


default search action
19th PDCAT 2018: Jeju Island, South Korea
- Jong Hyuk Park, Hong Shen, Yunsick Sung, Hui Tian:

Parallel and Distributed Computing, Applications and Technologies, 19th International Conference, PDCAT 2018, Jeju Island, South Korea, August 20-22, 2018, Revised Selected Papers. Communications in Computer and Information Science 931, Springer 2019, ISBN 978-981-13-5906-4
Networking and Architectures
- Xiaochun Wang, Yidong Li, Yi Jin, Wei Wang:

Spectrum-Centric Differential Privacy for Hypergraph Spectral Clustering. 3-14 - Zhansheng Chen, Hong Shen, Xiaofan Zhao, Tingmei Wang:

Efficient Scheduling Strategy for Data Collection in Delay-Tolerant Wireless Sensor Networks with a Mobile Sink. 15-27 - Huaiwen He, Hong Shen:

Green vs Revenue: Data Center Profit Maximization Under Green Degree Constraints. 28-40 - Lei Liu, Mingzheng Li, Lei Mei, Ye Tian

:
Design and Implementation of a Novel SDN-Based Architecture for Wi-Fi Networks. 41-49 - Jiyoung Lim, Sanghyun Lim:

Location Based One-Time Conference Protocol Without Personal Information. 50-55 - Chenxi Luo, Zhu Wang, Tiejian Luo:

Evaluation for Two Bloom Filters' Configuration. 56-62 - Jiajia Jiao, Dezhi Han:

A Fast Global AVF Calculation Methodology for Multi-core Reliability Assessment. 63-72 - Tinglei Zhao, Jianzhong Qiao, Shukuan Lin, Yanhua Wang:

Adaptive Control and Optimization on Dynamic Load Balancing Model. 73-83 - Kyung-Soo Lim, Seoung-Hyeon Lee, Jong Wook Han, Geon Woo Kim:

Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing. 84-89 - Xizi Wang, Li Wang:

Investment Intention Towards Online Peer-to-Peer Platform: A Data Mining Approach Based on Perceived Value Theory. 90-99 - Enes Bajrovic, Siegfried Benkner, Jirí Dokulil:

Pipeline Patterns on Top of Task-Based Runtimes. 100-110 - Yue Lu, Hui Tian

, Jiajia Yin:
A Real-Time Routing Protocol in Wireless Sensor-Actuator Network. 111-120 - Yue Lu, Hui Tian, Hong Shen, Dongdong Xu:

Privacy Preserving Classification Based on Perturbation for Network Traffic. 121-132 - Farzin Piltan, Jong-Myon Kim:

Fault Diagnosis of a Wireless Sensor Network Using a Hybrid Method. 133-142 - Seung-Mo Je, Jun-Ho Huh

:
An Optimization Theory of Home Occupants' Access Data for Determining Smart Grid Service. 143-152 - Changmin Jeong, Mirim Ahn, Haengho Lee, YoungGiu Jung:

Automatic Classification of Transformed Protocols Using Deep Learning. 153-158 - Jaeheon Kwak, Jinkyu Lee:

Covert Timing Channel Design for Uniprocessor Real-Time Systems. 159-168
Algorithms and Applications
- Hethini Ribeiro, Roberta Spolon Ulson, Aleardo Manacero Jr.

, Renata Spolon Lobato:
Parallelization of the DIANA Algorithm in OpenMP. 171-176 - YiAn Zuo, ZhiXun Zheng, De Li:

Flash Animation Watermarking Algorithm Based on SWF Tag Attributes. 177-187 - Asma Hassani

, Sonia Ayachi Ghannouchi:
Analysis of Massive E-learning Processes: An Approach Based on Big Association Rules Mining. 188-199 - Seunghyun Lee, Minseop Kim, Inwhee Joe:

SGNet: Design of Optimized DCNN for Real-Time Face Detection. 200-209 - Cong Thuan Do, Min Goo Moon, Jong-Myon Kim, Cheol Hong Kim:

A Study on L1 Data Cache Bypassing Methods for High-Performance GPUs. 210-219 - Hong Jun Choi, Dong Oh Son, Cheol Hong Kim:

Memory Contention Aware Power Management for High Performance GPUs. 220-229 - Gwang Bok Kim, Jong-Myon Kim, Cheol Hong Kim:

Dynamic Selective Warp Scheduling for GPUs Using L1 Data Cache Locality Information. 230-239 - Songyuan Li, Hong Shen, Yingpeng Sang:

An Efficient Model and Algorithm for Privacy-Preserving Trajectory Data Publishing. 240-249 - Xizi Wang, Li Wang:

What Makes Charitable Crowdfunding Projects Successful: A Research Based on Data Mining and Social Capital Theory. 250-260 - Cristina Georgiana Calancea, Lenuta Alboaie, Andrei Panu:

A SwarmESB Based Architecture for an European Healthcare Insurance System in Compliance with GDPR. 261-267 - Jeong Seok Oh:

A Study on Deriving and Simulating Pre-risk on Complex Gas Facilities for Preventing Accidents. 268-273 - Intissar Khalifa, Ridha Ejbali

, Mourad Zaied:
Body Gesture Modeling for Psychology Analysis in Job Interview Based on Deep Spatio-Temporal Approach. 274-284 - Yatu Ji, Hongxu Hou, Ying Lei, Zhong Ren:

An Optimized Regularization Method to Enhance Low-Resource MT. 285-295 - Ugiwyeon Lee, Jeong Seok Oh:

A Development of Architecture for Risk Area Prediction System. 296-303 - Chungin Lee, Doyeon Kim, Sujeong Kim, Yunsick Sung:

Design of SNS-Based English Word Learning System for Daily Study. 304-312 - Eunhee Park, Namgwang Ryu, Jisun Lee, Yunsick Sung:

Study of Real Toy Tank-Based Mixed Reality Contents. 313-321 - Nhan Tran Van, Hoanh-Su Le

:
Smart Grid an Advanced Method for Saving Energy in Vietnam. 322-328 - Jeonghoon Kwak, Sang-Geol Lee, Yunsick Sung:

Autonomous Flight Control Method of Drones for Enforcement of Traffic Law Violation. 329-334 - Yechan Yu, HoJin Kim, Jinjoo Ha, Daewoo Kim, Kang Yi:

Cost-Performance Comparison of Various Accelerator Implementation Platforms for Deep Convolutional Neural Network. 335-344 - Jungseok Cho, Jeongdoo Lee, Doosan Cho:

A Prediction Method of Solar Power Generator using Machine Learning Techniques. 345-352 - Ga-Yeon Kim, Jeong-Yong Byun:

A Glyph Reduction Evaluation of Combined Jeongeum-Fonts. 353-358
Software Systems and Technologies
- Mouna Jouini, Latifa Ben Arfa Rabai

, Ridha Khédri:
Software Requirements for an Ultra Large Scale System to Compute Multi Dimension Mean Failure Cost. 361-370 - Yeong-Seok Seo

, Hyun-Soo Jang:
A Study of an Automated Software Effort Measurement Method. 371-380 - Taoufik Sakka Rouis, Mohamed Tahar Bhiri, Mourad Kmimech, Layth Sliman

:
A Generic Approach for the Verification of Static and Dynamic Behavioral Properties of SCDL/WS-BPEL Service-Component Architectures. 381-389 - Nesrine Missaoui

, Sonia Ayachi Ghannouchi
:
Pattern-Based Approaches for Business Process Improvement: A Literature Review. 390-400
Security and Privacy
- Shan Yang, Liang Chen, De Li:

Research on Image Content Authentication Algorithm of Semi-fragile Watermarking for Adaptive Embedding Based on Characteristic of Image. 403-413 - Gimin Bae, Sunggyun Jang, Minseop Kim, Inwhee Joe:

Autoencoder-Based on Anomaly Detection with Intrusion Scoring for Smart Factory Environments. 414-423 - Ioana Stanescu, Lenuta Alboaie, Andrei Panu:

Blockchain and Smart-Contracts Modeled in a SwarmESB Ecosystem. 424-432 - Jehn-Ruey Jiang, Hanas Subakti, Ching-Chih Chen, Kazuya Sakai:

PINUS: Indoor Weighted Centroid Localization with Crowdsourced Calibration. 433-443 - Seongkyu Kim, Hyun-Taek Kwon, Young-Kun Kim, Yong-Pil Park, Dae-Won Keum, Ung-Mo Kim:

A Study on Application Method for Automation Solution Using Blockchain dApp Platform. 444-458 - Manish Singh, Yichen Han:

Towards a Two Factor Authentication Method Using Zero-Knowledge Protocol in Online Banking Services. 459-472 - Jinyeong Kang, Inwhee Joe:

Security Vulnerability Analysis of Wi-Fi Connection Hijacking on the Linux-Based Robot Operating System for Drone Systems. 473-482

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














