default search action
ICA3PP 2019: Melbourne, VIC, Australia
- Sheng Wen, Albert Y. Zomaya, Laurence T. Yang:
Algorithms and Architectures for Parallel Processing - 19th International Conference, ICA3PP 2019, Melbourne, VIC, Australia, December 9-11, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11945, Springer 2020, ISBN 978-3-030-38960-4
Parallel and Distributed Architectures
- Wei Li, Shengjie Hu, Di Wang, Tianba Chen, Yunchun Li:
SPM: Modeling Spark Task Execution Time from the Sub-stage Perspective. 3-10 - Zehui Jin, Ming Dun, Xin You, Hailong Yang, Yunchun Li, Yingchun Lin, Zhongzhi Luan, Depei Qian:
Improving the Parallelism of CESM on GPU. 11-18 - Roman Snytsar, Yatish Turakhia:
Parallel Approach to Sliding Window Sums. 19-26 - Yu Tang, Lujia Yin, Zhaoning Zhang, Dongsheng Li:
Rise the Momentum: A Method for Reducing the Training Error on Multiple GPUs. 27-41 - Jianqiang Huang, Wei Qin, Xiaoying Wang, Wenguang Chen:
Pimiento: A Vertex-Centric Graph-Processing Framework on a Single Machine. 42-56
Software Systems and Programming Models
- Tao Sun, Xiaoyun Wan, Wenjie Zhong, Xin Guo, Ting Zhang:
Parallel Software Testing Sequence Generation Method Target at Full Covering Tested Behaviors. 59-67 - Hongchao Du, Rui Wang, Zhaoyan Shen, Zhiping Jia:
Accurate Network Flow Measurement with Deterministic Admission Policy. 68-81 - Yuanyuan Sun, Lele Xu, Lili Guo, Ye Li, Yongming Wang:
A Comparison Study of VAE and GAN for Software Fault Prediction. 82-96 - Soumia Benkrid, Ladjel Bellatreche:
A Framework for Designing Autonomous Parallel Data Warehouses. 97-104
Distributed and Parallel and Network-based Computing
- Jieying Zhou, Pengfei He, Yinglin Liu, Weigang Wu:
Stable Clustering Algorithm for Routing Establishment in Vehicular Ad-Hoc Networks. 107-115 - Chunxiao Liu, Huilin Wang, Yanfeng Wang, Dawei Sun:
Utility-Based Location Distribution Reverse Auction Incentive Mechanism for Mobile Crowd Sensing Network. 116-127 - Meng Meng, Ruijuan Zheng, Mingchuan Zhang, Junlong Zhu, Qingtao Wu:
Safeguarding Against Active Routing Attack via Online Learning. 128-134 - E. Cao, Saira Musa, Jianning Zhang, Mingsong Chen, Tongquan Wei, Xin Fu, Meikang Qiu:
Reliability Aware Cost Optimization for Memory Constrained Cloud Workflows. 135-150 - Xuemeng Zhai, Wanlei Zhou, Gaolei Fei, Hangyu Hu, Youyang Qu, Guangmin Hu:
Null Model and Community Structure in Heterogeneous Networks. 151-163
Big Data and Its Applications
- Zhuo Tian, Yifeng Chen, Lei Zhang:
An Asynchronous Algorithm to Reduce the Number of Data Exchanges. 167-174 - Ying Xia, Hanyu Huang:
Two-Stage Clustering Hot Event Detection Model for Micro-blog on Spark. 175-183 - Jia Xu, Xuejun Li, Xiao Liu, Chong Zhang, Lingmin Fan, Lina Gong, Juan Li:
Mobility-Aware Workflow Offloading and Scheduling Strategy for Mobile Edge Computing. 184-199 - Jiazhao Sun, Yunchun Li, Hailong Yang:
HSPP: Load-Balanced and Low-Latency File Partition and Placement Strategy on Distributed Heterogeneous Storage with Erasure Coding. 200-214 - Srikanth Thudumu, Philip Branch, Jiong Jin, Jugdutt Jack Singh:
Adaptive Clustering for Outlier Identification in High-Dimensional Data. 215-228 - Amira Rayane Benamer, Hana Teyeb, Nejib Ben Hadj-Alouane:
Penguin Search Aware Proactive Application Placement. 229-244 - Zhipeng Gao, Xinyue Zheng, Kaile Xiao, Qian Wang, Zijia Mo:
A Data Uploading Strategy in Vehicular Ad-hoc Networks Targeted on Dynamic Topology: Clustering and Cooperation. 245-260 - Li Ruan, Yu Bai, Limin Xiao:
Cloud Server Load Turning Point Prediction Based on Feature Enhanced Multi-task LSTM. 261-266
Distributed and Parallel Algorithms
- Pengnian Qi, Jing Wang, Xiaoyan Zhu, Weigong Zhang:
Neuron Fault Tolerance Capability Based Computation Reuse in DNNs. 269-276 - Keyao Li, Jing Wang, Xin Fu, Xiufeng Sui, Weigong Zhang:
Reliability Enhancement of Neural Networks via Neuron-Level Vulnerability Quantization. 277-285 - Xiahao Zhang, Yi Zhuang:
A Fault Detection Algorithm for Cloud Computing Using QPSO-Based Weighted One-Class Support Vector Machine. 286-304 - Hansheng Wei, Xin Ye, Jianqi Shi, Yanhong Huang:
ParaMoC: A Parallel Model Checker for Pushdown Systems. 305-312 - Yimu Ji, Houzhi Fang, Haichang Yao, Jing He, Shuai Chen, Kui Li, Shangdong Liu:
FastDRC: Fast and Scalable Genome Compression Based on Distributed and Parallel Processing. 313-319 - Xing Zhu, Yunfei Du:
A Parallel Approach to Advantage Actor Critic in Deep Reinforcement Learning. 320-327
Applications of Distributed and Parallel Computing
- Akash Suresh Patil, Rafik Hamza, Hongyang Yan, Alzubair Hassan, Jin Li:
Blockchain-PUF-Based Secure Authentication Protocol for Internet of Things. 331-338 - Imene Bareche, Ying Xia:
Selective Velocity Distributed Indexing for Continuously Moving Objects Model. 339-348 - Tengyu Liu, Jingguo Ge, Yulei Wu, Bowei Dai, Liangxiong Li, Zhongjiang Yao, Jifei Wen, Hongbin Shi:
A New Bitcoin Address Association Method Using a Two-Level Learner Model. 349-364 - Walaa Alajali, Shang Gao, Abdulrahman D. Alhusaynat:
Fog Computing Based Traffic and Car Parking Intelligent System. 365-380
Service Dependability and Security
- Yuanyuan Sun, Lili Guo, Ye Li, Lele Xu, Yongming Wang:
Semi-supervised Deep Learning for Network Anomaly Detection. 383-390 - Chenjian Duan, Zhen Wang, Hong Ding, Mengting Jiang, Yizhi Ren, Ting Wu:
A Vulnerability Assessment Method for Network System Based on Cooperative Game Theory. 391-398 - Ikram Ul Haq, Iqbal Gondal, Peter Vamplew:
Enhancing Model Performance for Fraud Detection by Feature Engineering and Compact Unified Expressions. 399-409 - Jieying Zhou, Pengfei He, Rongfa Qiu, Weigang Wu:
Network Intrusion Detection Framework Based on Embedded Tree Model. 410-417 - Stella Ho, Youyang Qu, Longxiang Gao, Jianxin Li, Yong Xiang:
Generative Adversarial Nets Enhanced Continual Data Release Using Differential Privacy. 418-426 - Qi Zhou, Yizhi Ren, Tianyu Xia, Lifeng Yuan, Linqiang Chen:
Data Poisoning Attacks on Graph Convolutional Matrix Completion. 427-439 - Fuyou Zhang, Saiyu Qi, Haoran Yuan, Meng Zhang:
Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing. 440-455 - Junchao Xiao, Hao Wu, Xiangxue Li, Yuan Linghu:
Practical IDS on In-vehicle Network Against Diversified Attack Models. 456-466 - Si Li, Yanchao Zhao, Chengyong Liu:
Ultragloves: Lowcost Finger-Level Interaction System for VR-Applications Based on Ultrasonic Movement Tracking. 467-481 - Xinyu Zhan, Mingsong Chen, Shui Yu, Yue Zhang:
Adaptive Detection Method for Packet-In Message Injection Attack in SDN. 482-495 - Jingjing Bao, Hua Dai, Maohu Yang, Xun Yi, Geng Yang, Liang Liu:
PMRS: A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. 496-511 - Zuobin Ying, Wenjie Jiang, Ximeng Liu, Maode Ma:
Privacy-Preserving Fine-Grained Outsourcing PHR with Efficient Policy Updating. 512-520 - Zuobin Ying, Shuanglong Cao, Peng Zhou, Shun Zhang, Ximeng Liu:
Lightweight Outsourced Privacy-Preserving Heart Failure Prediction Based on GRU. 521-536 - Zhaoyang Wang, Qingqi Pei, Xuefeng Liu, Lichuan Ma, Huizhong Li, Shui Yu:
DAPS: A Decentralized Anonymous Payment Scheme with Supervision. 537-550 - Jinnan Guo, Keke Gai, Liehuang Zhu, Zijian Zhang:
An Approach of Secure Two-Way-Pegged Multi-sidechain. 551-564
IoT and CPS Computing
- Siye Wang, Mengnan Cai, Qinxuan Wu, Yijia Jin, Xinling Shen, Yanfang Zhang:
DCRRDT: A Method for Deployment and Control of RFID Sensors Under Digital Twin-Driven for Indoor Supervision. 567-576 - Yang Zhang, Qianqian Ren, Yu Pan, Jinbao Li:
A Binary Code Sequence Based Tracking Algorithm in Wireless Sensor Networks. 577-583 - Mingkai Lin, Wenzhong Li, Cam-Tu Nguyen, Xiaoliang Wang, Sanglu Lu:
Sampling Based Katz Centrality Estimation for Large-Scale Social Networks. 584-598 - Gaolei Fei, Yang Liu, Yong Cheng, Fucai Yu, Guangmin Hu:
Location Prediction for Social Media Users Based on Information Fusion. 599-612
Performance Modelling and Evaluation
- Tao Sun, Jing Zhang, Wenjie Zhong:
Concurrent Software Fine-Coarse-Grained Automatic Modeling Method for Algorithm Error Detection. 615-623 - Shuo Li, Mingzhu Deng, Fang Liu, Zhiguang Chen, Nong Xiao:
EC-ARR: Using Active Reconstruction to Optimize SSD Read Performance. 624-641 - Feng Ye, Zihao Liu, Songjie Zhu, Peng Zhang, Yong Chen:
Research of Benchmarking and Selection for TSDB. 642-655 - Yiming Ji, Ce Yu, Jian Xiao, Shanjiang Tang, Hao Wang, Bo Zhang:
HDF5-Based I/O Optimization for Extragalactic HI Data Pipeline of FAST. 656-672 - Jiangsu Du, Xin Zhu, Nan Hu, Yunfei Du:
Understanding the Resource Demand Differences of Deep Neural Network Training. 673-681 - Gaolei Fei, Yong Cheng, Yang Liu, Zhuo Liu, Guangmin Hu:
Twitter Event Detection Under Spatio-Temporal Constraints. 682-694
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.