default search action
9. SpaCCS Workshops 2016: Zhangjiajie, China
- Guojun Wang, Indrakshi Ray, José M. Alcaraz Calero, Sabu M. Thampi:
Security, Privacy and Anonymity in Computation, Communication and Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10067, 2016, ISBN 978-3-319-49144-8
7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)
- Hanlu Chen, Zheng Yan:
Security and Privacy in Big Data Lifetime: A Review. 3-15 - Junhai Zhou, Yapin Lin, Siwang Zhou, Qin Liu:
Community-Based Adaptive Buffer Management Strategy in Opportunistic Network. 16-25 - Jingjing Zhang, Zhengping Jin:
Energy-Aware Location Privacy Routing for Wireless Sensor Networks. 26-32 - Xixia Liu, Zhengping Jin:
ChainMR Crawler: A Distributed Vertical Crawler Based on MapReduce. 33-39 - Hongling Chen, Quangang Wen, Xiaoyang Fu:
An Improved Ring-Based Model for Big Data Storage and Retrieval in Wireless Sensor Networks. 40-47 - Saba Awan, Nazar Abbas Saqib:
Detection of Malicious Executables Using Static and Dynamic Features of Portable Executable (PE) File. 48-58 - Xiaofeng Song, Zhiyuan Li, Liju Chen, Jiong Liu:
Entropy Feature Based on 2D Gabor Wavelets for JPEG Steganalysis. 59-72 - Shaobo Zhang, Qin Liu, Guojun Wang:
A Caching-Based Privacy-Preserving Scheme for Continuous Location-Based Services. 73-82
6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)
- Tianjun Wu, Yuexiang Yang:
AppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph. 85-94 - Tianjun Wu, Yuexiang Yang:
CapaDroid: Detecting Capability Leak for Android Applications. 95-104 - Feng Qiu, Xiaoqian Li:
Research and Implementation Key Technology of Security Mobile Office. 105-114 - Xin Li, Cui Tang:
Makespan Minimization for Batch Tasks in Data Centers. 115-123 - Guoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, Zhuzhong Qian:
Opportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center. 124-133 - Lei Zhou, Yang Shu, Guojun Wang:
A Software Detection Mechanism Based on SMM in Network Computing. 134-143
4th International Workshop on Network Optimization and Performance Evaluation (NOPE 2016)
- Baohua Huang, Jiawei Mo, Qi Lu, Wei Cheng:
Optimizing Propagation Network of Certificate Revocation in VANET with Meet-Table. 147-154 - Xueqin Liang, Zheng Yan, Peng Zhang:
Game Theoretical Analysis on System Adoption and Acceptance: A Review. 155-167 - Huiqing Xu, Hengjie Huang, Gaocai Wang:
An Energy-Efficient Caching Strategy Based on Coordinated Caching for Green Content-Centric Network. 168-175 - Yishui Li, Hui Li, Mei Chen, Zhenyu Dai, Ming Zhu:
Characterizing the Scalability and Performance of Analytic Database System. 176-183 - Fangfang Li, Yu Duan:
An Analysis of the Survivability in SEER Breast Cancer Data Using Association Rule Mining. 184-194
Second International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2016)
- Wenhua Wang, Tian Wang, Md. Zakirul Alam Bhuiyan, Yiqiao Cai, Hui Tian, Yonghong Chen:
Improving the Localization Probability and Decreasing Communication Cost for Mobile Users. 197-207 - Jian Shen, Chen Wang, Aniello Castiglione, Dengzhi Liu, Christian Esposito:
Greedy Probability-Based Routing Protocol for Incompletely Predictable Vehicular Ad-hoc Network. 208-217 - Li Weigang:
Flexible Schema for Prediction of Collaborator's Credits. 218-228 - Mian Cheng, Baokang Zhao, Jinshu Su:
A Real-Time Processing System for Anonymization of Mobile Core Network Traffic. 229-237 - Naila Belhadj Aissa, Mohamed Guerroumi:
A New Classification Process for Network Anomaly Detection Based on Negative Selection Mechanism. 238-248 - Yi-Wei Ma, Jiann-Liang Chen, Yao-Hong Tsai, Pen-Chan Chou, Shyue-Kung Lu, Sy-Yen Kuo:
Integrated Heterogeneous Infrastructure for Indoor Positioning. 249-256 - Zhusong Liu, Jin Li, Christian Esposito, Aniello Castiglione, Francesco Palmieri:
Optimal Data Replica Placement in Large-Scale Federated Architectures. 257-267 - Na Wu, De-Cheng Zuo, Zhan Zhang, Yan Zhao:
A Cost-Effective Criticality-Aware Virtual Machine Placement Approach in Clouds. 268-277 - Shengtian Min, Hui Li, Mei Chen, Zhenyu Dai, Ming Zhu:
Accelerating Concurrent Analytic Tasks with Cost-Conscious Result Set Replacement Algorithm. 278-287 - Changji Wang, Jiayuan Wu, Shengyi Jiang:
An Asymmetric Signcryption Scheme for Cloud-Assisted Wireless Body Area Network. 288-296 - Jionghao Jia, Ningjiang Chen, Shuo Zhang:
Forecasting Availability of Virtual Machine Based on Grey-Exponential Curve Combination Model. 297-310 - Xuyun Zhang, Lianyong Qi, Qiang He, Wanchun Dou:
Scalable Iterative Implementation of Mondrian for Big Data Multidimensional Anonymisation. 311-320
Annual Big Data Security, Privacy and Trust Workshop (BigDataSPT 2016)
- Jie Dai, Xin Wang:
Effective Task Scheduling for Large-Scale Video Processing. 323-331 - Xiaoyu Zhu, Guojun Wang, Dongqing Xie:
Fuzzy and Semantic Search over Encrypted Data in the Cloud. 332-341 - Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, Mohd Taufik Abdullah, Wee-Chiat Chai:
A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts. 342-357
First International Workshop on Cloud Storage Service and Computing (WCSSC 2016)
- You Liao, Yupeng Hu, Linjun Wu, Zheng Qin:
A Weighted Frequency Based Cache Memory Replacement Policy for Named Data Networking. 361-370 - Hongyun Xu, Jiesi Jiang, Cheng Xu:
An Authentication Data Structure of Provable Data Possession with Dynamic Data Operation in Cloud Computing. 371-381 - Li Zhang, Bing Tang:
A Cost-Effective Cloud Storage Caching Strategy Utilizing Local Desktop-Based Storage. 382-390
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.