


default search action
ICA3PP 2015: Zhangjiajie, China
- Guojun Wang, Albert Y. Zomaya

, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings. Lecture Notes in Computer Science 9532, Springer 2015, ISBN 978-3-319-27160-6
The 6th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2015)
- Meili Cao, Haizhen He, Rongming Luo, Lei Wen:

Nth-Order Multifunction Filter Employing Current Differencing Transconductance Amplifiers. 3-12 - Zheng Ma, Jin Zheng, Weijia Jia

, Guojun Wang:
An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor Network. 13-23 - Yuling Liu, Zuhong Liu:

An Improved Method for Reversible Data Hiding in Encrypted Image. 24-34 - Hongyun Xu, Jun Yang, Yong Zhang, Mengzhen Xu, Jiayi Gan:

Study on Personalized Location Privacy Preservation Algorithms Based on Road Networks. 35-45 - Peixin Chen, Xiaofeng Wang, Jinshu Su:

A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups. 46-56 - Ryan K. L. Ko

, Giovanni Russello, Richard Nelson, Shaoning Pang
, Aloysius Cheang, Gillian Dobbie, Abdolhossein Sarrafzadeh, Sivadon Chaisiri
, Muhammad Rizwan Asghar
, Geoffrey Holmes:
STRATUS: Towards Returning Data Control to Cloud Users. 57-70 - Yu Zhang, Yanbing Liu

, Jing Yu, Ping Liu, Li Guo:
VSEP: A Distributed Algorithm for Graph Edge Partitioning. 71-84 - Qun Liao, Shuangshuang Jiang, Qiaoxiang Hei, Tao Li, Yulu Yang:

Scheduling Stochastic Tasks with Precedence Constrain on Cluster Systems with Heterogenous Communication Architecture. 85-99 - Weixiang Zhang, Bo Wei, Huisen Du:

An Output-Oriented Approach of Test Data Generation Based on Genetic Algorithm. 100-108
The 5th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-15)
- Chengcheng Xu, Shuhui Chen, Xiaofeng Wang, Jinshu Su:

An Efficient Pre-filter to Accelerate Regular Expression Matching. 111-119 - Li-e Wang, Xianxian Li:

A Hybrid Optimization Approach for Anonymizing Transactional Data. 120-132 - Mingwu Zhang, Biwen Chen, Hua Shen:

Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption. 133-142 - Jinkun Geng, Daren Ye, Ping Luo:

Predicting Severity of Software Vulnerability Based on Grey System Theory. 143-152 - Huikang Hao, Zhoujun Li, Yueying He, Jinxin Ma:

Characterization of Android Applications with Root Exploit by Using Static Feature Analysis. 153-165 - Yufeng Wang, Xiaohong Chen, Qun Jin, Jianhua Ma:

LIP3: A Lightweighted Fine-Grained Privacy-Preserving Profile Matching Mechanism for Mobile Social Networks in Proximity. 166-176 - Luyan Nie, Chuanzhi Xie, Yujun Yin, Xin Li:

Context-Aware QoS Assurance for Smart Grid Big Data Processing with Elastic Cloud Resource Reconfiguration. 177-186 - Enrico Schiavone

, Andrea Ceccarelli
, Andrea Bondavalli
:
Continuous User Identity Verification for Trusted Operators in Control Rooms. 187-200 - Leyou Zhang

, Zhuanning Wang, Qing Wu:
Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model. 201-210 - Qingxin Xia, Yuqing Lan, Limin Xiao:

Scheduling Resource of IaaS Clouds for Energy Saving Based on Predicting the Overloading Status of Physical Machines. 211-221 - Jean Fortin, Frédéric Gava

:
Towards Mechanised Semantics of HPC: The BSP with Subgroup Synchronisation Case. 222-237 - Huiming Yu, Kenneth Williams, Xiaohong Yuan:

Cloud Computing Threats and Provider Security Assessment. 238-250 - Marcin Gorawski, Zacheusz Siedlecki, Anna Gorawska:

Collaborative Multiparty Association Rules Mining with Threshold Homomorphic Encryption. 251-263 - Wenjuan Tang, Yang Xu, Guojun Wang, Yaoxue Zhang:

An Illegal Indirect Access Prevention Method in Transparent Computing System. 264-275 - Hongling Xiao, Hong Song, Weiping Wang:

EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks. 276-289
The 3rd International Workshop on Network Optimization and Performance Evaluation (NOPE 2015)
- Xiaojie Zhang, Nao Wang, Xin Zheng, Gaocai Wang, Dongmei Bin:

Energy Saving Mechanism Analysis Based on Dynamic Resource Scaling for Cloud Computing. 293-301 - Xiaolong Gong, Gaocai Wang, Nao Wang:

An Optimal Rate Adaptive Video Streaming Scheme to Improve QoE of Dash. 302-310 - Dongmei Bin, Ying Peng, Gaocai Wang:

Community-Based Energy-Aware Routing Protocol in Mobile Social Networks. 311-321 - Ming Liu, Xiaoling Yang, Fanling Huang, Yanming Fu:

Research of CMABC Algorithm in Intrusion Detection. 322-332 - Zheng Xu, Buyang Cao:

A Parallel Tabu Search Algorithm with Solution Space Partition for Cohesive Clustering Problems. 333-343 - Guiyun Liu, Jing Yao, Hongbin Chen, Han Zhang, Dong Tang:

Symmetric Game for Distributed Estimation in Energy Harvesting Wireless Sensor Networks with Selfish Sensors. 344-352 - Limin Xiao, Qiaoling Zhong, Zhisheng Huo, Ang Li, Li Ruan, Kelong Liu, Yuanyuan Zang, Zheqi Lu:

File Creation Optimization for Metadata-Intensive Application in File Systems. 353-363 - Shicong Ma, Baosheng Wang, Xianming Gao, Xiaozhe Zhang:

A Sharing-Memory Based Ring Framework. 364-369 - Binji Mo, Yang Xu, Guojun Wang:

Streaming Computing Technology for Android Applications: Design Model and Case Study. 370-381 - Lifang Liu, Xiaogang Qi

, Gengzhong Zheng, Mande Xie:
An Energy-Efficient Aggregation and Collection Algorithm for Heterogeneous Wireless Sensor Network. 382-392 - Ronghua Shi, Kun Tang, Jian Dong, Wentai Lei, Chunhua Peng, Yunxiang Jiang:

TDD-Based Massive MIMO Systems: Overview and Development. 393-402
The 2nd International Symposium on Sensor-Cloud Systems (SCS 2015)
- Zeyu Sun, Weiguo Wu, Xiaofei Xing, Chuanfeng Li, Yalin Nie, Yangjie Cao:

A Hierarchical Shared Key Algorithm in Wireless Sensor Networks. 405-412 - Yangjie Cao, Huimin Lu, Xiaodong Shi, Pengsong Duan:

Evaluation Model of the Cloud Systems Based on Queuing Petri Net. 413-423 - Liu Yang:

MTCPP: Multi-targets K-Coverage Preservation Protocol in Wireless Sensor Networks. 424-432
The 2nd Workshop on Security and Privacy Protection in Computer and Network Systems (SPPCN 2015)
- Chun-Ta Li

, Cheng-Chi Lee
, Chun-Cheng Wang, Tzu-Hui Yang, Song-Jhih Chen:
Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments. 435-444 - Rajeswary Ravi, Greeshma N. Gopal:

Privacy Preserving Personalization in Probabilistic Search. 445-453 - Yang Yu, Qi Dong, Zhipeng Luo, Hao Chen, Jun Deng, Wei Guan:

A Security-Critical Task Management Method for Distributed Real-Time Systems. 454-464 - Chengye Li, Yangyue Xiang, Jiangyong Shi:

A Model of Dynamic Malware Analysis Based on VMI. 465-475 - Roshni Kadeparambil Raphel, Muhammed Ilyas H., Janu R. Panicker:

Multiple Secret Sharing Using Natural Language Letter Based Visual Cryptography Scheme. 476-486 - Qun Li, Lei Zhang, Shifeng Hou, Zhenxiang Chen, Hongbo Han:

Reconstruction of Android Applications' Network Behavior Based on Application Layer Traffic. 487-496 - Shanshan Wang, Shifeng Hou, Lei Zhang, Zhenxiang Chen, Hongbo Han:

Android Malware Network Behavior Analysis at HTTP Protocol Packet Level. 497-507 - Deepa S. Nair, Muhammed Ilyas H.:

Energy Efficient Encryption Scheme for Network-Coded Mobile Ad Hoc Networks. 508-517
The 1st International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2015)
- Changji Wang, Jing Liu:

Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks. 521-530 - Zhen Peng, Tian Wang, Md. Zakirul Alam Bhuiyan

, Xiaoqiang Wu, Guojun Wang:
Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks. 531-540 - Dacheng Wang, Hong Song, Yun Xu, Wenhao Zhang, Jianxin Wang:

A Web-Based Resource Management Platform for Transparent Computing. 541-550 - Xia Wei, Wen-Xiang Li, Cong Ran, Chunchun Pi, Ya-Jie Ma, Yuxia Sheng:

Architecture and Scheduling Method of Cloud Video Surveillance System Based on IoT. 551-560 - Wei Shi, Gaofeng Lv, Zhigang Sun, Zhenghu Gong:

HiTrans: An FPGA-Based Gateway Design and Implementation in HPC Environments. 561-571 - Christian Esposito

, Aniello Castiglione
, Francesco Palmieri
:
Dealing with Reliable Event-Based Communications by Means of Layered Multicast. 572-581 - Jin B. Hong

, Chun-Jen Chung, Dijiang Huang
, Dong Seong Kim
:
Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. 582-592 - Peixin Chen, Xiaofeng Wang, Baokang Zhao, Jinshu Su, Ilsun You:

Removing Key Escrow from the LW-HIBE Scheme. 593-605 - Hui Li, Nengjun Qiu, Mei Chen, Hongyuan Li, Zhenyu Dai, Ming Zhu, Menglin Huang:

FASTDB: An Array Database System for Efficient Storing and Analyzing Massive Scientific Data. 606-616 - Sheng Xu, Binzhang Fu, Mingyu Chen, Lixin Zhang:

An Effective Correlation-Aware VM Placement Scheme for SLA Violation Reduction in Data Centers. 617-626 - Jemal H. Abawajy, Mohammad Mehedi Hassan:

Reliability-Aware Distributed Computing Scheduling Policy. 627-632 - Peixin Chen, Xiaofeng Wang, Jinshu Su:

An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage. 633-647 - Adil Amjad Sheikh, Ahmed Lbath, Ehsan Ullah Warriach, Emad A. Felemban

:
A Predictive Data Reliability Method for Wireless Sensor Network Applications. 648-658 - Liu Chen, Wei Zhou:

A Cycle-Time-Analysis Model for Byzantine Fault Tolerance. 659-668 - Adrian Johannes, Priyadarsi Nanda, Xiangjian He

:
Resource Utilization Based Dynamic Pricing Approach on Cloud Computing Application. 669-677 - Wei Zhou, Yang Xu, Lijuan Yang, Guojun Wang:

Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications. 678-690 - Haihe Ba, Huaizhe Zhou, Zhiying Wang, Jiangchun Ren, Tie Hong, Yiming Li:

Application-Assisted Dynamic Attestation for JVM-Based Cloud. 691-700 - Fang Qi, Xin Tang, Quanyun Wei:

New Escrow-Free Scheme for Hierarchical Identity-Based Encryption. 701-713 - Marcin Gorawski, Miroslaw Skrzewski, Michal Gorawski

, Anna Gorawska:
Neural Networks in Petrol Station Objects Calibration. 714-723 - Silvia Grampone, Witold Litwin, Thomas J. E. Schwarz:

A Dependable, Scalable, Distributed, Virtual Data Structure. 724-735 - Zhen Wang, Jianhui Jiang:

Effect of Bias Temperature Instability on Soft Error Rate. 736-745 - Taehoon Eom, Jin B. Hong

, Jong Sou Park, Dong Seong Kim
:
Security Modeling and Analysis of a SDN Based Web Service. 746-756 - Anjana P. Das, Sabu M. Thampi

:
Single Anchor Node Based Localization in Mobile Underwater Wireless Sensor Networks. 757-770 - Tao Lin, Jianhua Gao, Xue Fu, Yan Lin:

A Novel Bug Report Extraction Approach. 771-780 - Xin Zhou, Hui Li, Xiao Zhang, Shan Wang, Yanyu Ma, Ke-yan Liu, Ming Zhu, Menglin Huang:

ABR-Tree: An Efficient Distributed Multidimensional Indexing Approach for Massive Data. 781-790 - Zhihai Wang, Weidong Chen:

A Simple Local Search Algorithm for Minimizing Interference in Wireless Sensor Networks. 791-799 - Fengli Zhang, Junjiao Zhang, Hongchuan Zhou:

Unknown Bit Stream Protocol Message Discovery with Zero Knowledge. 800-809 - Yanzhu Liu, Zhi Li, Yuxia Sun:

Distributed Authentication in the Cloud Computing Environment. 810-818 - Mahnaz Malekzadeh, Iain Bate:

Influential Nuisance Factors on a Decision of Sufficient Testing. 819-828 - Jun Xu, Yong Tang:

Research of Improved Particle Swarm Optimization Based on Genetic Algorithm for Hadoop Task Scheduling Problem. 829-834 - Yang Liu, Liang Deng:

Acceleration of CFD Engineering Software on GPU and MIC. 835-848

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














