Applications Vulnerabilities in Android Devices. 462-469 - Jiyuan Zhou, Tian Wang, Md. Zakirul Alam Bhuiyan, Anfeng Liu:
A Hierarchic Secure Cloud Storage Scheme Based on Fog Computing. 470-477 - Roberto M. Vergaray, Julian L. Rrushi:
On Sustaining Prolonged Interaction with Attackers. 478-485 - Julian L. Rrushi:
Defending Electrical Substations Against 0-Day Malware Through Decoy I/O in Protective Relays. 486-493 - Gianluigi Me, Liberato Pesticcio, Paolo Spagnoletti:
Discovering Hidden Relations Between Tor Marketplaces Users. 494-501 - Mihiro Sonoyama, Takatsugu Ono, Osamu Muta, Haruichi Kanaya, Koji Inoue:
Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics. 502-510 - Matthew Sinda, Qi Liao:
Spatial-Temporal Anomaly Detection Using Security Visual Analytics via Entropy Graph and Eigen Matrix. 511-518 - Sergio de Medeiros Camara, Luiz Fernando Rust da Costa Carmo, Luci Pirmez:
Towards a Storage-Efficient and Categorized Secure Log Structure Scheme for Embedded Systems. 519-526 - Kelvin Ly, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla, Yier Jin:
Approximate Power Grid Protection Against False Data Injection Attacks. 527-533 - Samer Khamaiseh, Dianxiang Xu:
Software Security Testing via Misuse Case Modeling. 534-541 - James Halvorsen, Julian L. Rrushi:
Target Discovery Differentials for 0-Knowledge Detection of ICS Malware. 542-549 - Senwen Kan, Jennifer Dworak:
Systematic Test Generation for Secure Hardware Supported Virtualization. 550-556 - Jhen-Hao Li, Sheng-De Wang:
PhishBox: An Approach for Phishing Validation and Detection. 557-564 - Sarah Harun, Tanveer Hossain Bhuiyan, Song Zhang, Hugh R. Medal, Linkan Bian:
Bot Classification for Real-Life Highly Class-Imbalanced Dataset. 565-572 - Adnan Kiliç, Ertan Onur, Cansu Betin Onur:
Revisiting Shamir's No-Key Protocol: Lightweight Key Transport. 573-580 - Changqing Luo, Sergio Salinas, Ming Li, Pan Li:
Energy-Efficient Autonomic Offloading in Mobile Edge Computing. 581-588 - Masashi Hayano, Naoki Iijima, Toshiharu Sugawara:
Asynchronous Agent Teams for Collaborative Tasks Based on Bottom-Up Alliance Formation and Adaptive Behavioral Strategies. 589-596 - Hossain Shahriar, William Bond:
Towards an Attack Signature Generation Framework for Intrusion Detection Systems. 597-603 - Tam Thi Thanh Nguyen, Kazuhiro Ogata:
Graphical Animations of State Machines. 604-611
DASC Short Papers
- Kai Ding, Andrey Morozov, Klaus Janschek:
Classification of Hierarchical Fault-Tolerant Design Patterns. 612-619 - Takumi Fujimori, Minoru Watanabe:
Holographic Memory Calculation FPGA Accelerator for Optically Reconfigurable Gate Arrays. 620-625 - Sudip Chakraborty:
Temporal Variation of Trust in Dependable Systems. 626-631 - Zachary Thomas, Sherif Abdelwahed:
Active Malware Countermeasure Approach for Mission Critical Systems. 632-638 - Travis E. Schulze, Daryl G. Beetner, Yiyu Shi, Kevin A. Kwiat, Charles A. Kamhoua, Laurent Njilla:
Combating Data Leakage Trojans in Sequential Circuits Through Randomized Encoding. 639-644 - David Eastman, Sathish A. P. Kumar:
A Simulation Study to Detect Attacks on Internet of Things. 645-650 - Nick Neely, Zachary Waldman, Mike Burns, Haklin Kimm:
Web-Based Malware Mitigation with a Virtualized Web-Browser: A Comparison Study. 651-656 - Sayonnha Mandal, Robin A. Gandhi, Harvey P. Siy:
Modular Norm Models: A Lightweight Approach for Modeling and Reasoning about Legal Compliance. 657-662 - Richard Ciancioso, Danvers Budhwa, Thaier Hayajneh:
A Framework for Zero Day Exploit Detection and Containment. 663-668 - Damianos Pinou, Rien Chy, Thaier Hayajneh:
Electromagnetic Warfare and the Cybersecurity Threat. 669-674 - Hailu Belay Kassa, Kevin T. Kornegay, Yacob Astatke, Marcial Tienteu:
Secrecy Capacity and Energy Efficiency Evaluation of RLS-Kaiser Based Smart Antenna System. 675-680 - Abdulghani Ali Ahmed:
Detection and Avoidance Technique of Anomalous Congestion at the Network Gateways. 681-686 - Ananth A. Jillepalli, Daniel Conte de Leon, Stuart Steiner, Frederick T. Sheldon, Michael A. Haney:
Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers. 687-692 - Sharif Hassan, Ratan Guha:
A Probabilistic Study on the Relationship of Deceptions and Attacker Skills. 693-698 - Rafael I. Bonilla, Cristina L. Abad:
Towards a Real Time Framework for Monitoring IoT Devices for Attack Detection: Vision Paper. 699-703 - Rafael I. Bonilla, Juan J. Crow, Luigi S. Basantes, Luis G. Cruz:
A Metric for Measuring IoT Devices Security Levels. 704-709 - Jumoke Soyemi, John Akinode, Samson Oloruntoba:
Electronic Lecture Time-Table Scheduler Using Genetic Algorithm. 710-715 - Emmanuel Masabo, Kyanda Swaib Kaawaase, Julianne Sansa-Otim, Damien Hanyurwimfura:
Structural Feature Engineering Approach for Detecting Polymorphic Malware. 716-721 - Abdulhameed Alelaiwi, Mohammad Mehedi Hassan, Md. Zakirul Alam Bhuiyan:
A Secure and Dependable Connected Smart Home System for Elderly. 722-727
PICom Regular Papers
- Hamzah Al Najada, Imad Mahgoub:
Real-Time Incident Clearance Time Prediction Using Traffic Data from Internet of Mobility Sensors. 728-735 - Mohammed Hameed Alhameed, Imad Mahgoub:
VANET Adaptive Beaconing Based on Fuzzy Logic. 736-743 - Joanne Skiles, Imad Mahgoub:
Investigating the Impact of Adaptive Beaconing on GEOADV Performance. 744-751 - Lu Chen, Jing Zhang, Xi Liang, Jiafeng Li, Li Zhuo:
Deep Spectral-Spatial Feature Extraction Based on DCGAN for Hyperspectral Image Retrieval. 752-759 - Yujie Chen, Suyu Wang:
A Weighted MHOF and Sparse Representation Based Crowd Anomaly Detection Algorithm. 760-765 - Le Li, Weibin Liu, Weiwei Xing:
Robust Radial Distortion Correction from a Single Image. 766-772 - Sisi Han, Weibin Liu, Weiwei Xing:
Image Enhancement Based on Spatial Multi-scale Homomorphic Filtering and Local Entropy Guided Image Filtering. 773-779
PICom Regular Papers
- Ziyi Wu, Weibin Liu, Weiwei Xing:
A Novel Method for Human Motion Capture Data Segmentation. 780-787 - Cristiano Gurgel de Castro, Sergio de Medeiros Camara, Luiz Fernando Rust da Costa Carmo, Davidson Rodrigo Boccardo:
EVINCED: Integrity Verification Scheme for Embedded Systems Based on Time and Clock Cycles. 788-795 - Daniel-Jesus Munoz, José A. Montenegro, Mónica Pinto, Lidia Fuentes:
Green Security Plugin for Pervasive Computing Using the HADAS Toolkit. 796-803 - Claudio Miceli de Farias, Luci Pirmez:
A Multisensor Data Fusion Technique for Multiapplication Wireless Sensor Networks Based on Overlapping Intervals. 804-811 - Lei Chen, Wei Lu, Liqiang Wang, Ergude Bao, Weiwei Xing, Yong Yang, Victor Yuan:
Optimizing MapReduce Partitioner Using Naive Bayes Classifier. 812-819 - Diogo Nolasco Ferreira Sousa, Jonice de Oliveira Sampaio:
Intelligent Subevent Detection Based on Social Network Data. 820-827 - José Miguel Horcas, Mónica Pinto, Lidia Fuentes, Nadia Gámez:
Self-Adaptive Energy-Efficent Applications: The HADAS Developing Approach. 828-835
PICom Invited Full Papers
- Shengchu Zhao, Wei Li, Tanveer A. Zia, Albert Y. Zomaya:
A Dimension Reduction Model and Classifier for Anomaly-Based Intrusion Detection in Internet of Things. 836-843 - Denis Conan, Léon Lim, Chantal Taconet, Sophie Chabridon, Claire Lecocq:
A Multiscale Approach for a Distributed Event-Based Internet of Things. 844-852 - Xuxin Tang, Fan Zhang, Xiu Li, Samee U. Khan, Zhijiang Li:
Quantifying Cloud Elasticity with Container-Based Autoscaling. 853-860
PICom Short Papers
- Inmaculada Ayala, Mercedes Amor, Lidia Fuentes, Daniel-Jesus Munoz:
An Empirical Study of Power Consumption of Web-Based Communications in Mobile Phones. 861-866 - Xiu Li, Lulu Xie, Fan Zhang, Huimin Wang:
Online Deceptive Product Review Detection Leveraging Word Embedding. 867-870 - Wesam Fadheel, Mohamed Abusharkh, Ikhlas Abdel-Qader:
On Feature Selection for the Prediction of Phishing Websites. 871-876 - Mohammad Kayes Kaykobad, Praveen Madiraju, Sheikh Iqbal Ahamed:
Ring: Should I Interrupt or Not? - A Mobile Interruption Management System. 877-882 - Yueng DeLaHoz, Miguel A. Labrador:
A Deep-Learning-Based Floor Detection System for the Visually Impaired. 883-888
PICom Poster Papers
- Marcela Mayumi Mauricio Yagui, Luís Fernando Monsores Passos Maia, Jonice Oliveira, Adriana S. Vivacqua:
Curation of Physical Objects in Botany: Architecture and Development of a Linked Open Data-Based Application. 889-892 - Xuming Lin, Ruifang Liu, Wenmei Hu, Yameng Li, Xin Zhou, Xiao-Xin He:
A Deep Convolutional Network Demodulator for Mixed Signals with Different Modulation Types. 893-896 - José Fernando Basso Brancalion, Karl Heinz Kienitz:
Threat Evaluation of Aerial Targets in an Air Defense System Using Bayesian Networks. 897-900
DataCom Regular Papers
- Rajendra Rana Bhat, Vivek Viswanath, Xiaolin Li:
DeepCancer: Detecting Cancer via Deep Generative Learning Through Gene Expressions. 901-908 - Chen-Chun Chen, Yu-Tung Hasio, Chan-Yi Lin, Shihyu Lu, Hsin-Tse Lu, Jerry Chou:
Using Deep Learning to Predict and Optimize Hadoop Data Analytic Service in a Cloud Platform. 909-916 - Dong Wang, Qian Liu, Zhu Xiao, Jie Chen, Yourong Huang, Weiwei Chen:
Understanding Travel Behavior of Private Cars via Trajectory Big Data Analysis in Urban Environments. 917-924 - Shuo Yu, Feng Xia, Kaiyuan Zhang, Zhaolong Ning, Jiaofei Zhong, Chengfei Liu:
Team Recognition in Big Scholarly Data: Exploring Collaboration Intensity. 925-932 - César Piñeiro, José Manuel Abuín, Juan Carlos Pichel:
Perldoop2: A Big Data-Oriented Source-to-Source Perl-Java Compiler. 933-940 - Jonathan Wang, Kesheng Wu, Alex Sim, Seongwook Hwangbo:
Convolutional Filtering for Accurate Signal Timing from Noisy Streaming Data. 941-948 - Mohammad H. Ahmadi, Vahid Haghighatdoost:
General Time-Dependent Sequenced Route Queries in Road Networks. 949-956 - Janardhanan P. S. Nair, Philip Samuel:
Analysis and Modeling of Resource Management Overhead in Hadoop YARN Clusters. 957-964 - Zuqiang Ke, Nohpill Park:
Availability Modeling and Assurance of Map-Reduce Computing. 965-970 - Hyeon-Ji Baek, Eui-Nam Huh:
A Data-Driven Resource Allocation Method for Personalized Container Based Desktop as a Service. 971-978 - Danilo Gligoroski, Katina Kralevska, Rune Erlend Jensen, Per Simonsen:
Repair Duality with Locally Repairable and Locally Regenerating Codes. 979-984 - Sami Al Ghamdi, Giuseppe Di Fatta:
Efficient Parallel K-Means on MapReduce Using Triangle Inequality. 985-992 - Yuan Cao, Yao Liang:
Facilitating Reproducible Computing via Scientific Workflows for Modelling and Data Integration. 993-1000 - Zhipeng Gao, Yang Zhao, Kun Niu, Yidan Fan:
A High-Dimensional Outlier Detection Algorithm Base on Relevant Subspace. 1001-1008 - Xiaopeng Zhang, Hui Zhang, Rui Liu, Yong Chen, Zhiwen Ye:
Discriminatively Local Hashing for Preserving Semantic Manifold. 1009-1016 - Elahe Naserian, Xinheng Wang, Xiaolong Xu, Yuning Dong, Nektarios Georgalas, Kaizhu Huang:
Integrated Discovery of Location Prediction Rules in Mobile Environment. 1017-1024 - Gladys E. Carrillo, Cristina L. Abad:
Inferring Workflows with Job Dependencies from Distributed Processing Systems Logs. 1025-1030 - Scott Coyne, Praveen Madiraju, Joseph Coelho:
Forecasting Stock Prices Using Social Media Analysis. 1031-1038 - Filipe Fernandes Miranda, Álvaro Figueira:
Automatically Finding Matches Between Social Media Posts and News Articles. 1039-1046 - Ruriko Kudo, Miki Enoki, Akihiro Nakao, Shu Yamamoto, Saneyasu Yamaguchi, Masato Oguchi:
Real-Time Event Search Corresponding to Place and Time Using Social Stream. 1047-1053 - Hassan Alzahrani, Philippe Duverger, Nam P. Nguyen:
Contextual Polarity and Influence Mining in Online Social Networks. 1054-1061 - Dejang Liu:
Analysis of Projected 2024 Employment Based on Current Computer Science Graduates in U.S. 1062-1067 - Rami Ibrahim, M. Omair Shafiq:
On the Measurement and Analysis of Safety in a Large City. 1068-1075 - Ramya Nagarajan, Lin Li:
Optimizing NBA Player Selection Strategies Based on Salary and Statistics Analysis. 1076-1083 - Keerthika Koka, Shiaofen Fang:
Online Review Analysis by Visual Feature Selection. 1084-1091 - Zhengxin Chen:
Exploring Dynamic Granules for Time-Varying Big Data. 1092-1097 - Shaikh Arifuzzaman, Bikesh Pandey:
Scalable Mining and Analysis of Protein-Protein Interaction Networks. 1098-1105 - Yasser Abduallah, Jason T. L. Wang:
A Time-Delayed Information-Theoretic Approach to the Reverse Engineering of Gene Regulatory Networks Using Apache Spark. 1106-1113 - Aryan Azimzadeh, Nasseh Tabrizi:
A Dynamic Power Management Schema for Multi-tier Data Centers. 1114-1118 - Zhipeng Gao, Yidan Fan, Kun Niu, Ting Wang:
An Adaptive Initial Cluster Centers Selection Algorithm for High-Dimensional Partition Clustering. 1119-1126 - Yupeng Yan, Manu Sethi, Anand Rangarajan, Sanjay Ranka:
Super-Scalable Computation Framework for Automated Terrain Identification. 1127-1134 - Nevena Golubovic, Angad Gill, Chandra Krintz, Rich Wolski:
CENTAURUS: A Cloud Service for K-Means Clustering. 1135-1142 - Ming-Hung Chen, Wei-Min Wang, I-Hsin Chung, Cheng-Fu Chou:
Incremental Hybrid SDN Deployment for Enterprise Networks. 1143-1149 - Mingzhu Deng, Songping Yu, Nong Xiao, Fang Liu, Zhiguang Chen:
DR-Update: A Dual-Level Relay Scheme in Erasure-Coded Storage Systems for Balanced Updates. 1150-1159 - Jianqiang Zeng, Nong Xiao, Fang Liu, Lingyu Zhu, Yang Li, Yuxuan Xing, Shuo Li:
PTree: Direct Lookup with Page Table Tree for NVM File Systems. 1160-1167 - Sanjay Patel, Ramji M. Makwana:
Existing and Relevant Methodologies for Energy Efficient Cloud Data Centers. 1168-1173 - Xiaoying Zheng, Ye Xia:
A Scalable Fair Heterogeneous Resource Allocation Scheme in Distributed Systems. 1174-1179 - Xunchao Chen, Jun Wang, Jian Zhou:
Promoting MLC STT-RAM for the Future Persistent Memory System. 1180-1185 - Yang Li, Fang Liu, Nong Xiao, Songping Yu, Shuo Li, Yuxuan Xing:
File System for Non-volatile Main Memories: Performance Testing and Analysis. 1186-1193 - Thanos Gentimis, Ala' J. Alnaser, Alex Durante, Kyle Cook, Robert Steele:
Predicting Hospital Length of Stay Using Neural Networks on MIMIC III Data. 1194-1201 - Debasis Das:
Distributed Algorithm for Geographic Opportunistic Routing in VANETs at Road Intersection. 1202-1209
DataCom Invited Full Papers
- Hong Yu, Yahong Lian, Xiujuan Xu, Xiaowei Zhao:
Mixture Self-Paced Learning for Multi-view K-Means Clustering. 1210-1215 - Da Zhang, Mansur R. Kabuka:
Combining Weather Condition Data to Predict Traffic Flow: A GRU Based Deep Learning Approach. 1216-1219 - Weishan Zhang, Hao Lv, Liang Xu, Yan Liu, Xin Liu, Qinghua Lu, Zhongwei Li, Jiehan Zhou:
An Online-Offline Combined Big Data Mining Platform. 1220-1225 - Linlin Tian, Mingchu Li, Hong Yu, Xing Jin:
Attribute-Based Partner Updating Boosts Cooperation in Social P2P Systems. 1226-1231 - Lu Li, Wei Wang, Shuo Yu, Liangtian Wan, Zhenzhen Xu, Xiangjie Kong:
A Modified Node2vec Method for Disappearing Link Prediction. 1232-1235
DataCom Short Papers
- Juan Li, Nong Xiao, Yutong Lu, Zhiguang Chen, Fang Liu, Yuxuan Xing, Shuo Li:
Review on HDD-Based, SSD-Based and Hybrid Key-Value Stores. 1236-1241 - Usha Ananthakumar, Ratul Sarkar:
Application of Logistic Regression in Assessing Stock Performances. 1242-1247 - Yuankun Shi, Kevin Long, Kaushik Balasubramanian, Bianny Bian, Adam Procter, Ramesh Illikkal:
DeepSim: Cluster Level Behavioral Simulation Model for Deep Learning. 1248-1253 - Zheng Feng, Rajendra Rana Bhat, Xiaoyong Yuan, Daniel Freeman, Tezcan Baslanti, Azra Bihorac, Xiaolin Li:
Intelligent Perioperative System: Towards Real-Time Big Data Analytics in Surgery Risk Assessment. 1254-1259 - Soham Das:
Seed Node Distribution for Influence Maximization in Multiple Online Social Networks. 1260-1264 - Prasanta Saikia, James She:
Effective Mobile Notification Recommendation Using Social Nature of Locations. 1265-1270 - Nuno Ricardo Pinheiro da Silva Guimaraes, Álvaro Pedro de Barros Borges Reis Figueira:
Building a Semi-Supervised Dataset to Train Journalistic Relevance Detection Models. 1271-1277 - Munir Majdalawieh, Farhi Marir, Issam Tlemsani:
Developing Adaptive Islamic Law Business Processes Models for Islamic Finance and Banking by Text Mining the Holy Qur'an and Hadith. 1278-1283
DataCom Poster Papers
- Yuhang Wang, Hui Zhao, Xian Zhang, Jimin Liang:
A Big Aurora Data Management Framework Toward Aurora Classification. 1284-1287 - Yong-Hyun Kim, Eui-Nam Huh:
Towards the Design of a System and a Workflow Model for Medical Big Data Processing in the Hybrid Cloud. 1288-1291 - Yan-Xia Lin:
Mining the Statistical Information of Confidential Data from Noise-Multiplied Data. 1292-1297 - Sabah Al-Fedaghi, Haya Alahmad:
Orientation in Conceptual Modeling Frameworks. 1298-1303 - Sheng-De Wang, Kuan-Jung Chiang:
BLE Tree Networks for Sensor Devices in Internet of Things. 1304-1309 - Shin-Ying Huang, Ya-Yun Peng, Fang Yu:
A Parallel Majority Learning Algorithm for Anomaly Detection. 1310-1313 - Edouard Ngor Sarr, Ousmane Sall:
Automation of Fact-Checking: State of the Art, Obstacles and Perspectives. 1314-1317 - Lucy Nwosu, Hui Wang, Jiang Lu, Ishaq Unwala, Xiaokun Yang, Ting Zhang:
Deep Convolutional Neural Network for Facial Expression Recognition Using Facial Parts. 1318-1321 - Komal Khalid, Hammad Afzal, Faiza Moqaddas, Naima Iltaf, Ahmed Muqeem Sheri, Raheel Nawaz:
Extension of Semantic Based Urdu Linguistic Resources Using Natural Language Processing. 1322-1325
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.