default search action
10. 3PGCIC 2015: Krakow, Poland
- Fatos Xhafa, Leonard Barolli, Fabrizio Messina, Marek R. Ogiela:
10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-9473-4
3PGCIC 2015
Session 1: Cloud and Grid Computing Systems
- Luiz Fernando Bittencourt, Marcio Moraes Lopes, Ioan Petri, Omer F. Rana:
Towards Virtual Machine Migration in Fog Computing. 1-8 - Jorge Miguel, Santi Caballé, Fatos Xhafa:
A MapReduce Approach for Processing Student Data Activity in a Peer-to-Peer Networked Setting. 9-16 - Pankaj Pandey, Steven De Haes:
A Variable Payout Information Security Financial Instrument and Trading Mechanism to Address Information Security Risk. 17-25 - Kun Ma, Bo Yang:
Live Data Replication Approach from Relational Tables to Schema-Free Collections Using Stream Processing Framework. 26-31 - Viliam Malcher:
Design Patterns in Cloud Computing. 32-35 - Wenting Shen, Jia Yu, Rong Hao, Xu An Wang:
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation. 36-39
Session 2: P2P and eLearning Systems
- Mehdi Seydali Seyfabad, Behzad Akbari:
Virtual Machine Allocation in P2P-cloud Live Video Straming. 40-45 - Gianluca Moro, Tommaso Pirini, Claudio Sartori:
Network Traffic Load Balancing in Hierarchical Peer-to-Peer Systems. 46-53 - Rajendra G. Singh, Margaret A. Bernard:
Combining eLearning and P2P File-Sharing Technologies. 54-63 - Nicola Capuano, Santi Caballé:
Towards Adaptive Peer Assessment for MOOCs. 64-69 - Santi Caballé, Fatos Xhafa:
Towards a Notification System for Mobile Devices to Support Collaborative Learning. 70-76 - Adel Boukhadra, Karima Benatchba, Amar Balla:
Towards Efficient and Effective Distributed Discovery of SWs in P2P Overlay Networks. 77-84
Session 3: Big Data, Parallel Algorithms and Applications
- Maria Mirto, Giovanni Aloisio:
A Parallel Algorithm for the Prediction of Protein Binding Sites. 85-91 - Jakub Nalepa, Miroslaw Blocho:
A Parallel Algorithm with the Search Space Partition for the Pickup and Delivery with Time Windows. 92-99 - Mijeom Kim, Jungin Choi, Jaeweon Yoon:
Development of the Big Data Management System on National Virtual Power Plant. 100-107 - Mak Sharma, Philip Davies, David Newell, Philip Moore, Chander Sidhu:
Text Mining Terms and Condition to Provide a Confidence Factor for the Use of Cloud Services. 108-115 - Baojiang Cui, Peilin Shi, Jun Yang, Yongle Hao:
Uploading Deferrable Big Data to the Cloud by Improved Dynamic Self-Adaption Algorithm. 116-120 - Shicong Ma, Baosheng Wang, Xianming Gao, Xiaozhe Zhang:
Two-Tier Model for Supporting Network Functions Virtualization with FoCES. 121-126
Session 4: Mobile Computing and Social Networking
- Khaled O. Darwish, Islam El Madahh, Hoda K. Mohamed, Hadia El Hennawy:
Towards Reliable Mobile Cloud Computing. 127-133 - Sachi Nishida, Yoshiyuki Shinkawa:
A Performance Prediction Model for Google App Engine. 134-140 - Sung Woo Cho:
P2P-based Mobile Social Networks. 141-145 - Kunliang Liu, Dakun Zhang, Xu An Wang, Guozhi Song, Shuxia Ren:
Research and Implementation on Visual Analysis of Geological Volume. 146-150 - Guozhi Song, Shuxia Ren, Dakun Zhang, Kunliang Liu, Yumeng Sun, Xu An Wang:
Research on War Strategy Games on Mobile Phone Based on Cocos2d-JS. 151-155 - Valentin Burger, George Darzanos, Ioanna Papafili, Michael Seufert:
Trade-Off between QoE and Operational Cost in Edge Resource Supported Video Streaming. 156-161
Session 5: Scheduling and Resource Management in Cloud and Grid Computing
- Alba Amato, Beniamino Di Martino, Marco Scialdone, Salvatore Venticinque:
A Virtual Market for Energy Negotiation and Brokering. 162-168 - Innocenzo Mungiello:
Experimental Evaluation of Memory Optimizations on an Embedded GPU Platform. 169-174 - Michal Gregus, Jakub Zilincan:
Improving Rank of a Website in Search Results - An Experimental Approach. 175-182 - Michal Gregus, Vincent Karovic:
Practical Implementation of Private Cloud Based on Open Source ownCloud for Small Teams - Case Study. 183-187 - Qingyu Chen, Longsheng Wu, Li Li, Xuhan Ma, Xu An Wang:
Enhanced Reliability Scheduling Method for the Data in Register File. 188-193 - Xianming Gao, Baosheng Wang, Xiaozhe Zhang, Xu An Wang:
Software Data Plane and Flow Switching Plane Separation in Next-Generation Router Architecture. 194-199
Session 6: High Performance and Scalable Computing
- Fatos Xhafa, Daniel Garcia, Daniel Ramirez, Santi Caballé:
Performance Evaluation of a MapReduce Hadoop-Based Implementation for Processing Large Virtual Campus Log Files. 200-206 - Heinz Kredel, Hans-Günther Kruse, Sabine Richling:
A Hierarchical Model for the Analysis of Efficiency and Speed-Up of Multi-core Cluster-Computers. 207-215 - Hiroyuki Ishigami, Kinji Kimura, Yoshimasa Nakamura:
A New Parallel Symmetric Tridiagonal Eigensolver Based on Bisection and Inverse Iteration Algorithms for Shared-Memory Multi-core Processors. 216-223 - Anna Antonyova, Peter Antony:
Managing Control the Water Treatment Using the Electro-Flotation Technology That is Based on the Pervasive Computing with the Internet Connection. 224-230 - Qingli Zhao, Jin Li, Juxin Chen, Xu An Wang:
Efficient Numerical Simulation for the Quasilinear Elliptic Problems. 231-235 - Yin-Fu Huang, Wei-Cheng Chen:
Parallel Query on the In-Memory Database in a CUDA Platform. 236-243
Session 7: Distributed Computing
- Darshika G. Perera, Kin Fun Li:
Analysis of Computational Models and Application Characteristics Suitable for Reconfigurable FPGAs. 244-247 - Massimiliano De Benedetti, Fabio D'Urso, Fabrizio Messina, Giuseppe Pappalardo, Corrado Santoro:
UAV-based Aerial Monitoring: A Performance Evaluation of a Self-Organising Flocking Algorithm. 248-255 - Domenico Argenziano:
Implementation of an FFT Hardware Accelerator for Security Applications. 256-259 - Florian Burgstaller, Andreas Derler, Stefan Kern, Gabriel Schanner, Andreas Reiter:
Anonymous Communication in the Browser via Onion-Routing. 260-267 - Walayat Hussain, Farookh Khadeer Hussain, Omar Khadeer Hussain, Elizabeth Chang:
Profile-Based Viable Service Level Agreement (SLA) Violation Prediction Model in the Cloud. 268-272 - Hua-Chun Yang:
Face Detection Based on Multi-parts and Multi-features. 273-277
Session 8: Next Generation Systems for Mobile and Cloud Computing (Special Track)
- George Suciu, Cristina Butca, Victor Suciu, Alin Geaba, Alexandru Stancu, Stefan Arseni:
Basic Internet Foundation and Cloud Computing. 278-284 - Cristian Chilipirea, Andreea-Cristina Petre, Ciprian Dobre, Maarten van Steen:
Filters for Wi-Fi Generated Crowd Movement Data. 285-290 - Bogdan Mocanu, Florin Pop, Alexandra Mihaita Mocanu, Ciprian Dobre, Valentin Cristea:
SPIDER: A Bio-inspired Structured Peer-to-Peer Overlay for Data Dissemination. 291-295 - Ionut-Gabriel Raducu, Valentina-Camelia Bojan, Florin Pop, Mariana Mocanu, Valentin Cristea:
Real-Time Alert Service for Cyber-Infrastructure Environments. 296-303 - Alexandra Mihaita, Ciprian Dobre, Bogdan Mocanu, Florin Pop, Valentin Cristea:
Analysis of Security Approaches for Vehicular Ad-Hoc Networks. 304-309 - Cristian Chilipirea, Andreea-Cristina Petre, Ciprian Dobre, Maarten van Steen:
Proximity Graphs for Crowd Movement Sensors. 310-314
Session 9: High Performance Algorithms and Applications
- Julien Duchateau, François Rousselle, Nicolas Maquignon, Gilles Roussel, Christophe Renaud:
Accelerating Physical Simulations from a Multicomponent Lattice Boltzmann Method on a Single-Node Multi-GPU Architecture. 315-322 - José Luis Jodrá, Ibai Gurrutxaga, Javier Muguerza:
A Study of Memory Consumption and Execution Performance of the cuFFT Library. 323-327 - Maurizio Macri, Alessio De Rango, Davide Spataro, Donato D'Ambrosio, William Spataro:
Efficient Lava Flows Simulations with OpenCL: A Preliminary Application for Civil Defence Purposes. 328-335 - Nils Potthoff, Carsten Gremzow, Christoph Brandau, Dietmar Tutsch:
Performance Increase by Software Decomposition with Characteristics of Combinational Logic. 336-343 - Antonella Di Stefano, Giovanni Cammarata, Giovanni Morana, Daniele Zito:
A4SDN - Adaptive Alienated Ant Algorithm for Software-Defined Networking. 344-350 - Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, Francesco Palmieri, Aniello Castiglione:
Format-Independent Protection of DNA Microarray Images. 351-357
Session 10: BioInspired Computing and eHealth Applications
- Tomasz Hachaj, Marek R. Ogiela, Katarzyna Koptyra:
Learning from Annotated Video: An Initial Study Based on Oyama Karate Tournament Recordings. 358-362 - Marcin Piekarczyk, Marek R. Ogiela:
Usability of the Fuzzy Vault Scheme Applied to Predetermined Palm-Based Gestures as a Secure Behavioral Lock. 363-367 - Lidia Ogiela, Marek R. Ogiela:
Bio-inspired Algorithms in Data Management Processes. 368-371 - Philip Moore, Hai Van Pham, Bin Hu, Hong Liu, Tarik Qassem:
Machine Cognition and the Integration of Emotional Response in the Monitoring of Mental Disorders. 372-379 - Jan Sliwa:
Statistical Challenges for Quality Assessment of Smart Medical Devices. 380-385 - Jirí Bíla, Martina Mironovova:
Interpretation of New ECG Signal Shapes for Diagnostics of Cardio-Vascular System. 386-391 - Toto Saktioto, Dedi Irawan, Sofia Anita, Jalil Ali:
Multiport Single Mode Fiber Coupler Technique for Mechanical Microactuator to Damped Blood Flow. 392-397
Session 11: Security and Authentication Algorithms
- Shuanggen Liu, Guanglu Qi, Xu An Wang:
Fast and Secure Elliptic Curve Scalar Multiplication Algorithm Based on a Kind of Deformed Fibonacci-Type Series. 398-402 - Yanjing Hu, Liaojun Pang, Qingqi Pei, Xu An Wang:
Analyze Network Protocol's Hidden Behavior. 403-406 - Chunsheng Gu, Zhimin Yu, Zhengjun Jing, Peizhong Shi, Jin Qian:
Improvement of GGH Multilinear Map. 407-411 - Jizhong Wang, Chunxiao Wang:
Full Secure Identity-Based Encryption Scheme over Lattices in the Standard Model. 412-415 - Pengpeng Yang, Baojiang Cui, Ziyue Wang, Xiaobing Liang, Yilun Fu:
Study on Security Protocol Analysis and Design Technology for RFID System. 416-419 - Xiaoyan Deng, Xiaohui Song, Yunlong Ge:
Performance Analysis of an Improved Signal Detection Based on SDQR Decomposition Algorithm. 420-423
Session 12: Data Storage and Software Security
- Xu An Wang, Jianfeng Ma, Fatos Xhafa:
Another Look at Ciphertext Updating Algorithms for Cloud Storage. 424-429 - Yong Wang, Ming Li, Hailin Yan, Zhenyan Liu, Jingfeng Xue, Changzhen Hu:
Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs. 430-434 - Lei Liu, Guijie Han, Zixin Zhou, Sikun Li:
Efficient Cryptology-Specific Instructions Generation with Algebra Primitives. 435-439 - Huang Hong-Mei:
Quantum Secure Direct Communication Protocol Based on Cluster Entangled State. 440-443 - Xu An Wang, Jianfeng Ma, Fatos Xhafa:
Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency. 444-448 - Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully Secure Hierarchical Inner Product Encryption for Privacy Preserving Keyword Searching in Cloud. 449-453
Session 13: Data Encryption and Privacy
- Yiqun Liu, Jianqi Zhang, Peng Luo, Xiaorui Wang:
Joint DWT and Integral Imaging for a Three-Dimensional Watermarking System. 454-457 - Jianlei Zhang, Yiqun Liu, Xiaorui Wang:
Method for Eliminating the Black Zone of Integral Imaging. 458-461 - Jie Qin, Hui Tian, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai, Xu An Wang:
An Efficient VoIP Steganography Based on Random Binary Matrix. 462-465 - Feng Zeng, Wei Wang, Min Tang, Zhanghua Cao:
Exposing Blurred Image Forgeries through Blind Image Restoration. 466-469 - Wenhao Liu, Shengbao Wang, Xiao Tan, Qi Xie, Qizhen Wang:
Identity-Based One Round Key Agreement Protocol without Bilinear Pairings. 470-473 - Qingli Zhao, Shengxiang Xia, Zongcheng Li:
Efficient Numerical Simulation for the Nonlinear Laplacian Problem. 474-477
BIDS 2015 Workshop
Session 1: Decision Support and Services
- Minami Suzuki, Shu Li, Toshiya Iiba, Kosuke Takano:
Related-Item Display Support Based on Customer Queries in a Store. 478-483 - Marcel Dix, Lennart Merkert, Zied M. Ouertani, Markus Aleksy, Reinhard Bauer:
Simulation and Re-engineering of Industrial Services: A Case Study from an Industrial Equipment Manufacturer. 484-489 - Gulnar Ali, Kin Fun Li:
C2C Web Transaction Reliability. 490-493 - Torben Jastrow, Thomas Preuss:
The Entity-Attribute-Value Data Model in a Multi-tenant Shared Data Environment. 494-497
CADSA 2015 Workshop
Session 1: Cloud Computing Applications
- Gianluca Zangara, Diego Terrana, Pietro Paolo Corso, Marco Ughetti, Guido Montalbano:
A Cloud Federation Architecture. 498-503 - Massimiliano De Benedetti, Fabio D'Urso, Fabrizio Messina, Giuseppe Pappalardo, Corrado Santoro:
A Hybrid Model for Ranking Cloud Services. 504-509 - Alessandro Cilardo:
The HtComp Research Project: An Overview. 510-514 - Simon Kwoczek, Sergio Di Martino, Thomas Rustemeyer, Wolfgang Nejdl:
An Architecture to Process Massive Vehicular Traffic Data. 515-520 - Mario Barbareschi, Sara Romano, Antonino Mazzeo:
A Cloud Based Architecture for Massive Sensor Data Analysis in Health Monitoring Systems. 521-526
Session 2: Distributed Computing for Smart Cities
- Ugo Gentile, Stefano Marrone, Francesco M. De Paola, Roberto Nardone, Nicola Mazzocca, Maurizio Giugni:
Model-Based Water Quality Assurance in Ground and Surface Provisioning Systems. 527-532 - Angelo Chianese, Paolo Benedusi, Fiammetta Marulli, Francesco Piccialli:
An Associative Engines Based Approach Supporting Collaborative Analytics in the Internet of Cultural Things. 533-538 - Salvatore Cuomo, Pasquale De Michele, Ardelio Galletti, Francesco Piccialli:
A Cultural Heritage Case Study of Visitor Experiences Shared on a Social Network. 539-544 - Giuseppe Caggianese, Luigi Gallo, Pietro Neroni:
User-Driven View Management for Wearable Augmented Reality Systems in the Cultural Heritage Domain. 545-550 - Marco Pota, Angela Fuggi, Massimo Esposito, Giuseppe De Pietro:
Extracting Compact Sets of Features for Question Classification in Cognitive Systems: A Comparative Study. 551-556
Session 3: Technologies for Distributed Applications
- Salvatore Cuomo, Ardelio Galletti, Livia Marcellino:
A GPU Algorithm in a Distributed Computing System for 3D MRI Denoising. 557-562 - Mario Barbareschi, Pierpaolo Bagnasco, Antonino Mazzeo:
Authenticating IoT Devices with Physically Unclonable Functions Models. 563-567 - Flora Amato, Francesco Moscato, Dario Pianese:
An Agent-Based Model for Autonomous Planning in Distrubuted Critical Systems. 568-573 - Domenico Argenziano:
A Research Project on FPGA-accelerated Cryptographic Computing. 574-577 - Fabio Persia, Daniela D'Auria:
A Distributed Framework for Event Detection in Video Surveillance Context. 578-583
CIDM 2015 Workshop
Session 1: Techniques for Disaster Management and Threat Detection
- Chinyelu Philomena Udeagwu, Stelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis, Marcello Trovati:
Analysis of Techniques for Visualizing Security Risks and Threats. 584-590 - Marko Gaj, Nik Bessis, Lu Liu:
Introducing Auto Generated Certificates to Rank Wireless Home Network Security. 591-596 - Marcello Trovati, Richard Hill, Nik Bessis:
A Non-genuine Message Detection Method Based on Unstructured Datasets. 597-600 - Oladotun Omosebi, Stelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis, Marcello Trovati, Richard Hill:
Designing a Subscription Service for Earthquake Big Data Analysis from Multiple Sources. 601-604
DEM 2015 Workshop
Session 1: Distributed Embedded Software and Hardware
- Jens Vankeirsbilck, Hans Hallez, Jeroen Boydens:
Soft Error Protection in Safety Critical Embedded Applications: An Overview. 605-610 - Yorick De Bock, Jan Broeckhove, Peter Hellinckx:
Hierarchical Real-Time Multi-core Scheduling through Virtualization: A Survey. 611-616 - Bert Van Acker, Joachim Denil, Hans Vangheluwe, Paul De Meulenaere:
Managing Heterogeneity in Model-Based Systems Engineering of Cyber-Physical Systems. 617-622 - Glenn Ergeerts, Maciej Nikodem, Dragan Subotic, Tomasz Surmacz, Bartosz Wojciechowski, Paul De Meulenaere, Maarten Weyn:
DASH7 Alliance Protocol in Monitoring Applications. 623-628 - Bart Praats, Rafael Berkvens, Glenn Ergeerts, Maarten Weyn:
Large Scale Distributed Localization Based on RSS and Mass-Spring Model. 629-634
MWVRTA 2015 Workshop
Session 1: Multimedia Systems and Applications
- Yiqun Liu:
A Three-Dimensional Optical Image Cryptosystem Based on Integral Imaging. 635-638 - Yixiao Sun, Renjun Zhan, Gengrui Wu, Yang Wu:
A Real-Time Video Information Hiding Method Based on CAVLC Encoding. 639-644 - Masaya Yamazaki, Kazuhiro Takahagi, Tomoyuki Ishida, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata:
Proposal of Information Acquisition Method Utilizing CCN in a Time of Large Scale Natural Disaster. 645-650 - Ken Nishimura, Kaoru Sugita:
A Preliminary Evaluation of Web Based Communication Services for Reducing Power Consumption. 651-654 - Kaoru Sugita, Ken Nishimura, Masao Yokota:
Evaluation of Power Consumption for Multimedia Contents Considering Difference in Computer Skill and Devices. 655-660 - Yasuo Ebara:
Fundamental Study on Simultaneous Display of Enormous Multimedia Contents in Ultra-Resolution Display Environment. 661-664
SecureSysComm 2015 Workshop
Session 1: Security in Cloud, Systems and Communication Networks
- Justice Opara-Martins, Reza Sahandi, Feng Tian:
A Business Analysis of Cloud Computing: Data Security and Contract Lock-In Issues. 665-670 - Juha Puttonen, Samuel Olaiya Afolaranmi, Luis E. Gonzalez Moctezuma, Andrei Lobov, José L. Martínez Lastra:
Security in Cloud-Based Cyber-Physical Systems. 671-676 - Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
DoS Protection in the Cloud through the SPECS Services. 677-682 - Roberto Pietrantuono, Massimo Ficco, Stefano Russo, Gabriella Gigante:
Sampling UAV Most Informative Diagnostic Signals. 683-688 - Mauro Migliardi, Alessio Merlo, Andrea Passaglia:
On the Feasibility of Moderating a Peer-to-Peer CDN System: A Proof-of-Concept Implementation. 689-694 - Maria Mirto, Andrea Mariello, Alessandra Nuzzo, Marco Mancini, Alessandro Raolil, Osvaldo Marra, Sandro Fiore, Costantino Sirca, Michele Salis, Valentina Bacciu, Donatella Spano, Giovanni Aloisio:
The OFIDIA Fire Danger Rating System. 695-700
Session 2: Cyber-Physical Threats, Countermeasures and Security Tools
- Gianni D'Angelo, Salvatore Rampone, Francesco Palmieri:
An Artificial Intelligence-Based Trust Model for Pervasive Computing. 701-706 - Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, Aniello Castiglione:
Reversible Copyright Protection for DNA Microarray Images. 707-712 - Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Gaetano Papale, Luigi Sgaglione, Ferdinando Campanile:
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns. 713-717 - Luis Gómez-Miralles, Joan Arnedo-Moreno:
Lockup: A Software Tool to Harden iOS by Disabling Default Lockdown Services. 718-723 - Rafal Kozik, Michal Choras:
Adapting an Ensemble of One-Class Classifiers for a Web-Layer Anomaly Detection System. 724-729
SMDMS 2015 Workshop
Session 1: Stream Media Delivery and Management Systems
- Yusuke Gotoh, Tomoki Yoshihisa:
A Scheduling Method to Reduce Waiting Time for Close-Range Delivery. 730-735 - Yuzo Taenaka, Kazuya Tsukamoto:
A Radio Interference Aware Dynamic Channel Utilization Method on Software Defined WMN. 736-741 - Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi:
A P2P Sensor Data Stream Delivery System to Accommodate Heterogeneous Cycles Using Skip Graphs. 742-747 - Tomoki Yoshihisa, Yoshimasa Ishi, Kodai Mako, Tomoya Kawakami, Yuuichi Teranishi:
A Sensor Data Stream Delivery System with Different Delivery Cycles for IoT Environments. 748-753 - Yousuke Watanabe, Haruo Yokota:
Dynamic Modification of Continuous Queries by Using RDF Metadata of Information Sources. 754-759
SMECS 2015 Workshop
Session 1: Modelling for Information Security
- Yixiao Sun, Renjun Zhan, Zhexin Han, Qixiang Lin:
A Watermark Algorithm for Image Content Authentication and Correcting Errors in Terms of Pixels. 760-765 - Hua-Chun Yang, Xu An Wang:
Cascade Face Detection Based on Histograms of Oriented Gradients and Support Vector Machine. 766-770 - Huiwen Jia, Yupu Hu, Xu An Wang, Zheliang Liu, Wei Xiong:
Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps. 771-774 - Zixin Zhou, Lei Liu, Guijie Han:
Survival Continuity on Intrusion Detection System of Wireless Sensor Networks. 775-779 - Hu Chen, Yupu Hu, Huiwen Jia:
An Additively Homomorphic Encryption from Ideal Lattices. 780-784 - Shuanggen Liu, Huatong Yao, Xu An Wang:
SPA Resistant Scalar Multiplication Based on Addition and Tripling Indistinguishable on Elliptic Curve Cryptosystem. 785-790
Session 2: Networking Modelling and Simulation
- Yanjing Hu, Liaojun Pang, Qingqi Pei, Xu An Wang:
Instruction Clustering Analysis for Network Protocol's Abnormal Behavior. 791-794 - Shuxia Ren, Dakun Zhang, Kunliang Liu, Tianyu Lu, Guozhi Song:
Research on Web Intelligent Robot Based on Virtual Reality. 795-799 - Zhiping Peng, Bo Xu, Delong Cui, Weiwei Lin, Xu An Wang:
Deployment Method of Virtual Machine Cluster Based on Energy Minimization and Graph Cuts Theory. 800-803 - Liming Zheng, Xiaodong Li:
A Content-Based Adaptive Event Routing Algorithm. 804-809 - Rui Ma, Yue Liu, Chun Shan, Xiaolin Zhao, Xu An Wang:
Research on Identification and Addressing of the Internet of Things. 810-814 - Jiuru Wang, Haifeng Wang, Xu An Wang, Yunpeng Cao:
An Authentication Key Agreement Scheme for Heterogeneous Sensor Network Based on Improved Counting Bloom Filter. 815-820
Session 3: Data Security Modelling and Performance
- Jing Zhang:
Replacement Strategy of Web Cache Based on Data Mining. 821-823 - Lei Liu, Jianlu Luo, Xiaoyan Deng, Sikun Li:
FPGA-based Acceleration of Deep Neural Networks Using High Level Method. 824-827 - Ping Zhang:
DOA Estimation Method Based on Neural Network. 828-831 - Jihua Yang, Longjun Zhang, Xu An Wang:
On Cloud Computing Middleware Architecture. 832-835 - Xiuxiu Jiang, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data. 836-839 - Fanyu Kong, Jie Wang, Jia Yu, Xu An Wang:
Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase. 840-843
Session 4: Encryption and Authentication Techniques
- Xu An Wang:
Proxy Re-signature Supporting Conditional Delegation. 844-848 - Hong-Mei Huang, Lu-Ping Xu:
Design and Analysis of the Secure Scheme for Quantum Positioning Based on Entangled Photon Pair. 849-852 - Fenghe Wang, Xu An Wang, Chunxiao Wang:
Lattice-Based Dynamical and Anonymous Broadcast Encryption Scheme. 853-858 - Xiangsong Zhang, Zhenhua Liu, Xu An Wang:
Ring Signature Scheme from Multilinear Maps in the Standard Model. 859-864 - Liu Fang:
A Tentative Study on MOOC-based Strategies of College Stuents' Self-Learning Ability. 865-867 - Huawei Huang, Lunzhi Deng, Yunyun Qu, Chunhua Li:
A Zero-Knowledge Identification Scheme Based on Matrix Power Problem. 868-871
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.