default search action
20th PDCAT 2019: Gold Coast, Australia
- 20th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2019, Gold Coast, Australia, December 5-7, 2019. IEEE 2019, ISBN 978-1-7281-2616-6
- Wenjie Zou, Longkun Guo, Peihuang Huang:
Min-Max Movement of Sink-Based Mobile Sensors in the Plane for Barrier Coverage. 1-6 - Xinchen Li, Huan Cai, Gang Liu, Kezhong Lu:
Base Station Positioning in Single-Tiered Wireless Sensor Networks. 7-12 - Chunyue Zhou, Hui Tian, Yaocong Dong, Baitong Zhong:
An Energy-Saving Routing Algorithm for Opportunity Networks Based on Sleeping Mode. 13-18 - Maede Fotros, Mohammad Mansour Riahi Kashani, Javad Rezazadeh, John Ayoade:
A Timely VANET Multi-hop Routing Method in IoT. 19-24 - Marcel Köster, Julian Groß, Antonio Krüger:
Parallel Tracking and Reconstruction of States in Heuristic Optimization Systems on GPUs. 25-30 - Haoxin Luo, Ye Cai, Qiuming Luo, Rui Mao:
FPGA-Based Parallel Multi-Core GZIP Compressor in HDFS. 31-35 - Naixuan Zhao, Ge Zhang, Zijian Wang, Ling Kuang:
GPU Parallel Acceleration of Frequency Domain Algorithm for Calculating Radar Target Echoes. 36-40 - Yongjie Yang, Cheng Zhong, Danyang Chen:
Accelerating Alignment for Short Reads Allowing Insertion of Gaps on Multi-Core Cluster. 41-45 - M. Reza Hoseinyfarahabady, Ali Jannesari, Wei Bao, Zahir Tari, Albert Y. Zomaya:
Real-Time Stream Data Processing at Scale. 46-51 - Benbo Zha, Hong Shen:
I/O Scheduling for Limited-Size Burst-Buffers Deployed High Performance Computing. 52-57 - Xin Long, Jigang Wu, Yalan Wu, Long Chen:
Task Merging and Scheduling for Parallel Deep Learning Applications in Mobile Edge Computing. 58-62 - Victor V. Toporkov, Dmitry Yemelyanov:
Coordinated and Hindsight Resources Allocation in Distributed Computing. 63-68 - Tikaram Sanyashi, Anasuya Acharya, Bernard Menezes:
Plaintext Recovery Attacks and Their Mitigation in an Application-Specific SHE Scheme. 69-74 - Matthew O'Connor, W. Bastiaan Kleijn:
Finite Approximate Consensus for Privacy in Distributed Sensor Networks. 75-77 - Mnar Saeed Alnaghes, Hong Shen:
Modeling Data Transmission in Mobile Ad-hoc Networks for Characterizing Black-Hole Attacks. 78-83 - Yue Lu, Hui Tian, Jingjing Yu:
Privacy Preservation for Network Traffic Classification. 84-89 - Molin Li, Tong Chen, Jiaxin Zeng, Xiaobo Zhou, Keqiu Li, Heng Qi:
D2D-Assisted Computation Offloading for Mobile Edge Computing Systems with Energy Harvesting. 90-95 - Yosra Benchaabene, Noureddine Boujnah, Faouzi Zarai:
Ultra Reliable Communication : Availability Analysis in 5G Cellular Networks. 96-102 - Xingchun Liu, Zhipeng Feng, Jingjing Yu, Ying Tao, Shubo Ren:
Adaptive Clustering Strategy Based on Capacity Weight. 103-108 - Wenqi Zhang, Jingjing Yu, Xingchun Liu, Ying Tao, Shubo Ren:
Low-Energy Dynamic Clustering Scheme for Wireless Sensor Networks. 109-114 - Zheng Du, Jing Zhang, Shihao Sha, Qiuming Luo:
Implementing the Matrix Multiplication with DFC on Kunlun Small Scale Computer. 115-120 - Sandra Catalán, Xavier Martorell, Jesús Labarta, Tetsuzo Usui, Leonel Antonio Toledo Díaz, Pedro Valero-Lara:
Accelerating Conjugate Gradient using OmpSs. 121-126 - Leonel Toledo, Antonio J. Peña, Sandra Catalán, Pedro Valero-Lara:
Tasking in Accelerators: Performance Evaluation. 127-132 - Nirmal Kumbhare, Aniruddha Marathe, Ali Akoglu, Salim Hariri, Ghaleb Abdulla:
Adaptive Power Reallocation for Value-Oriented Schedulers in Power-Constrained HPC. 133-139 - Yugu Hu, Lina Ge, Guifen Zhang, Donghong Qin:
Research on Differential Privacy for Medical Health Big Data Processing. 140-145 - Faheem Ullah, Muhammad Ali Babar:
Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical Investigation. 146-153 - Adnan Mahmood, Sarah Ali Siddiqui, Wei Emma Zhang, Quan Z. Sheng:
A Hybrid Trust Management Model for Secure and Resource Efficient Vehicular Ad hoc Networks. 154-159 - Shin Morishima:
Scalable Anomaly Detection Method for Blockchain Transactions using GPU. 160-165 - Dongxiao Quan, Li Niu, Lili Zhu, Changxing Pei:
Fault-Tolerant Logical Hadamard Gates Implementation in Reed-Muller Quantum Codes. 166-172 - QiFei Wei, Dongxiao Quan, Jing Liu, Changxing Pei:
Efficient Fault-Tolerant Syndrome Measurement of Quantum Error-Correcting Codes Based on "Flag". 173-178 - Na Chen, Bin Yan, Shuangshuang Shuai, Changxing Pei:
Faithful Multi-Hop Qubit Transmission Based on GHZ States. 179-183 - Elijah Pelofske, Georg Hahn, Hristo N. Djidjev:
Peering Into the Anneal Process of a Quantum Annealer. 184-189 - Wenting Wei, Kun Wang, Kexin Wang, Shengjun Guo, Huaxi Gu:
A Virtual Machine Placement Algorithm Combining NSGA-II and Bin-Packing Heuristic. 190-195 - Tao Tang, Hao Wu, Wei Bao, Pengyi Yang, Dong Yuan, Bing Bing Zhou:
New Parallel Algorithms for All Pairwise Computation on Large HPC Clusters. 196-201 - Kejian Li, Gang Liu, Minhua Lu:
A Holistic Stream Partitioning Algorithm for Distributed Stream Processing Systems. 202-207 - Dylan Matthew Janssen, Alan Wee-Chung Liew:
Acceleration of Genetic Algorithm on GPU CUDA Platform. 208-213 - Xiongwei Fei, Kenli Li, Shui Yu, Keqin Li:
An Economical and High-Quality Encryption Scheme for Cloud Servers with GPUs. 214-219 - Mohamed Hedi Fourati, Soumaya Marzouk, Khalil Drira, Mohamed Jmaiel:
DOCKERANALYZER : Towards Fine Grained Resource Elasticity for Microservices-Based Applications Deployed with Docker. 220-225 - Sasa Pesic, Milos Radovanovic, Mirjana Ivanovic, Costin Badica, Milenko Tosic, Ognjen Ikovic, Dragan Boskovic:
CAAVI-RICS Model for Analyzing the Security of Fog Computing Systems: Authentication. 226-231 - Xiangyu Liu, Manish Singh, Xiufeng Xia:
Protecting Sensitive Location Visits Against Inference Attacks in Trajectory Publishing. 232-239 - Günter Fahrnberger:
Outlier Removal for the Reliable Condition Monitoring of Telecommunication Services. 240-246 - Zhengxiong Hou, Shuxin Zhao, Chao Yin, Yunlan Wang, Jianhua Gu, Xingshe Zhou:
Machine Learning Based Performance Analysis and Prediction of Jobs on a HPC Cluster. 247-252 - Chuyue Zhang, Manchun Cai, Xiaofan Zhao:
Research on Case Preprocessing Based on Bert -CNN-LSTM Model. 253-258 - Samundra Deep, Xi Zheng:
Hybrid Model Featuring CNN and LSTM Architecture for Human Activity Recognition on Smartphone Sensor Data. 259-264 - Haixin Du, Jiankui Zhang, Shihao Sha, Cai Ye, Qiuming Luo:
The Library for Hadoop Deflate Compression Based on FPGA Accelerator with Load Balance. 265-270 - Uwe Jahn, Vladimir Poliakov, Meghadoot Gardi, Peter Schulz, Carsten Wolff:
Introducing PulseAT: A Tool for Analyzing System Utilization in Distributed Systems. 271-276 - Yuki Yamagata, Akira Yamawaki:
Development of Filled Circle Drawing in High-Level Synthesis Oriented Game Programming Library. 277-281 - Hiroyuki Takizawa, Shinji Shiotsuki, Naoki Ebata, Ryusuke Egawa:
An OpenCL-Like Offload Programming Framework for SX-Aurora TSUBASA. 282-288 - Jingyao Zhang:
Concurrent Failure Recovery for Product Matrix Regenerating Code. 289-294 - Francis C. Joseph, Gurunath Gurrala:
Scalability of Parareal for Large Power Grid Simulations. 295-300 - Kasra Majbouri Yazdi, Adel Majbouri Yazdi, Saeid Khodayi, Jingyu Hou, Wanlei Zhou, Saeid Saedy, Mehrdad Rostami:
Improving Recommender Systems Accuracy in Social Networks Using Popularity. 301-307 - Ryoma J. Ohira, Md. Saiful Islam:
A Distributed Genetic Algorithm with Adaptive Diversity Maintenance for Ordered Problems. 308-313 - Nissaf Fredj, Yessine Hadj Kacem, Mohamed Abid:
A Model Driven-Based Approach for Managing Unanticipated Runtime Adaptation of RTE Systems. 314-319 - Agnieszka M. Zbrzezny, Olga Siedlecka-Lamch, Sabina Szymoniak, Miroslaw Kurkowski:
SMT Solvers as Efficient Tools for Automatic Time Properties Verification of Security Protocols. 320-327 - Igor M. Kulikov, Igor G. Chernykh, Andrei Tchernykh:
A Scalable Parallel Computing Framework for Large-Scale Astrophysical Fluid Dynamics Numerical Simulation. 328-333 - Mahdi Amiri-Kordestani, David M. Eyers, Zhiyi Huang, Morteza Biglari-Abhari:
TrustZone for Supervised Asymmetric Multiprocessing Systems. 334-339 - Hao Liao, Qi-Xin Liu, Alexandre Vidmer, Ming-Yang Zhou, Rui Mao:
RNC: Reliable Network Property Classifier Based on Graph Embedding. 340-345 - Cailen Robertson, Jia Li, Ryoma J. Ohira, Quoc Viet Hung Nguyen, Jun Jo:
Optimising Deep Learning Split Deployment for IoT Edge Networks. 346-351 - Humayun Kayesh, Md. Saiful Islam, Junhu Wang:
Event Causality Detection in Tweets by Context Word Extension and Neural Networks. 352-357 - Lu Cao, Hong Shen:
Imbalanced Data Classification Using Improved Clustering Algorithm and Under-Sampling Method. 358-363 - Zexiong Liu, Yuhong Feng, Xuan Yang:
Right Ventricle Segmentation of Cine MRI Using Residual U-net Convolutinal Networks. 364-368 - Quoc-Viet Tran, Shun-Feng Su, Minh-Quang Tran:
Color Distortion Removal for Heart Rate Monitoring in Fitness Scenario. 369-374 - Dibash Basukala, Ramakrishnan Mukundan, Tracy R. Melzer, Anthony Lim:
Automated Segmentation of Substantia Nigra and Red Nucleus in Quantitative Susceptibility Mapping Images. 375-380 - Guang Wei, Depei Qian, Hailong Yang, Zhongzhi Luan:
Modeling Power Consumption of The Code Execution Using Performance Counters Statistics. 381-385 - Hongseok Jeon, Chunglae Cho, Seungjae Shin, Seunghyun Yoon:
A CloudSim-Extension for Simulating Distributed Functions-as-a-Service. 386-391 - Frédéric Loulergue, Jolan Philippe:
New List Skeletons for the Python Skeleton Library. 392-397 - Alexander Malkis:
Reachability in Multithreaded Programs Is Polynomial in the Number of Threads. 398-403 - M. Reza Hoseinyfarahabady, Zahir Tari, Albert Y. Zomaya:
Disk Throughput Controller for Cloud Data-Centers. 404-409 - Xiaoying Kong, Gengfa Fang, Li Liu, Tich Phuoc Tran:
Low Computational Data Fusion Approach Using INS and UWB for UAV Navigation Tasks in GPS-Denied Environments. 410-414 - Arvind Kalyan:
NFV Optimization Algorithm for Shortest Path and Service Function Assignment. 415-420 - Qiao Yan, Chunyue Zhou, Baitong Zhong, Hui Tian:
An Improved MCB Localization Algorithm Based on Received Signal Strength Indicator. 421-426 - Xiangjun Peng, Qingfeng Wang, Xu Sun, Chunye Gong, Yaohua Wang:
Succinct Representations in Collaborative Filtering: A Case Study using Wavelet Tree on 1, 000 Cores. 427-432 - Aisya Nafiisyanti:
Comparison of Binary Rain Prediction on HIMAWARI using MPI and CUDA. 433-438 - Zikai Zhang, Hairong Dong, Yidong Li, Yizhe You, Fengping Zhao:
Attention-Based Supply-Demand Prediction for Autonomous Vehicles. 439-444 - Ramesh Pokhrel, Ashish Rauniyar, Anis Yazidi:
In the Quest of Trade-off between Job Parallelism and Throughput in Hadoop: A Stochastic Learning Approach for Parameter Tuning on the Fly. 445-450 - Yonggang Qi, Jiashen Zhang, Zhe Xu, Di Xian:
Fengyun-4A Meteorological Satellite Data Service System. 451-454 - Ke Zhao, Shoubao Su, Haiping Huang, Jie Zhu:
Logistics Scheduling for UAV Based on Tabu Search Algorithm. 455-460 - Jian Yang, Hong Shen:
Blockchain Consensus Algorithm Design Based on Consistent Hash Algorithm. 461-466 - Ting Lv, Donghong Qin, Lina Ge, Song Wen:
A Map-Reduce-Based Relation Inference Algorithm for Autonomous System. 467-470 - Jiaman Ding, Haibin Li, Yuanyuan Wang, Lianyin Jia, Jinguo You, Yang Yang:
A Parallel Uncertain Frequent Itemset Mining Algorithm with Spark. 471-474 - Yimu Ji, Shuai Chen, Haichang Yao, Houzhi Fang, Kui Li, Shangdong Liu, Zhengyuan Xie, Kairui Wang:
Multi-Thread Concurrent Compression Algorithm for Genomic Big Data. 475-478 - Vincent Portella, Hong Shen:
An Improved Online Multidimensional Bin Packing Algorithm. 479-482 - Kithmini Godawatte, Mansoor Syed Raza, Mohsin Murtaza, Ather Saeed:
Dark Web Along With The Dark Web Marketing And Surveillance. 483-485 - Xiu Xu, Changzheng Zhu:
An Improved DV-hop Algorithm Based on Iterative Computation and two Communication Ranges for Sensor Network Localization. 486-489 - Zhansheng Chen, Hong Shen:
A Gird-Based Joint Routing and Energy Replenish Scheme for Rechargeable Wireless Sensor Networks. 490-495 - Zhansheng Chen, Hong Shen:
Joint Mobile Data Collection and Energy Supply Scheme for Rechargeable Wireless Sensor Networks. 496-500 - Xuejiao Mu, Hong Shen, Zhigang Lu:
A Temporal Caching-Aware Dummy Selection Location Algorithm. 501-504 - Ye Yuan, Xiaoying Kong, Gengfa Fang, Li Liu, Sanya Khruahong:
Development of Semantic Model of Multi-Level-Building Navigation Using Indoor Ontology and Dijkstra's Algorithm. 505-508 - Huajian Chang, Hong Shen:
A Modified Community-Level Diffusion Extraction in Social Network. 509-512 - Qi Chen, Lingwei Wei:
Overlapping Community Detection of Complex Network: A Survey. 513-516 - Kyaw Zaw Ye, Soe Myint Maung, Zaw Htet, Kyaw Thu Aung, Aung Myat Kyaw, Pyae Sone Ko Ko, Sithu Thant Zin:
Information Management Software Systems for Improving Reliability. 517-520 - Xiaofan Zhao, Manchun Cai, Yuan Ren, Fan Yang:
Image Preprocessing Algorithm Based on K-Means. 521-524 - Moena Yamasaki, Akira Yamawaki:
Effect of Parallel Processing by Duplicating Histogram in Automatic Image Binarization for High-Level Synthesis. 525-528 - Wenjun Cui, Yidong Li:
Infinite Propagation Speed for a Two-Component Camassa-Holm Equation. 529-533
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.