default search action
ICBDC 2019: Guangzhou, China
- Proceedings of the 4th International Conference on Big Data and Computing, ICBDC 2019, Guangzhou, China, May 10-12, 2019. ACM 2019, ISBN 978-1-4503-6278-8
Big Data Analysis
- Liang Dong, AnKang Chu, Fengkui Liu:
DDQO: An Algorithm for Distributed Database Query Optimization. 1-5 - Xiaohan Huang, Chunlin Li, Youlong Luo:
Optimized Speculative Execution Strategy for Different Workload Levels in Heterogeneous Spark Cluster. 6-10 - Wei-Yu Chen, Peggy Joy Lu, Steven Shiau:
IPGOD: An Integrated Visualization Platform Based on Big Data Mining and Cloud Computing. 11-16 - Xueqian Gong, Chunlin Li, Youlong Luo:
Intermediate Data Placement Strategy for Different Data Skew Levels Based on Random Sampling in Spark. 17-23 - Nong Ye, Ting Yan Fok:
Learning Partial-Value Variable Associations. 24-28 - Lingling Shi, Dongzhi He:
Multi-join Query in Database Based on Genetic and Ant Colony Algorithm Optimization. 29-33 - Hendrik Graupner, Kennedy A. Torkura, Muhammad I. H. Sukmana, Christoph Meinel:
Secure Deduplication on Public Cloud Storage. 34-41 - Han-Teng Liao, Zijia Wang, Xue Wu:
Developing a Minimum Viable Product for Big Data and AI Education: Action Research Based on a Two-Year Reform of an Undergraduate Program of Internet and New Media. 42-47 - Fengcun Li, Bo Hu:
DeepJS: Job Scheduling Based on Deep Reinforcement Learning in Cloud Data Center. 48-53 - Zigui Jiang, Rongheng Lin, Fangchun Yang:
Incremental Electricity Consumer Behavior Learning Using Smart Meter Data. 54-59 - Swee Shu Luing Nikalus, Sim Ee Kee, Guan Hin Chau, Pei Ling Ooi:
Data Analytics for Engagement In Stem Education. 60-63 - Zilong Ye:
Green Optical Networking for Big Data Transfer. 64-67 - Fan Zhang:
Prediction and Evaluation of Urban Eco-sports Tourism Behavior Using Data Mining Technology. 68-71 - Sun Zhi-peng, Chen Gui-ming, Zhang Hui:
Evaluation of Large-scale Complex Systems Effectiveness Based on Big Data. 72-76
Cloud Computing
- Jianjiang Jin, Long Chen:
Identity Credibility Evaluation Method Based on User Behavior Analysis in Cloud Environment. 77-82 - Feifei Chen, Xiaofeng Zhou, Chao Shi:
The Container Scheduling Method Based on the Min-Min in Edge Computing. 83-90 - Guilin Tian, Changyun Liu, Haobo Jiang:
Scheduling Strategy of Space-based Satellite Based on Fireworks Algorithm under Cloud Computing. 91-96 - Lele Li, Zhibin Yu:
SMHC: A Synthetic Metric for Heterogeneous Resources in Cloud Computing. 97-101 - Ting Xing, Kang Lu, Mengyu Li, Xushan Chen:
Service Structure Mechanism Based on Edge Computing in Emergency Disaster Recovery Scenario. 102-106 - Xi Chen, Hongli Xu, Liusheng Huang:
Online Scheduling Strategy to Minimize Penalty of Tardiness for Real-Time Tasks in Mobile Edge Computing Systems. 107-114 - Pingrong Lin, Zheyuan Lin, Xiaoquan Shi:
Research on Optimization of Course Selection System Based on Micro service and Dynamic Resource Extension. 115-119
Pattern Recognition and Classification
- Yong Li, Jibo Wu:
On the Performance of the r-k Class Estimator in Partial Linear Model. 120-124 - Le Yang, Manchun Cai, Yongcheng Duan, Xue Yang:
Intrusion Detection Based on Approximate Information Entropy for Random Forest Classification. 125-129 - Zhenyu Wu, Guangda Chen, Jingjing Yao:
The Stock Classification Based on Entropy Weight Method and Improved Fuzzy C-means Algorithm. 130-134 - Yi-Chuan Chiu, Hsing-Hung Lin, Yung-Tsan Jou:
A Model Selection Method for Machine Learning by Differential Evolution. 135-139 - Yuan Wang, Liming Wang:
Bot-like Behavior Detection in Online Banking. 140-144 - Haolin Chen, Jihong Yang, Gang Xu, Guofei Gao, Quan Yuan, Zhouxin Li, Ziqi Wang, Yanfei Li, Hui Liu:
Application of ELM in Key Impact Factors Identification of Rail Transit System Cost. 145-150 - Degang Sun, Yulan Hu, Zhixin Shi, Guokun Xu, Wei Zhou:
An Efficient Anomaly Detection Framework for Electromagnetic Streaming Data. 151-155 - Kunming Li, Yijun Gu, Peijing Zhang, An Wang, Wenzheng Li:
Research on KNN Algorithm in Malicious PDF Files Classification under Adversarial Environment. 156-159 - Haiyan Yang, Yanrong Deng, Hua-An Zhao:
A Comparison of MFCC and LPCC with Deep Learning for Speaker Recognition. 160-164 - Ruide Li, Guohua Gao, Yingjie Liang, Xin Zhang, Yongqiang Liao:
An AR Based Edge Maintenance Architecture and Maintenance Knowledge Push Algorithm for Communication Networks. 165-168 - Ping Sun, JinShan Li, Guohui Li:
Research on Collaborative Filtering Recommendation Algorithm Based on Sentiment Analysis and Topic Model. 169-178 - Xiujin Shi, Tian Zhang, Wenbin Dong, Zhixiang Deng:
An Embedded Model XG-FwFMs for Click-Through Rate. 179-184 - Doudou Dong, Rui He, Guixi Xiong:
Foreign Commodity Sales Forecast Based on Model Fusion. 185-188 - Rui Liang, Danxuan Liu:
A Geo-weighted Grey Theory Model on the Opioid Crisis. 189-193
Data Mining
- Yongcheng Duan, Xin Li, Xue Yang, Le Yang:
Network Security Situation Factor Extraction Based on Random Forest of Information Gain. 194-197 - Rindang Widuri, Bambang Leo Handoko, Ilham Condro Prabowo:
Adoption of Information Technology in Public Accounting Firm. 198-202 - Muhammad Azhar Mushtaq, Abid Sultan, Asad Razzaq, Ehsaan-ur-Rehman, Muhammad Inaam-ur-Rehman:
New Cryptographic Algorithm Based on CFA. 203-208 - Aiting Xu, Pingting Ying, Fangyan Wang:
Research on the Consumer Reviews of JD Bookstore Based on Text Mining Technology. 209-214 - Stella D. Muyco, Alexander A. Hernandez:
A Modified Hash Based Least Significant Bits Algorithm for Steganography. 215-220 - Aiting Xu, Fangyan Wang, Pingting Ying:
Xiaomi Brand Appraisal Research Based on Zhihu by Text Mining Technology. 221-225 - Shiming Sun, Yuanhe Tang, Fu Zhou:
An Index with Caching Mechanism for Real-time Processing System. 226-230 - Haryadi Sarjono, Celinsky Brenda Sasmita, Bambang Leo Handoko:
Factors Influencing Purchase Intention in the Smartphone Selection Context in Millennials Generation. 231-236 - Yanyan Wang, Ruixue Zhang, Fulian Yin:
Research on Online Publicity Effect Evaluation of Significant Subject. 237-241 - Muhammad Azhar Mushtaq, Abid Sultan, Muhammad Afrasayab, Taimoor Zubair, Abid-bin-Shakir:
New Cryptographic Algorithm Using ASCII Values and Gray Code (AGC). 242-246 - Yu Liang, Xuliang Duan, Yuanjun Ding, Xifeng Kou, Jingcheng Huang:
Data Mining of Students' Course Selection Based on Currency Rules and Decision Tree. 247-252
Optimization Model and Applications
- Hanlin Zhang, Ningjiang Chen, Yusi Tang, Birui Liang:
Multi-level Container Checkpoint Performance Optimization Strategy in SDDC. 253-259 - Detian Li, Tao Gu, Qun Liao, Yulu Yang:
Optimization of Computing Time for Sequential MapReduce Jobs. 260-264 - Wei-xing Xia, Yu-hao Shan:
Improved Three-point Correction Model for Inertial Navigation System Based on Measurement Error and Dynamic Detuning Angle. 265-270 - Bambang Leo Handoko, Gatot Soepriyanto, Ang Swat Lin Lindawati:
Technology Acceptance Model on Micro Business Owner in Grogol Petamburan District. 271-276 - Shangwei Zhou, Qingsong Yu, Jun Sun:
Margin-based Sampling in Deep Metric Learning. 277-280 - Zhongming Wu, Kai Wang, Zhangjin Zhou:
Accelerated Proximal Gradient Method with Line Search for Large-Scale Nonconvex Penalty Problems. 281-286 - Hengxin Yin, Senhua Lai, Gang Xu, Quan Yuan, Guofei Gao, Zhu Duan, Chao Chen, Yanfei Li, Hui Liu:
Sensitivity Analysis of Cost Elements in Rail Transit System Using EO-FNN. 287-292 - Yang Li:
Revelation of a High-order Arithmetic Sequence with the Same First Term and Common Difference. 293-298 - Fan Zhang:
Research of Motor Skills Performance Evaluation Decision Support System Based on Data Mining Algorithm. 299-303
Computer Applications
- Parvez Ahmad, Hai Jin, Saqib Qamar, Ran Zheng, Wenbin Jiang, Belal Ahmad, Mohd Usama:
3D Dense Dilated Hierarchical Architecture for Brain Tumor Segmentation. 304-307 - Lingfeng Lin, Dengji Gao, Zhibin Yu:
SLFAG: Scan Line Fill Algorithm for PCB Image Rasterization Based on GPGPU. 308-312 - Sujatha K, Gaurav Gupta:
High Dynamic Range Imaging with Multiexposure Image fusion: A Variational Frame work. 313-321 - Lei Yu, Han Qiu, Junhuai Li, Yong Chang:
Design of Asynchronous Non-block Server for Agricultural IOT. 322-327 - Minyu Xu, Jun Shen:
Cognitive Ability Evaluation Model for Network Teaching. 328-332 - Zhu Duan, Hui Liu, Xinwei Lv, Zhiren Ren, Steffen Junginger:
Hybrid Position Forecasting Method for Mobile Robot Transportation in Smart Indoor Environment. 333-338 - Huifeng Sun, Xushan Chen, Zhen Xia, Mengyu Li:
A Node Backup Algorithm for Fault Cascade Degradation in Virtualization Power Communication Network. 339-343
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.