


default search action
20th PDCAT 2019: Gold Coast, Australia
- 20th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2019, Gold Coast, Australia, December 5-7, 2019. IEEE 2019, ISBN 978-1-7281-2616-6

- Wenjie Zou, Longkun Guo, Peihuang Huang:

Min-Max Movement of Sink-Based Mobile Sensors in the Plane for Barrier Coverage. 1-6 - Xinchen Li, Huan Cai, Gang Liu, Kezhong Lu:

Base Station Positioning in Single-Tiered Wireless Sensor Networks. 7-12 - Chunyue Zhou, Hui Tian, Yaocong Dong, Baitong Zhong:

An Energy-Saving Routing Algorithm for Opportunity Networks Based on Sleeping Mode. 13-18 - Maede Fotros, Mohammad Mansour Riahi Kashani, Javad Rezazadeh, John Ayoade:

A Timely VANET Multi-hop Routing Method in IoT. 19-24 - Marcel Köster, Julian Groß, Antonio Krüger

:
Parallel Tracking and Reconstruction of States in Heuristic Optimization Systems on GPUs. 25-30 - Haoxin Luo, Ye Cai, Qiuming Luo, Rui Mao:

FPGA-Based Parallel Multi-Core GZIP Compressor in HDFS. 31-35 - Naixuan Zhao, Ge Zhang, Zijian Wang, Ling Kuang:

GPU Parallel Acceleration of Frequency Domain Algorithm for Calculating Radar Target Echoes. 36-40 - Yongjie Yang, Cheng Zhong, Danyang Chen:

Accelerating Alignment for Short Reads Allowing Insertion of Gaps on Multi-Core Cluster. 41-45 - M. Reza Hoseinyfarahabady, Ali Jannesari

, Wei Bao, Zahir Tari
, Albert Y. Zomaya:
Real-Time Stream Data Processing at Scale. 46-51 - Benbo Zha, Hong Shen:

I/O Scheduling for Limited-Size Burst-Buffers Deployed High Performance Computing. 52-57 - Xin Long, Jigang Wu, Yalan Wu, Long Chen:

Task Merging and Scheduling for Parallel Deep Learning Applications in Mobile Edge Computing. 58-62 - Victor V. Toporkov, Dmitry Yemelyanov:

Coordinated and Hindsight Resources Allocation in Distributed Computing. 63-68 - Tikaram Sanyashi, Anasuya Acharya, Bernard Menezes:

Plaintext Recovery Attacks and Their Mitigation in an Application-Specific SHE Scheme. 69-74 - Matthew O'Connor, W. Bastiaan Kleijn

:
Finite Approximate Consensus for Privacy in Distributed Sensor Networks. 75-77 - Mnar Saeed Alnaghes

, Hong Shen:
Modeling Data Transmission in Mobile Ad-hoc Networks for Characterizing Black-Hole Attacks. 78-83 - Yue Lu, Hui Tian

, Jingjing Yu:
Privacy Preservation for Network Traffic Classification. 84-89 - Molin Li, Tong Chen, Jiaxin Zeng, Xiaobo Zhou, Keqiu Li, Heng Qi:

D2D-Assisted Computation Offloading for Mobile Edge Computing Systems with Energy Harvesting. 90-95 - Yosra Benchaabene, Noureddine Boujnah

, Faouzi Zarai:
Ultra Reliable Communication : Availability Analysis in 5G Cellular Networks. 96-102 - Xingchun Liu, Zhipeng Feng, Jingjing Yu, Ying Tao, Shubo Ren:

Adaptive Clustering Strategy Based on Capacity Weight. 103-108 - Wenqi Zhang, Jingjing Yu, Xingchun Liu, Ying Tao, Shubo Ren:

Low-Energy Dynamic Clustering Scheme for Wireless Sensor Networks. 109-114 - Zheng Du, Jing Zhang, Shihao Sha, Qiuming Luo:

Implementing the Matrix Multiplication with DFC on Kunlun Small Scale Computer. 115-120 - Sandra Catalán

, Xavier Martorell, Jesús Labarta, Tetsuzo Usui
, Leonel Antonio Toledo Díaz, Pedro Valero-Lara:
Accelerating Conjugate Gradient using OmpSs. 121-126 - Leonel Toledo, Antonio J. Peña

, Sandra Catalán
, Pedro Valero-Lara:
Tasking in Accelerators: Performance Evaluation. 127-132 - Nirmal Kumbhare, Aniruddha Marathe

, Ali Akoglu
, Salim Hariri, Ghaleb Abdulla:
Adaptive Power Reallocation for Value-Oriented Schedulers in Power-Constrained HPC. 133-139 - Yugu Hu, Lina Ge, Guifen Zhang, Donghong Qin:

Research on Differential Privacy for Medical Health Big Data Processing. 140-145 - Faheem Ullah, Muhammad Ali Babar:

Quantifying the Impact of Design Strategies for Big Data Cyber Security Analytics: An Empirical Investigation. 146-153 - Adnan Mahmood

, Sarah Ali Siddiqui, Wei Emma Zhang
, Quan Z. Sheng
:
A Hybrid Trust Management Model for Secure and Resource Efficient Vehicular Ad hoc Networks. 154-159 - Shin Morishima:

Scalable Anomaly Detection Method for Blockchain Transactions using GPU. 160-165 - Dongxiao Quan, Li Niu, Lili Zhu, Changxing Pei:

Fault-Tolerant Logical Hadamard Gates Implementation in Reed-Muller Quantum Codes. 166-172 - QiFei Wei, Dongxiao Quan, Jing Liu

, Changxing Pei:
Efficient Fault-Tolerant Syndrome Measurement of Quantum Error-Correcting Codes Based on "Flag". 173-178 - Na Chen

, Bin Yan
, Shuangshuang Shuai, Changxing Pei:
Faithful Multi-Hop Qubit Transmission Based on GHZ States. 179-183 - Elijah Pelofske, Georg Hahn, Hristo N. Djidjev:

Peering Into the Anneal Process of a Quantum Annealer. 184-189 - Wenting Wei, Kun Wang, Kexin Wang, Shengjun Guo, Huaxi Gu:

A Virtual Machine Placement Algorithm Combining NSGA-II and Bin-Packing Heuristic. 190-195 - Tao Tang, Hao Wu, Wei Bao, Pengyi Yang, Dong Yuan, Bing Bing Zhou:

New Parallel Algorithms for All Pairwise Computation on Large HPC Clusters. 196-201 - Kejian Li, Gang Liu, Minhua Lu:

A Holistic Stream Partitioning Algorithm for Distributed Stream Processing Systems. 202-207 - Dylan Matthew Janssen, Alan Wee-Chung Liew

:
Acceleration of Genetic Algorithm on GPU CUDA Platform. 208-213 - Xiongwei Fei, Kenli Li, Shui Yu

, Keqin Li:
An Economical and High-Quality Encryption Scheme for Cloud Servers with GPUs. 214-219 - Mohamed Hedi Fourati, Soumaya Marzouk, Khalil Drira, Mohamed Jmaiel:

DOCKERANALYZER : Towards Fine Grained Resource Elasticity for Microservices-Based Applications Deployed with Docker. 220-225 - Sasa Pesic, Milos Radovanovic, Mirjana Ivanovic

, Costin Badica
, Milenko Tosic, Ognjen Ikovic, Dragan Boskovic:
CAAVI-RICS Model for Analyzing the Security of Fog Computing Systems: Authentication. 226-231 - Xiangyu Liu, Manish Singh, Xiufeng Xia:

Protecting Sensitive Location Visits Against Inference Attacks in Trajectory Publishing. 232-239 - Günter Fahrnberger

:
Outlier Removal for the Reliable Condition Monitoring of Telecommunication Services. 240-246 - Zhengxiong Hou, Shuxin Zhao, Chao Yin, Yunlan Wang, Jianhua Gu, Xingshe Zhou:

Machine Learning Based Performance Analysis and Prediction of Jobs on a HPC Cluster. 247-252 - Chuyue Zhang, Manchun Cai, Xiaofan Zhao:

Research on Case Preprocessing Based on Bert -CNN-LSTM Model. 253-258 - Samundra Deep, Xi Zheng

:
Hybrid Model Featuring CNN and LSTM Architecture for Human Activity Recognition on Smartphone Sensor Data. 259-264 - Haixin Du, Jiankui Zhang, Shihao Sha, Cai Ye, Qiuming Luo:

The Library for Hadoop Deflate Compression Based on FPGA Accelerator with Load Balance. 265-270 - Uwe Jahn, Vladimir Poliakov

, Meghadoot Gardi, Peter Schulz
, Carsten Wolff
:
Introducing PulseAT: A Tool for Analyzing System Utilization in Distributed Systems. 271-276 - Yuki Yamagata, Akira Yamawaki:

Development of Filled Circle Drawing in High-Level Synthesis Oriented Game Programming Library. 277-281 - Hiroyuki Takizawa

, Shinji Shiotsuki, Naoki Ebata, Ryusuke Egawa:
An OpenCL-Like Offload Programming Framework for SX-Aurora TSUBASA. 282-288 - Jingyao Zhang:

Concurrent Failure Recovery for Product Matrix Regenerating Code. 289-294 - Francis C. Joseph

, Gurunath Gurrala:
Scalability of Parareal for Large Power Grid Simulations. 295-300 - Kasra Majbouri Yazdi, Adel Majbouri Yazdi, Saeid Khodayi, Jingyu Hou, Wanlei Zhou

, Saeid Saedy, Mehrdad Rostami
:
Improving Recommender Systems Accuracy in Social Networks Using Popularity. 301-307 - Ryoma J. Ohira, Md. Saiful Islam

:
A Distributed Genetic Algorithm with Adaptive Diversity Maintenance for Ordered Problems. 308-313 - Nissaf Fredj, Yessine Hadj Kacem

, Mohamed Abid:
A Model Driven-Based Approach for Managing Unanticipated Runtime Adaptation of RTE Systems. 314-319 - Agnieszka M. Zbrzezny, Olga Siedlecka-Lamch

, Sabina Szymoniak
, Miroslaw Kurkowski:
SMT Solvers as Efficient Tools for Automatic Time Properties Verification of Security Protocols. 320-327 - Igor M. Kulikov

, Igor G. Chernykh
, Andrei Tchernykh
:
A Scalable Parallel Computing Framework for Large-Scale Astrophysical Fluid Dynamics Numerical Simulation. 328-333 - Mahdi Amiri-Kordestani, David M. Eyers, Zhiyi Huang, Morteza Biglari-Abhari:

TrustZone for Supervised Asymmetric Multiprocessing Systems. 334-339 - Hao Liao, Qi-Xin Liu, Alexandre Vidmer, Ming-Yang Zhou, Rui Mao:

RNC: Reliable Network Property Classifier Based on Graph Embedding. 340-345 - Cailen Robertson

, Jia Li, Ryoma J. Ohira, Quoc Viet Hung Nguyen
, Jun Jo
:
Optimising Deep Learning Split Deployment for IoT Edge Networks. 346-351 - Humayun Kayesh, Md. Saiful Islam

, Junhu Wang:
Event Causality Detection in Tweets by Context Word Extension and Neural Networks. 352-357 - Lu Cao, Hong Shen:

Imbalanced Data Classification Using Improved Clustering Algorithm and Under-Sampling Method. 358-363 - Zexiong Liu, Yuhong Feng, Xuan Yang:

Right Ventricle Segmentation of Cine MRI Using Residual U-net Convolutinal Networks. 364-368 - Quoc-Viet Tran

, Shun-Feng Su, Minh-Quang Tran
:
Color Distortion Removal for Heart Rate Monitoring in Fitness Scenario. 369-374 - Dibash Basukala, Ramakrishnan Mukundan, Tracy R. Melzer, Anthony Lim:

Automated Segmentation of Substantia Nigra and Red Nucleus in Quantitative Susceptibility Mapping Images. 375-380 - Guang Wei, Depei Qian, Hailong Yang, Zhongzhi Luan:

Modeling Power Consumption of The Code Execution Using Performance Counters Statistics. 381-385 - Hongseok Jeon, Chunglae Cho, Seungjae Shin, Seunghyun Yoon:

A CloudSim-Extension for Simulating Distributed Functions-as-a-Service. 386-391 - Frédéric Loulergue

, Jolan Philippe:
New List Skeletons for the Python Skeleton Library. 392-397 - Alexander Malkis

:
Reachability in Multithreaded Programs Is Polynomial in the Number of Threads. 398-403 - M. Reza Hoseinyfarahabady, Zahir Tari

, Albert Y. Zomaya:
Disk Throughput Controller for Cloud Data-Centers. 404-409 - Xiaoying Kong, Gengfa Fang, Li Liu, Tich Phuoc Tran:

Low Computational Data Fusion Approach Using INS and UWB for UAV Navigation Tasks in GPS-Denied Environments. 410-414 - Arvind Kalyan:

NFV Optimization Algorithm for Shortest Path and Service Function Assignment. 415-420 - Qiao Yan, Chunyue Zhou, Baitong Zhong, Hui Tian:

An Improved MCB Localization Algorithm Based on Received Signal Strength Indicator. 421-426 - Xiangjun Peng

, Qingfeng Wang, Xu Sun, Chunye Gong, Yaohua Wang:
Succinct Representations in Collaborative Filtering: A Case Study using Wavelet Tree on 1, 000 Cores. 427-432 - Aisya Nafiisyanti:

Comparison of Binary Rain Prediction on HIMAWARI using MPI and CUDA. 433-438 - Zikai Zhang, Hairong Dong

, Yidong Li, Yizhe You, Fengping Zhao:
Attention-Based Supply-Demand Prediction for Autonomous Vehicles. 439-444 - Ramesh Pokhrel, Ashish Rauniyar

, Anis Yazidi:
In the Quest of Trade-off between Job Parallelism and Throughput in Hadoop: A Stochastic Learning Approach for Parameter Tuning on the Fly. 445-450 - Yonggang Qi, Jiashen Zhang, Zhe Xu, Di Xian:

Fengyun-4A Meteorological Satellite Data Service System. 451-454 - Ke Zhao, Shoubao Su, Haiping Huang, Jie Zhu:

Logistics Scheduling for UAV Based on Tabu Search Algorithm. 455-460 - Jian Yang, Hong Shen:

Blockchain Consensus Algorithm Design Based on Consistent Hash Algorithm. 461-466 - Ting Lv, Donghong Qin, Lina Ge, Song Wen:

A Map-Reduce-Based Relation Inference Algorithm for Autonomous System. 467-470 - Jiaman Ding, Haibin Li, Yuanyuan Wang, Lianyin Jia, Jinguo You, Yang Yang:

A Parallel Uncertain Frequent Itemset Mining Algorithm with Spark. 471-474 - Yimu Ji, Shuai Chen, Haichang Yao, Houzhi Fang, Kui Li, Shangdong Liu, Zhengyuan Xie, Kairui Wang:

Multi-Thread Concurrent Compression Algorithm for Genomic Big Data. 475-478 - Vincent Portella, Hong Shen:

An Improved Online Multidimensional Bin Packing Algorithm. 479-482 - Kithmini Godawatte, Mansoor Syed Raza, Mohsin Murtaza

, Ather Saeed:
Dark Web Along With The Dark Web Marketing And Surveillance. 483-485 - Xiu Xu, Changzheng Zhu:

An Improved DV-hop Algorithm Based on Iterative Computation and two Communication Ranges for Sensor Network Localization. 486-489 - Zhansheng Chen, Hong Shen:

A Gird-Based Joint Routing and Energy Replenish Scheme for Rechargeable Wireless Sensor Networks. 490-495 - Zhansheng Chen, Hong Shen:

Joint Mobile Data Collection and Energy Supply Scheme for Rechargeable Wireless Sensor Networks. 496-500 - Xuejiao Mu, Hong Shen, Zhigang Lu:

A Temporal Caching-Aware Dummy Selection Location Algorithm. 501-504 - Ye Yuan, Xiaoying Kong, Gengfa Fang, Li Liu, Sanya Khruahong

:
Development of Semantic Model of Multi-Level-Building Navigation Using Indoor Ontology and Dijkstra's Algorithm. 505-508 - Huajian Chang, Hong Shen:

A Modified Community-Level Diffusion Extraction in Social Network. 509-512 - Qi Chen, Lingwei Wei:

Overlapping Community Detection of Complex Network: A Survey. 513-516 - Kyaw Zaw Ye, Soe Myint Maung, Zaw Htet, Kyaw Thu Aung, Aung Myat Kyaw, Pyae Sone Ko Ko, Si Thu Thant Sin

:
Information Management Software Systems for Improving Reliability. 517-520 - Xiaofan Zhao, Manchun Cai, Yuan Ren, Fan Yang:

Image Preprocessing Algorithm Based on K-Means. 521-524 - Moena Yamasaki, Akira Yamawaki:

Effect of Parallel Processing by Duplicating Histogram in Automatic Image Binarization for High-Level Synthesis. 525-528 - Wenjun Cui, Yidong Li:

Infinite Propagation Speed for a Two-Component Camassa-Holm Equation. 529-533

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














