


default search action
21st ICA3PP 2021 [virtual] - Part I
- Yongxuan Lai
, Tian Wang
, Min Jiang
, Guangquan Xu
, Wei Liang
, Aniello Castiglione
:
Algorithms and Architectures for Parallel Processing - 21st International Conference, ICA3PP 2021, Virtual Event, December 3-5, 2021, Proceedings, Part I. Lecture Notes in Computer Science 13155, Springer 2022, ISBN 978-3-030-95383-6
Deep Learning Models and Applications
- Chunyan Diao, Dafang Zhang, Wei Liang
, Kuan-Ching Li
, Man Jiang:
CRFST-GCN: A Deeplearning Spatial-Temporal Frame to Predict Traffic Flow. 3-17 - Jin Zhang, Meng Luo, Cheng Sun, Peiqi Qu:
BFR-RetinaNet: An Improved RetinaNet Model for Vehicle Detection in Aerial Images. 18-32 - Meihong Wang
, Han Li, Linling Qiu:
Learning Knowledge Graph Embeddings by Multi-Attention Mechanism for Link Prediction. 33-49 - Caizheng Liu
, Houquan Zhou, Zhi Sun, Guangfan Cui:
GlowImp: Combining GLOW and GAN for Multivariate Time Series Imputation. 50-64 - Xuedong Ding, Minghua Zhu, Bo Xiao:
Accurate Indoor Localization Using Magnetic Sequence Fingerprints with Deep Learning. 65-84 - Yan Chu
, Haozhuang Li, Hui Ning, Qingchao Zhao:
Wasserstein Graph Auto-Encoder. 85-99 - Shi Chen
, Sheng Wu
, Licai Zhu
, Hao Yang
:
Fine-Grained Activity Recognition Based on Features of Action Subsegments and Incremental Broad Learning. 100-114 - Yan Wang, Gang Cui, Junqiang Zhou, Zhiheng Han:
ADFA-LSTM: An Abnormal Trajectory Prediction Method Based on Bionic Neural Network. 115-128 - Wei Ding, Haokai Hong, Dejun Xu, Min Jiang
:
Online Multiple Object Tracking Algorithm Based on Heat Map Propagation. 129-143
Software Systems and Efficient Algorithms
- Xiaorui Wu, Gang Xu, Xinyu Hao, Baoqi Huang, Xiangyu Bai:
Spatio-Temporal Topology Routing Algorithm for Opportunistic Network Based on Self-attention Mechanism. 147-161 - Chengyu Wang, Tao Yang, Jinhua Cui, Yu Li, Tongqing Zhou, Zhiping Cai:
TSAEns: Ensemble Learning for KPI Anomaly Detection. 162-177 - Mingyuan Fan, Jia-Li Yin, Ximeng Liu, Wenzhong Guo:
Towards Transferable Adversarial Examples Using Meta Learning. 178-192 - Jianwen Ding, Fan Lin, Shengbo Lv:
Temporal Convolution Network Based on Attention for Intelligent Anomaly Detection of Wind Turbine Blades. 193-209 - Xiang Li, Yawei Zhao, Donghui Li, Wei Guan:
Error Serial Episodes Discovery from Mobile Payment Log in Distributed ETC. 210-221 - Shuo Zhang, Guangping Xu, Yulei Jia, Yanbing Xue, Wenguang Zheng:
Parallel Cache Prefetching for LSM-Tree Based Store: From Algorithm to Evaluation. 222-236 - Runbin Xie, Jianxun Liu, Guosheng Kang, Buqing Cao, Yiping Wen, Jiayan Xiang:
A Hybrid TLBO-TS Algorithm Based Mobile Service Selection for Composite Services. 237-256 - Jinbin Zhu, Limin Xiao, Liang Wang, Guangjun Qin, Rui Zhang, Yuting Liu, Zhonglin Liu:
UPM-DMA: An Efficient Userspace DMA-Pinned Memory Management Strategy for NVMe SSDs. 257-270 - Jiaxin Ye, Dejun Xu, Haokai Hong, Yongxuan Lai, Min Jiang
:
AHOA: Adaptively Hybrid Optimization Algorithm for Flexible Job-shop Scheduling Problem. 271-287 - Yu Wang
, Zhipeng Yu
, Licai Zhu
, Hao Yang
:
Trace-Navi: A High-Accuracy Indoor Navigation System Based on Real-Time Activity Recognition and Discrete Trajectory Calibration. 288-303 - Yonghao Zhao
, Yanhui Ji
, Licai Zhu
, Hao Yang
:
Iterative Filling Incomplete Fingerprint Map Based on Multi-directional Signal Propagation in Large-Scale Scene. 304-318 - Suiming Guo
, Pengcheng Zhang
, Qianrong Shen
:
Dynamic Adjustment Policy of Search Driver Matching Distance via Markov Decision Process. 319-335 - Jingyu Liu, Dunbo Zhang, Qiong Wang, Li Shen:
A Multi-precision Quantized Super-Resolution Model Framework. 336-353 - Yuejin Cai, Jianguo Wei
, Qingzhi Hou, Ruixue Gao:
An Optimized GPU Implementation of Weakly-Compressible SPH Using CUDA-Based Strategies. 354-369 - Juan Fang, Haoyan Zhao, Jiayue Zhang, Jiamei Shi:
A Heterogeneous Multi-core Network-on-Chip Mapping Optimization Algorithm. 370-384 - Baokang Zhao, Murao Lin, Ziling Wei, Qin Xin, Jinshu Su:
A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-Grained Classification. 385-401 - Zhongyu Liang
, Xiaoqiang Di
, Zhen Liu, Xu Liu, Xingxu Zhang, Zhi Yu:
Predicting Students' Academic Performance Based on Improved PSO-Xgboost: A Campus Behavior Perspective. 402-421 - Yuzheng Dong, Yanfeng Zhao, Ziyue Wang, Juan He, Liubin Zhu:
Motion-Sequence Authentication System: Guard for Smart Phones. 422-441
Edge Computing and Edge Intelligence
- Chenxi Li, Guanghui Li, Shihong Hu, Chenglong Dai, Dong Li:
Joint Optimization Scheme of Multi-service Replication and Request Offloading in Mobile Edge Computing. 445-459 - Qian Wei, Tao Ouyang, Zhi Zhou, Xu Chen:
Flying MEC: Online Task Offloading, Trajectory Planning and Charging Scheduling for UAV-Assisted MEC. 460-475 - Yongqiang Gao, Yanping Wang:
Multiple Workflows Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing. 476-493 - Wei Zhou, Chuangwei Lin, Jirun Duan, Ke Ren, Xuyun Zhang
, Wanchun Dou:
An Optimized Greedy-Based Task Offloading Method for Mobile Edge Computing. 494-508 - Yongqiang Gao, Xiaolei Liu:
Location Aware Workflow Migration Based on Deep Reinforcement Learning in Mobile Edge Computing. 509-528 - Zhaobo Lu, Jin Wang, Jingya Zhou, Jianping Wang, Kejie Lu:
Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing Against Collusion Attack. 529-548 - Shangxuan Cai, Yunfeng Zhao, Zhicheng Liu, Chao Qiu, Xiaofei Wang, Qinghua Hu:
MGFL: Multi-granularity Federated Learning in Edge Computing Systems. 549-563 - Jiaying Yin
, Jing Fu
, Jingjin Wu
, Shiming Zheng
:
Energy Efficient Priority-Based Task Scheduling for Computation Offloading in Fog Computing. 564-577 - Ping Zhong
, Bolei Chen
, Yongzheng Cui, Hanchen Song, Yu Sheng:
Space-Heuristic Navigation and Occupancy Map Prediction for Robot Autonomous Exploration. 578-594
Service Dependability and Security Algorithms
- Gangsheng Ren, Yang Zhang, Shukui Zhang, Hao Long:
Edge DDoS Attack Detection Method Based on Software Defined Networks. 597-611 - Guanghui Tong, Gaolei Li, Jun Wu, Jianhua Li:
GradMFL: Gradient Memory-Based Federated Learning for Hierarchical Knowledge Transferring Over Non-IID Data. 612-626 - Yingyao Yang, Jin Wang, Kejie Lu, Jianping Wang, Zhaobo Lu:
Linear Coded Federated Learning. 627-644 - Haitang Lu, Jie Chen, Kai Zhang:
Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-Assisted E-Healthcare Systems. 645-659 - Zhiqiang Xie, Yingxiao Xiang, Yike Li, Shuang Zhao, Endong Tong, Wenjia Niu, Jiqiang Liu, Jian Wang:
Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning. 660-675 - Mande Xie, Qiting Zhao, Haibo Hong:
A Blockchain-Based Proxy Oriented Cloud Storage Public Audit Scheme for Low-Performance Terminal Devices. 676-692 - Yepeng Ding
, Hiroyuki Sato
:
Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public Blockchains. 693-709 - Linghe Zhu, Haibo Hong, Mande Xie:
A Novel Protection Method of Continuous Location Sharing Based on Local Differential Privacy and Conditional Random Field. 710-725 - Yingming Zeng, Liyu Deng, Haibin Zhang:
An Intelligent Allocation Mechanism Based on Ethereum Blockchain in Microgrid. 726-740
Data Science
- Boyu Zhang, Yang Du, He Huang, Yu-E Sun, Guoju Gao, Xiaoyu Wang, Shiping Chen:
Multi-layer Adaptive Sampling for Per-Flow Spread Measurement. 743-758 - Yang Li, Qianmu Li, Shunmei Meng, Jun Hou:
Transformer-Based Rating-Aware Sequential Recommendation. 759-774 - Zhengyuan Xue
:
An Effective Single-Pass Approach for Estimating the Φ-quantile in Data Streams. 775-789 - Wenjie Xiao, Xuehai Tang, Biyu Zhou, Wang Wang, Yangchen Dong, Liangjun Zang, Jizhong Han, Songlin Hu:
Fed-Tra: Improving Accuracy of Deep Learning Model on Non-iid in Federated Learning. 790-803

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.