default search action
ICA3PP 2018: Guangzhou, China - Workshops
- Ting Hu, Feng Wang, Hongwei Li, Qian Wang:
Algorithms and Architectures for Parallel Processing - ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings. Lecture Notes in Computer Science 11338, Springer 2018, ISBN 978-3-030-05233-1
ICA3PP 2018 Workshop on Intelligent Algorithms for Large-Scale Complex Optimization Problems
- Bhavesh N. Gohil, Dhiren R. Patel:
An improved Grey Wolf Optimizer (iGWO) for Load Balancing in Cloud Computing Environment. 3-9 - Decheng Miao, Jianqing Xi:
Indexed Coinduction in a Fibrational Setting. 10-16 - Leisheng Li, Qiao Sun, Xin Liu, Changmao Wu, Haitao Zhao, Changyou Zhang:
Porting and Optimizing VASP on the SW26010. 17-26 - Hongjie Li, Yanhui Ding, Weizhi Xu, Hui Yu, Li Sun:
A Data Reuse Method for Fast Search Motion Estimation. 27-33 - Senlin Cheng, Liutong Xu:
I-Center Loss for Deep Neural Networks. 34-44 - Min Cui, Fengtong Mei, Qiangyi Li, Qiangnan Li:
Nodes Deployment Optimization Algorithm of Underwater Wireless Sensor Networks. 45-50 - Tong-Bo Wang:
A Novel Kernel Clustering Method for SVM Training Sample Reduction. 51-58 - Jun Wang, Junsheng Jiao:
Implementation of Beamforming for Large-Scale Circular Array Sonar Based on Parallel FIR Filter Structure in FPGA. 59-65 - Bo Zhao, Yingying Li, Lin Han, Jie Zhao, Wei Gao, Rongcai Zhao, Ramin Yahyapour:
A Practical and Aggressive Loop Fission Technique. 66-75 - Ping Du, Jinhuan Zhang, Jun Long:
Super-Sampling by Learning-Based Super-Resolution. 76-83 - Xiaoli Song, Yunzhan Gong, Dahai Jin, Qiangyi Li, Hengchang Jing:
Nodes Deployment Optimization Algorithm Based on Improved Evidence Theory. 84-89 - Feng Ye, Zongfei Jing, Qian Huang, Cheng Hu, Yong Chen:
The Research and Implementation of a Distributed Crawler System Based on Apache Flink. 90-98
ICA3PP 2018 Workshop on Security and Privacy in Data Processing
- Sun Yanan, Shen Jie, Yang Zhou:
A Security Reinforcement Technology of Telematics Box Based on Secure Element. 101-116 - Youli Fang, Hong Wang, Ruitong Di, Lutong Wang, Jin Li:
Detecting Fake Reviews Based on Review-Rating Consistency and Multi-dimensional Time Series. 117-123 - Ruitong Di, Hong Wang, Youli Fang, Ying Zhou:
Fake Comment Detection Based on Time Series and Density Peaks Clustering. 124-130 - Tuo Wang, Lu Liu, Chongzhi Gao, Jingjing Hu, Jingyu Liu:
Towards Android Application Protection via Kernel Extension. 131-137 - Zeping Li, Huwei Liu, Ning Cao:
Threats and Coping Strategies Under the IOT. 138-144 - Huwei Liu, Zeping Li, Ning Cao:
Framework Design of Financial Service Platform for Tobacco Supply Chain Based on Blockchain. 145-150 - Lili Sun, Zhaochan Li, Ning Cao, Li Zhou:
Research on Application of Logistics Service Quality Management Based on Blockchain. 151-157 - Jing Liu, Zhaochan Li, Lili Sun, Jinlong Wang, Ning Cao:
Research on the Application of RFID Technology in Logistics Warehousing Management System. 158-164 - Ruomeng Xu, Jieren Cheng, Fengkai Wang, Xiangyan Tang, Jinying Xu:
A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment. 165-176 - Lijuan Zheng, Yunjia Zhang, Rui Zhang, Jianyou Chen, Meng Cui, Chunlei Song:
An Improved Authentication Protocol in Telemedicine System. 177-184 - Jing Lu, Yuxiang Chen, Hui Tian, Yonghong Chen, Tian Wang, Yiqiao Cai:
Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data. 185-191 - Fangping Li, Wei Zhang, Heng Liu, Maosheng Zhang:
Feature Extraction of Dichotomous Equipment Based on Non-intrusive Load Monitoring and Decomposition. 192-200
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.