default search action
11. GPC 2016: Xi'an, China
- Xinyi Huang, Yang Xiang, Kuan-Ching Li:
Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings. Lecture Notes in Computer Science 9663, Springer 2016, ISBN 978-3-319-39076-5
Green Computing
- Daxin Zhu, Yingjie Wu, Xiaodong Wang:
An Efficient Dynamic Programming Algorithm for STR-IC-STR-EC-LCS Problem. 3-17 - Xiaodong Wang, Yingjie Wu, Daxin Zhu:
A Polynomial Time Algorithm for a Generalized Longest Common Subsequence Problem. 18-29 - Yang Zhao, Jingfei Jiang, Pengbo Wu:
Improved Survey Propagation on Graphics Processing Units. 30-41 - Xinyan Zhang, Zhipeng Tan, Meng Li, Yingfei Zheng, Wei Zhou:
ZooKeeper+: The Optimization of Election Algorithm in Complex Network Circumstance. 42-60
Cloud Computing
- Ge Yao, Yong Li, Linan Lei, Huaqun Wang, Changlu Lin:
An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage. 63-81 - Chao-Tung Yang, Yin-Zhen Yan, Shuo-Tsung Chen, Ren-Hao Liu, Jean-Huei Ou, Kun-Liang Chen:
iGEMS: A Cloud Green Energy Management System in Data Center. 82-98 - Yuxing Tang, Lei Wang, Yu Deng, Xiaoqiang Ni, Qiang Dou:
The Macro-DSE for HPC Processing Unit: The Physical Constraints Perspective. 99-112 - Jinghua Li, Xiaoyan Liu, Huixiang Zhang, Dejun Mu:
A Scalable Cloud-Based Android App Repackaging Detection Framework. 113-125
Virtualisation
- Ying Liu:
Chameleon: Virtual Machine Migration Supporting Cascading Overload Management in Cloud. 129-145 - Tyng-Yeu Liang, Yu-Jie Lin:
Heterogeneous Computation Migration on LLVM. 146-162 - Xingyan Zhang:
A Flow Scheduling Algorithm Based on VM Migration in Data Center Networks. 163-179 - Venkataramanan Venkatesh, Amiya Nayak:
Optimizing I/O Intensive Domain Handling in Xen Hypervisor for Consolidated Server Environments. 180-195 - Joshua Ho, Chien-Min Wang:
User-Centric and Real-Time Activity Recognition Using Smart Glasses. 196-210
Network Security
- Zehui Xiong, Bang Wang:
Minimizing Confident Information Coverage Breach in Rechargeable Wireless Sensor Networks with Uneven Recharging Rates. 213-228 - Qimin Sun, Jongho Moon, Younsung Choi, Dongho Won:
An Improved Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment. 229-242 - Hui Sun, Jianhua Sun, Hao Chen:
Mining Frequent Attack Sequence in Web Logs. 243-260 - Xiaochao Wei, Chuan Zhao, Han Jiang, Qiuliang Xu, Hao Wang:
Practical Server-Aided k-out-of-n Oblivious Transfer Protocol. 261-277 - Xueyang Han, Qiuliang Xu, Fengbo Lin, Minghao Zhao:
Improved Power Analysis Attack Based on the Preprocessed Power Traces. 278-289 - Xiaojuan Chen, Yi Mu:
Preserving User Location Privacy for Location-Based Service. 290-300 - Zaid Ameen Abduljabbar, Hai Jin, Ayad Ibrahim, Zaid Alaa Hussien, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Towards Secure Private Image Matching. 301-315
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.