default search action
40th IPCCC 2021: Austin, TX, USA
- IEEE International Performance, Computing, and Communications Conference, IPCCC 2021, Austin, TX, USA, October 29-31, 2021. IEEE 2021, ISBN 978-1-6654-4331-9
- Saptarshi Bhowmik, Nikhil Jain, Xin Yuan, Abhinav Bhatele:
A Simulation Study of Hardware Parameters for Future GPU-based HPC Platforms. 1-10 - Leonie Reichert, Marcel Pazelt, Björn Scheuermann:
Circuit-based PSI for Covid-19 Risk Scoring. 1-8 - Dominik Scheinert, Houkun Zhu, Lauritz Thamsen, Morgan K. Geldenhuys, Jonathan Will, Alexander Acker, Odej Kao:
Enel: Context-Aware Dynamic Scaling of Distributed Dataflow Jobs using Graph Propagation. 1-8 - Zhejiang Ran, Zhiquan Lai, Lizhi Zhang, Dongsheng Li:
Accelerate Graph Neural Network Training by Reusing Batch Data on GPUs. 1-8 - Tao Zhong, Peichang Shi, Junsheng Chang:
JointCloud Cross-chain Verification Model of Decentralized Identifiers. 1-8 - Dingquan Huang, Xin Yao, Senquan An, Shengbing Ren:
Private Distributed K-Means Clustering on Interval Data. 1-9 - Thomas Prantl, Dominik Prantl, André Bauer, Lukas Iffländer, Alexandra Dmitrienko, Samuel Kounev, Christian Krupitzer:
Benchmarking of Pre- and Post-Quantum Group Encryption Schemes with Focus on IoT. 1-10 - Jia Guo, Wei Wang, Zuguang Li, Shan Sun:
Incentive Mechanism Design for Blockchain Enabled Distributed Content Caching. 1-6 - Kai Zhang, Yushan Jiang, Lee Seversky, Chengtao Xu, Dahai Liu, Houbing Song:
Federated Variational Learning for Anomaly Detection in Multivariate Time Series. 1-9 - Yijie Wang, Xin Chen, Ying Chen, Shougang Du:
Resource allocation algorithm for MEC based on Deep Reinforcement Learning. 1-6 - Lele Ma:
One Layer for All: Efficient System Security Monitoring for Edge Servers. 1-8 - Yaqi Xie, Chaonong Xu, Chao Li:
Optimal data sink location for real-time NOMA-based Industrial IoTs. 1-6 - Peng Feng, Yuebin Bai, Zerui Guo, Xiaolin Wang, Yining Zhang, Bojian Bai, Junmin Zhang:
A Millimeter-wave Multi-channel MAC with Dynamic Spectrum Access Capability for Mobile Self-organizing Heterogeneous Networks. 1-7 - Haolin Wang, Xiao Xiao, Yilong Hui, Zhisheng Yin, Nan Cheng:
Two-layer Federated Learning for Scene Text Detection. 1-6 - Jie Ma, Bin Qi, Kewei Lv:
Three-Party Integer Comparison and Applications. 1-8 - Yue Sun, Zhuoming Huang, Honggang Zhang, Zhi Cao, Deqiang Xu:
3DRIMR: 3D Reconstruction and Imaging via mmWave Radar based on Deep Learning. 1-8 - Tengpeng Li, Xiaoqian Zhang, Son Nam Nguyen, Bo Sheng:
CODS: Cloud-assisted Object Detection for Streaming Videos on Edge Devices. 1-6 - Shehenaz Shaik, Sanjeev Baskiyar:
A Scalable Approach to Service Placement in Fog/Cloud Environments. 1-8 - Danlin Jia, Tengpeng Li, Xiaoqian Zhang, Li Wang, Mahsa Bayati, Ron Lee, Bo Sheng, Ningfang Mi:
SNIS: Storage-Network Iterative Simulation for Disaggregated Storage Systems. 1-6 - Trung Thanh Nguyen, Truong Thao Nguyen, Tuan Anh Nguyen Dinh, Thanh-Hung Nguyen, Phi Le Nguyen:
Q-learning-based Opportunistic Communication for Real-time Mobile Air Quality Monitoring Systems. 1-7 - Mohsen Gavahi, Abu Naser, Cong Wu, Mehran Sadeghi Lahijani, Zhi Wang, Xin Yuan:
Encrypted All-reduce on Multi-core Clusters. 1-7 - Juan V. Leon, Oscar G. Bautista, Abdullah Aydeger, Suat Mercan, Kemal Akkaya:
A General and Practical Framework for Realization of SDN-based Vehicular Networks. 1-7 - Junhua Cheng, Songtao Guo, Jing He:
ALLPC: A Lightweight Block Cipher Based on Generalized Feistel Networks for IoT. 1-8 - Chao Qiu, Yuanzhuo Xu, Yu Zhu, Luyao Xie, Da Shen, Junhui Huang, Xiaoguang Niu:
MAGINS: Neural Network Inertial Navigation System Corrected by Magnetic Information. 1-8 - Zhenli Cui, Yu Luo:
VideoKV: A Fast Key-Value Store For Intelligent Video Surveillance Terminals. 1-9 - Yuxin Shi, Ailian Zhou, Xiaohe Liang, Nengfu Xie, Saisai Wu, Xiaoyu Li:
Research on Tag Method for Joint Extraction of Domain-oriented Entity and Relation. 1-5 - Tao Lin, Fu Chen, Xue Fu:
Methodological Principles for Deep Learning in Software Engineering. 1-3 - Gaobi Kang, Jian Wang, Xuejun Yue, Guofan Zeng, Zekai Feng:
Transfer Learning Based Crop Disease Identification Using State-of-the-art Deep Learning Framework. 1-6 - Abdullah Hussein Al-Ghushami, Dabeeruddin Syed, Ameema Zainab, Moaaz Ahmed, Jadran Sessa:
Deep Learning-based Face Mask Usage Detection on Low Compute Resource Devices. 1-6 - Harry Romesburg, Jian Wang, Yushan Jiang, Huihui Wang, Houbing Song:
Software Defined Radio based Security Analysis For Unmanned Aircraft Systems. 1-5 - Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin, Nasir Ghani:
QoSP: A Priority-Based Queueing Mechanism in Software-Defined Networking Environments. 1-7 - Yanglong Sun, Jianxin Zhang, Yuliang Tang:
NOMA-Assisted Wireless Caching in Vehicular Networks: A Online Scheduling Strategy. 1-6 - Pejman Najafi, Daniel Köhler, Feng Cheng, Christoph Meinel:
NLP-based Entity Behavior Analytics for Malware Detection. 1-5 - Thomas Prantl, Dominik Prantl, Lukas Beierlieb, Lukas Iffländer, Alexandra Dmitrienko, Samuel Kounev, Christian Krupitzer:
Performance Evaluation for a Post-Quantum Public-Key Cryptosystem. 1-7 - Wei Wan, Xin Shi, Jinxia Wei, Jing Zhao, Chun Long:
ELSV: An Effective Anomaly Detection System from Web Access Logs. 1-6 - Mengqi Li, Liang Liu, Yanlin Wang, Jie Xi, Lisong Wang:
PACTS: Power-Aware Charging Time Scheduling in Wireless Rechargeable UAV Networks. 1-10 - Zachary Tauscher, Yushan Jiang, Kai Zhang, Jian Wang, Houbing Song:
Learning to Detect: A Data-driven Approach for Network Intrusion Detection. 1-6 - Yuan Mei, Binbin Guo, Danyang Xiao, Weigang Wu:
FedVF: Personalized Federated Learning Based on Layer-wise Parameter Updates with Variable Frequency. 1-9 - Jessil Fuhr, Isaac Hanna, Feng Wang, Yongning Tang:
The Diminished Importance of Connection-based Features in Intrusion Detection. 1-10 - Yun Fen Yong, Chee Keong Tan, Ian K. T. Tan:
SMOTE for Wi-Fi Fingerprint Construction in Indoor Positioning Systems. 1-6 - Zhanpeng Yang, Yong Zhou, Youlong Wu, Yuanming Shi:
Communication-Efficient Quantized SGD for Learning Polynomial Neural Network. 1-6 - Zhipeng Cai, Xu Zheng, Jinbao Wang:
Efficient Data Trading for Stable and Privacy Preserving Histograms in Internet of Things. 1-10 - Jirun Duan, Ke Ren, Wei Zhou, Yueyue Xu, Wanchun Dou:
A Service Migration Method for Resource Competition in Mobile Edge Computing. 1-8 - George Kousiouris:
A self-adaptive batch request aggregation pattern for improving resource management, response time and costs in microservice and serverless environments. 1-10 - Zekai Feng, Gaobi Kang, Fanguo Zeng, Xuejun Yue:
Identification of Cotton Growing Stage Based on Faster-RCNN. 1-6 - Yi Qin, Chuan Yue:
Key-Based Input Transformation Defense Against Adversarial Examples. 1-10 - Yiqing Wang, Junqi Jin, Zhenzhe Zheng, Haiyang Xu, Fan Wu, Yuning Jiang, Guihai Chen:
Multi-objective Dynamic Auction Mechanism for Online Advertising. 1-8 - Yongxin Liu, Yingjie Chen, Jian Wang, Shuteng Niu, Dahai Liu, Houbing Song:
Zero-bias Deep Neural Network for Quickest RF Signal Surveillance. 1-8 - Jing Tian, Chang Liu, Gaopeng Gou, Zhen Li, Gang Xiong, Yangyang Guan:
RecGraph: Graph Recovery Attack using Variational Graph Autoencoders. 1-7 - Yuejing Chen, Ailian Zhou, Xiaohe Liang, Nengfu Xie, Huijuan Wang, Xiaoyu Li:
A Traceability System of Livestock Products Based on Blockchain and the Internet of Things. 1-5 - Kangkang Li, Liangmin Wang:
Elastic Scheduling of Virtual Machines in Cloudlet Networks. 1-7 - Samuel Alexander Stein, Ryan L'Abbate, Wenrui Mu, Yue Liu, Betis Baheri, Ying Mao, Qiang Guan, Ang Li, Bo Fang:
A Hybrid System for Learning Classical Data in Quantum States. 1-7 - Salvatore Servodio, Xiaoming Li:
An Efficient Shuffle-Light FFT Library. 1-10 - Salem Alqahtani, Murat Demirbas:
BigBFT: A Multileader Byzantine Fault Tolerance Protocol for High Throughput. 1-10 - Jing Tian, Gaopeng Gou, Yangyang Guan, Wei Xia, Gang Xiong, Chang Liu:
Universal Perturbation for Flow Correlation Attack on Tor. 1-9 - Jianan Chen, Qi Qi, Jingyu Wang, Haifeng Sun, Jianxin Liao:
Accelerating DNN Inference by Edge-Cloud Collaboration. 1-7 - Longhao Li, Taieb Znati, Rami G. Melhem:
Differential Shadowing: A Resilience Framework for Extreme-scale, Heterogeneous Environments with Non-Uniform Node Failure Distribution. 1-8 - Lianjin Ye, Qing Li, Xudong Zuo, Jingyu Xiao, Yong Jiang, Zhuyun Qi, Chunsheng Zhu:
PUFF: A Passive and Universal Learning-based Framework for Intra-domain Failure Detection. 1-8 - Feixue Han, Qing Li, Keke Zhu, Jianer Zhou, Yong Jiang, Zhuyun Qi, Fuliang Li:
LAFS: Learning-Based Application-Agnostic Flow Scheduling for Datacenters. 1-8 - Xinliang Wei, A. B. M. Mohaimenur Rahman, Yu Wang:
Data Placement Strategies for Data-Intensive Computing over Edge Clouds. 1-8 - Youssef Elmougy, Weiwei Jia, Xiaoning Ding, Jianchen Shan:
Diagnosing the Interference on CPU-GPU Synchronization Caused by CPU Sharing in Multi-Tenant GPU Clouds. 1-10 - Teng Pu, Honghao Cai, Gang He, Yinghua Luo, MinQi Wu:
An air quality prediction model based on deep learning and wavelet analysis considering the COVID-19 pandemic factors. 1-2 - Yuyang Wang, Dezun Dong, Fei Lei:
MR-tree: A Parametric Family of Multi-Rail Fat-tree. 1-9 - Chiranjibi Subedi, Brendan P. Beauchamp, Nabeeh Kandalaft:
MQTT based Wi-Fi communication between Microcontroller and FPGA. 1-4 - Zhe Lang, Shouguo Yang, Yiran Cheng, Xiaoling Zhang, Zhiqiang Shi, Limin Sun:
PMatch: Semantic-based Patch Detection for Binary Programs. 1-10 - Fanguo Zeng, Wen Peng, Gaobi Kang, Zekai Feng, Xuejun Yue:
Spectral Data Classification By One-Dimensional Convolutional Neural Networks. 1-6 - Wang Yang, Jing Cao, Fan Wu:
Adaptive Video Streaming with Scalable Video Coding using Multipath QUIC. 1-7 - Li-Chi Chang, Zesheng Chen, Chao Chen, Guoping Wang, Zhuming Bi:
Defending Against Adversarial Attacks in Speaker Verification Systems. 1-8 - Soeren Becker, Florian Schmidt, Odej Kao:
EdgePier: P2P-based Container Image Distribution in Edge Computing Environments. 1-8 - Rohit Sahu, Ryan Toepfer, Matthew D. Sinclair, Henry Duwe:
DENNI: Distributed Neural Network Inference on Severely Resource Constrained Edge Devices. 1-10 - Stephanie Lei, Wenyi Su:
An End-To-End Method for Teenagers Potential Depression Detection on Social Media. 1-2 - Haoke Xu, Xiaoming Li:
Fast Monotonicity Preserving Text Sorting On GPU. 1-7 - Md. Tahmid Rashid, Dong Wang:
Unravel: An Anomalistic Crowd Investigation Framework Using Social Airborne Sensing. 1-10 - Wenyi Ouyang, Qiongxiao Wang, Wei Wang, Jingqiang Lin, Yaxi He:
SCB: Flexible and Efficient Asymmetric Computations Utilizing Symmetric Cryptosystems Implemented with Intel SGX. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.