default search action
HPCCT 2018: Beijing, China
- Proceedings of the 2nd High Performance Computing and Cluster Technologies Conference, HPCCT 2018, Beijing, China, June 22-24, 2018. ACM 2018, ISBN 978-1-4503-6485-0
Data Theory and Processing Methods
- Jianguo Jiang, Xuebin Yuan, Rui Mao:
Research on Role Mining Algorithms in RBAC. 1-5 - Xinjie Yu, Wentao Chen, Jiajia Miao, Jian Chen, Handong Mao, Qiong Luo, Lin Gu:
The Construction of Large Graph Data Structures in a Scalable Distributed Message System. 6-10 - Meng-Hsiun Tsai, Kai-Cheng Chuan, Jeng-Jer Shieh, Chia-Tsen Tsai, Yong Zhi Huang, Tu-Wei Li:
Microarray Data Analysis and Model Construction Based on Oversampling Approach and Decision Tree. 11-14 - Tae Jong Choi, Yeonju Lee:
Asynchronous Differential Evolution with Strategy Adaptation for Global Numerical Optimization. 15-18 - Xian-hong Fei, Chenggong Zhai, Han Qiao:
Research on Clothing and Accouterment Security Based on Big Data. 19-23
Image Processing and Applications
- Akinori Adachi, Tad Gonsalves:
White Lane Detection Using Semantic Segmentation. 24-26 - Hong Zhang, Shiqiang Hu:
An Improved Fast Visual Odometry Based on Semi-probabilistic Trimmed ICP. 27-32
Sensor Technology and Sensor Networks
- Yu-Ning Chen, Chiuyuan Chen:
Sensor Deployment under Probabilistic Sensing Model. 33-36 - Shipu Xu, Yunsheng Wang, Yong Liu, Weixiong Rao, Mingzhou Ma, Jingyin Zhao, Chenxi Zhang:
Research on WSN Routing Algorithm for Vegetable Greenhouse. 37-42 - Abdul Fuad Abdul Rahman, Azni Haslizan Ab Halim, Najwa Hayaati Mohd Alwi, Kamaruzzaman Seman Alwi, Farhan Arif Mohamad, Mohamad Nasrul Taufiq, Madihah Zulfa Mohamad, Khairul Azri Zainal Abidin:
Measuring Sensor to Cloud Energy Consumption. 43-47
Computer Science and Information Technology
- Siyu Liu, Chiuyuan Chen, Wu-Hsiung Lin:
A Suggestion of a New Measure of Importance of Nodes in Disease-propagation Graphs. 48-52 - Xuechao Li, Po-Chou Shih:
Performance Comparison of CUDA and OpenACC Based on Optimizations. 53-57 - Tao Feng, Weiyou He:
Research on Privacy Preserving of Searchable Encryption. 58-68 - Mohammad Hashem Haghighat, Zhe Fu, Jun Li:
HES: Highly Efficient and Scalable Technique for Matching Regex Patterns. 69-78 - Zhang Ying:
A Multitask Conflict Resolution Spatio-temporal Access Control Model. 79-84 - Nurcholis Ramlan, Zainal A. Hasibuan:
Information System Strategic Planning for Local Government Based on Business Model Canvas: A Case Study at Lebak Regency. 85-89 - Sara Benyahia, Hanane Houmani, Abdelwahed Namir:
MARSC: A Macro-Architecture for Smart Cities. 90-97
Industrial Information and Electronic Technology
- Jiyao Chen, Tad Gonsalves:
Autonomous Highway Car Following System Based on Fuzzy Control. 98-101 - Budan Wu, Rongheng Lin, Ran Liu:
DMOMVP: A Business-Process-Oriented Data Model Optimization Method Based on Database Vertical Partition. 102-108 - Meiryani, Azhar Susanto:
The Influence of Information Technology on the Quality of Accounting Information System. 109-115 - Shing-Cheng Wang, Hsien-Sen Hung, Hoang-Yang Lu:
A Novel Two-Stage Fusion Detector Based on Maximum Ratio Combining and Max-Log Rules. 116-120
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.