


default search action
38th IPCCC 2019: London, UK
- 38th IEEE International Performance Computing and Communications Conference, IPCCC 2019, London, United Kingdom, October 29-31, 2019. IEEE 2019, ISBN 978-1-7281-1025-7
- Yifeng Cao, Zhe Wang, Linghe Kong
, Guihai Chen
:
reZig: Decompose a Collision via Reference Waveform in ZigBee. 1-2 - Mohammed Alghamdi, Ligang He, Yujue Zhou
, Junyu Li:
Developing the Parallelization Methods for Finding the All-Pairs Shortest Paths in Distributed Memory Architecture. 1-8 - Chang Liu, Liang Dai, Wenjing Cui, Tao Lin:
A Byte-level CNN Method to Detect DNS Tunnels. 1-8 - Lu Pang, Anis Alazzawe, Krishna Kant, Jeremy Swift:
Data Heat Prediction in Storage Systems Using Behavior Specific Prediction Models. 1-8 - Haoran Xu
, Yuqing Sun
, Xiangjun Li:
Mining Cross-platform User Behaviors for Demographic Attribute Inference. 1-2 - Meriem Smache, Alexis Olivereau, Thibault Franco-Rondisson, Assia Tria:
Autonomous Detection of Synchronization Attacks in the Industrial Internet Of Things. 1-9 - Wenxuan He, Gaopeng Gou, Cuicui Kang, Chang Liu, Zhen Li, Gang Xiong:
Malicious Domain Detection via Domain Relationship and Graph Models. 1-8 - Mingyu Zhai, Aibo Song, Jingyi Qiu, Xuechun Ji, Qingxi Wu:
Query optimization Approach with Shuffle Intermediate Cache Layer for Spark SQL. 1-6 - Qianqian Fan, David J. Lilja, Sachin S. Sapatnekar:
Using DCT-based Approximate Communication to Improve MPI Performance in Parallel Clusters. 1-10 - Minghao Jiang, Gaopeng Gou, Junzheng Shi, Gang Xiong
:
I Know What You Are Doing With Remote Desktop. 1-7 - Zexun Jiang, Hao Yin, Yan Luo, Jiaying Gong, Yuannan Yang, Manshan Lin:
Quantitative Analysis of Mobile Application User Interface Design. 1-8 - Martina Cilia, Keisuke Yamamoto:
Intelligent IoT Sensing System Based on Compressive Sensing with Adaptively Learned Dictionary. 1-8 - Danlin Jia, Janki Bhimani, Son Nam Nguyen, Bo Sheng, Ningfang Mi:
ATuMm: Auto-tuning Memory Manager in Apache Spark. 1-8 - Chuan Yu
, Shuhui Chen:
On Effects of Mobility Management Signalling Based DoS Attacks Against LTE Terminals. 1-8 - Mohammed Maray
, Arshad Jhumka, Adam P. Chester, Mohamed F. Younis
:
Scheduling Dependent Tasks in Edge Networks. 1-4 - Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi, Carsten Griwodz:
A Deep Learning Approach to Dynamic Passive RTT Prediction Model for TCP. 1-10 - Antonio Franco, Emma Fitzgerald, Björn Landfeldt, Ulf Kömer:
Reliability, timeliness and load reduction at the edge for cloud gaming. 1-8 - Xi Zhu, Siguang Chen, Songle Chen, Geng Yang:
Energy and Delay Co-aware Computation Offloading with Deep Learning in Fog Computing Networks. 1-6 - Yibin Xu
, Yangyu Huang
:
Contract-connection: An efficient communication protocol for Distributed Ledger Technology. 1-4 - Kemeng Wu, Yongzheng Zhang, Tao Yin:
CLR: A Classification of DNS Tunnel Based on Logistic Regression. 1 - Jianguo Jiang, Qilei Yin, Zhixin Shi, Meimei Li, Bin Lv:
A New C&C Channel Detection Framework Using Heuristic Rule and Transfer Learning. 1-9 - Qihang Bing, Ruobing Jiang, Feng Hong:
Exploiting Social Network Characteristics for Efficient Routing in Ocean Vessel Ad Hoc Networks. 1-8 - Steffen Haas, Florian Wilkens, Mathias Fischer:
Efficient Attack Correlation and Identification of Attack Scenarios based on Network-Motifs. 1-11 - Hua Fan, Kelin Zhang, Yuanjun Cen, Kaung Oo Htet, Hadi Heidari
, Weiping Cheng, Yang Li, Quanyuan Feng, Hongrui Che, Xuanhong Zeng, Haizhu Wang, Hongquan Wang, Dagang Li:
High-Precision Adaptive Slope Compensation Circuit for System-on-Chip Power Management. 1-2 - Dongzheng Jia, Limin Liu, Shijie Jia, Jingqiang Lin:
VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts. 1-9 - Pascal A. Schirmer, Iosif Mporas:
Integration of Temporal Contextual Information for Robust Energy Disaggregation. 1-6 - Truong Thao Nguyen
, Mohamed Wahib, Ryousei Takano:
Topology-aware Sparse Allreduce for Large-scale Deep Learning. 1-8 - Erik Sy, Tobias Mueller, Moritz Moennich, Hannes Federrath:
Accelerating QUIC's Connection Establishment on High-Latency Access Networks. 1-8 - Yaowen Zheng, Zhanwei Song, Yuyan Sun, Kai Cheng, Hongsong Zhu, Limin Sun:
An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis. 1-8 - Qiaozhi Xu, Junxing Zhang:
piFogBed: A Fog Computing Testbed Based on Raspberry Pi. 1-8 - Lucien Moor, Lukas Bitter, Miguel de Prado, Nuria Pazos, Nabil Ouerhani
:
IoT meets distributed AI - Deployment scenarios of Bonseyes AI applications on FIWARE. 1-2 - Janki Bhimani, Rajinikanth Pandurangan, Ningfang Mi, Vijay Balakrishnan:
Emulate Processing of Assorted Database Server Applications on Flash-Based Storage in Datacenter Infrastructures. 1-8 - Xiao Yang, Ming Jiang, Chunming Zhao:
LT Codes with Feedback: Accelerate the Distributed Matrix-Vector Multiplication with Stragglers. 1-6 - Abdelwahab Boualouache
, Ridha Soua, Thomas Engel:
VPGA: An SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks. 1-8 - Adita Kulkarni, Anand Seetharam:
QuickR: A Novel Routing Strategy for Wireless Mobile Information-centric Networks. 1-8 - Yinjin Fu, Xiaofeng Qiu, Jian Wang:
F2MC: Enhancing Data Storage Services with Fog-toMultiCloud Hybrid Computing. 1-6 - Anis Alazzawe, Krishna Kant:
Mimic: Fast Recovery from Data Corruption Errors in Stencil Computations. 1-8 - Jianjun Lin, Jianbo Gao, Zhenhao Wu, Chengxiang Si, Bo Sun:
Deanonymizing Tor in a Stealthy Way. 1-8 - Teng Wang, Xinyu Yang, Xuebin Ren, Jun Zhao, Kwok-Yan Lam
:
Adaptive Differentially Private Data Stream Publishing in Spatio-temporal Monitoring of IoT. 1-8 - Jiapeng Huang, Linghe Kong
, Xiao-Yang Liu, Wenhao Qu, Guihai Chen
:
A C++ Library for Tensor Decomposition. 1-2 - Yongbin Sun, Sai Nithin Reddy Kantareddy, Joshua Siegel, Alexandre Armengol-Urpi, Xiaoyu Wu, Hongyu Wang, Sanjay E. Sarma:
Towards Industrial IoT-AR Systems using Deep Learning-Based Object Pose Estimation. 1-8 - Mingli Zhang, Liming Wang, Jing Yang:
A Blockchain-Based Authentication Method with One-Time Password. 1-9 - Yongliang Cheng, Yan Xu, Hong Zhong, Yi Liu:
HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT. 1-7 - Oluyomi Simpson
, Yichuang Sun:
A Stochastic based Physical Layer Security in Cognitive Radio Networks: Cognitive Relay to Fusion Center. 1-7 - Robert Raad, Elie Inaty, Martin Maier:
Improving Latency and Jitter Performance in CDMA-Based Next-Generation Ethernet Passive Optical Networks for 5G Applications. 1-8 - Yujia Liu, Changqing An
:
Cost Efficient Internet Path Tracking Based on Routing Changes Prediction. 1-8 - Praboda Rajapaksha, Reza Farahbakhsh, Noël Crespi, Bruno Defude
:
Uncovering Flaming Events on News Media in Social Media. 1-8 - Yehia Arafa, Gopinath Chennupati, Atanu Barai
, Abdel-Hameed A. Badawy, Nandakishore Santhi
, Stephan J. Eidenbenz:
GPUs Cache Performance Estimation using Reuse Distance Analysis. 1-8 - Shuhan Fan, Songyun Wu, Zhiliang Wang, Zimu Li, Jiahai Yang, Heng Liu, Xinran Liu:
ALEAP: Attention-based LSTM with Event Embedding for Attack Projection. 1-8 - Bing Zhou, Hongqi Yang:
Rendering Scheduling Framework in Edge Computing: A Congestion Game-based Approach. 1-6 - Koosha Zarei, Reza Farahbakhsh, Noël Crespi:
Typification of Impersonated Accounts on Instagram. 1-6 - Christopher Kramer, Kiran Mathews, Reinhard Gotzhein:
Cooperative Fair Bandwidth Scaling in Contention-based Wireless Networks using Time Token Bucket. 1-9 - René Helmke, Jan Bauer, Alexander Bothe, Nils Aschenbruck:
CAN't - An ISOBUS Privacy Proxy for Collaborative Smart Farming. 1-3 - Miaoqing Tian, Ruobing Jiang, Chaoqun Xing, Haipeng Qu, Qian Lu, Xiaoyun Zhou:
Exploiting Temperature-Varied ECU Fingerprints for Source Identification in In-vehicle Network Intrusion Detection. 1-8 - Tanguy Godquin, Morgan Barbier, Chrystel Gaber
, Jean-Luc Grimault, Jean-Marie Le Bars:
Placement optimization of IoT security solutions for edge computing based on graph theory. 1-7 - Jiang Xie, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection. 1-8 - Junfeng Li
, Dan Li, Wenfei Wu, K. K. Ramakrishnan, Jinkun Geng, Fei Gui, Fanzhao Wang, Kai Zheng:
Sphinx: A Transport Protocol for High-Speed and Lossy Mobile Networks. 1-8 - Zhaoxing Wang, Xuehai Tang, Qiuyang Liu, Jizhong Han:
Jily: Cost-Aware AutoScaling of Heterogeneous GPU for DNN Inference in Public Cloud. 1-8 - Tianyu Cui
, Chang Liu, Gaopeng Gou, Junzheng Shi, Gang Xiong:
A Comprehensive Study of Accelerating IPv6 Deployment. 1-8 - Xinlei Fan, Gaopeng Gou, Cuicui Kang, Junzheng Shi, Gang Xiong:
Identify OS from encrypted traffic with TCP/IP stack fingerprinting. 1-7 - Jinghan Jiang, Kui Wu, Huan Wang, Rong Zheng:
Automatic Data Quality Enhancement with Expert Knowledge for Mobile Crowdsensing. 1-7 - Qifeng Yang, Haojiang Deng, Lingfang Wang, Yiqiang Sheng:
An Almost-zero Latency Lightweight Mechanism for Caching Decision in ICN Content Router. 1-8 - Ke Li, Hong Li, Hongsong Zhu, Limin Sun, Hui Wen:
Side-Channel Information Leakage of Traffic Data in Instant Messaging. 1-8 - Junchi Xing, Mingliang Yang, Haifeng Zhou, Chunming Wu, Wei Ruan:
Hiding and Trapping: A Deceptive Approach for Defending against Network Reconnaissance with Software-Defined Network. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.