default search action
ICA3PP 2019: Melbourne, VIC, Australia
- Sheng Wen, Albert Y. Zomaya, Laurence T. Yang:
Algorithms and Architectures for Parallel Processing - 19th International Conference, ICA3PP 2019, Melbourne, VIC, Australia, December 9-11, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11944, Springer 2020, ISBN 978-3-030-38990-1
Parallel and Distributed Architectures
- Yi Dai, Ke Wu, Mingche Lai, Qiong Li, Dezun Dong:
PPS: A Low-Latency and Low-Complexity Switching Architecture Based on Packet Prefetch and Arbitration Prediction. 3-16 - Jie Wang, Dagang Li:
SWR: Using Windowed Reordering to Achieve Fast and Balanced Heuristic for Streaming Vertex-Cut Graph Partitioning. 17-32 - Jens Froemmer, Nico Bannow, Axel Aue, Christoph Grimm, Klaus Schneider:
Flexible Data Flow Architecture for Embedded Hardware Accelerators. 33-47 - Keyan Zhao, Junxiao Wang, Heng Qi, Xin Xie, Xiaobo Zhou, Keqiu Li:
HBL-Sketch: A New Three-Tier Sketch for Accurate Network Measurement. 48-59 - Takuya Edamatsu, Daisuke Takahashi:
Accelerating Large Integer Multiplication Using Intel AVX-512IFMA. 60-74 - Bei Wang, Yifeng Chen, Chaofeng Hou:
A Communication-Avoiding Algorithm for Molecular Dynamics Simulation. 75-88 - Christopher Schmidt, Johannes Huegle, Siegfried Horschig, Matthias Uflacker:
Out-of-Core GPU-Accelerated Causal Structure Learning. 89-104
Software Systems and Programming Models
- Bin Qu, Song Liu, Hailong Huang, Jiajun Yuan, Qian Wang, Weiguo Wu:
Accelerating Lattice Boltzmann Method by Fully Exposing Vectorizable Loops. 107-121 - Chunjing Gan, Bin Wang, Zhi-Jie Wang, Huazhong Liu, Dingyu Yang, Jian Yin, Shiyou Qian, Song Guo:
A Solution for High Availability Memory Access. 122-137 - Gang Luo, Xi Zheng, Huai Liu, Rongbin Xu, Dinesh Nagumothu, Ranjith Janapareddi, Er Zhuang, Xiao Liu:
Verification of Microservices Using Metamorphic Testing. 138-152 - Heyan Chai, Shuqiang Yang, Zoe Lin Jiang, Xuan Wang, Yiqun Chen, Hengyu Luo:
A New Robust and Reversible Watermarking Technique Based on Erasure Code. 153-168 - Guoxi Li, Wenhai Lin, Wenzhi Chen:
Exit-Less Hypercall: Asynchronous System Calls in Virtualized Processes. 169-182 - Frédéric Loulergue, Jolan Philippe:
Automatic Optimization of Python Skeletal Parallel Programs. 183-197
Distributed and Parallel and Network-Based Computing
- Kartik Vishwakarma, Venkata M. V. Gunturi:
Impromptu Rendezvous Based Multi-threaded Algorithm for Shortest Lagrangian Path Problem on Road Networks. 201-222 - Marcel Köster, Julian Groß, Antonio Krüger:
FANG: Fast and Efficient Successor-State Generation for Heuristic Optimization on GPUs. 223-241 - Cong Hu, Jiang Zhong, Qi Li, Qing Li:
DETER: Streaming Graph Partitioning via Combined Degree and Cluster Information. 242-255 - Zhong Li, Chunhe Xia, Tianbo Wang, Xiaochen Liu:
Which Node Properties Identify the Propagation Source in Networks? 256-270 - Yuhao Chen, Haiping Huang, Xiping Liu, Hua Dai, Zhijie Han:
t/t-Diagnosability of BCube Network. 271-282
Big Data and Its Applications
- Weitao Zou, Weipeng Jing, Guangsheng Chen, Yang Lu:
Strark-H: A Strategy for Spatial Data Storage to Improve Query Efficiency Based on Spark. 285-299 - Dunhui Yu, Xiaoxiao Zhang, Xingsheng Zhang, Lingli Zhang:
Multitask Assignment Algorithm Based on Decision Tree in Spatial Crowdsourcing Environment. 300-314 - Erzhou Zhu, Meng Li, Jia Xu, Xuejun Li, Feng Liu, Futian Wang:
TIMOM: A Novel Time Influence Multi-objective Optimization Cloud Data Storage Model for Business Process Management. 315-329 - Hong Zhong, JianZhong Zou, Jie Cui, Yan Xu:
RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers. 330-344 - Zhen Cheng, Jiale Zhang, Hongyan Qian, Mingrong Xiang, Di Wu:
A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing. 345-358 - Jianjun Qiu, Xin Li, Xiaolin Qin, Haiyan Wang, Yongbo Cheng:
Utility-Aware Edge Server Deployment in Mobile Edge Computing. 359-372 - Dongshi Liu, Bo Wang, Peng Li, Rebecca J. Stones, Trent G. Marbach, Gang Wang, Xiaoguang Liu, Zhongwei Li:
Predicting Hard Drive Failures for Cloud Storage Systems. 373-388
Distributed and Parallel Algorithms
- Victoria Sanz, Adrián Pousa, Marcelo R. Naiouf, Armando De Giusti:
Efficient Pattern Matching on CPU-GPU Heterogeneous Systems. 391-403 - Jintao Peng, Zhang Yang, Qingkai Liu:
Improving Performance of Batch Point-to-Point Communications by Active Contention Reduction Through Congestion-Avoiding Message Scheduling. 404-418
Applications of Distributed and Parallel Computing
- Yuxiang Chen, Guishan Dong, Yao Hao, Zhaolei Zhang, Haiyang Peng, Shui Yu:
An Open Identity Authentication Scheme Based on Blockchain. 421-438 - Zhiyu Xu, Tengyun Jiao, Lin Yang, Donghai Liu, Sheng Wen, Yang Xiang:
RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain. 439-453 - Yanan Zhao, Mingchu Li, Cheng Guo:
Developing Patrol Strategies for the Cooperative Opportunistic Criminals. 454-467 - Yuan Linghu, Xiangxue Li, Zhenlong Zhang:
Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password Guessing. 468-483 - Jing Lv, Ning Xi, Xue Rao:
A Fully Anonymous Authentication Scheme Based on Medical Environment. 484-498
Service Dependability and Security
- Xinning Wang, Chong Li:
RaNetMalDozer: A Novel NN-Based Model for Android Malware Detection Over Task Kernel Structures. 501-517 - Huan Zhang, Kangfeng Zheng, Xiaodan Yan, Shoushan Luo, Bin Wu:
Moving Target Defense Against Injection Attacks. 518-532 - Guishan Dong, Yuxiang Chen, Yao Hao, Zhaolei Zhang, Peng Zhang, Shui Yu:
Tiger Tally: Cross-Domain Scheme for Different Authentication Mechanism. 533-549 - Sheng Shen, Tianqing Zhu, Dayong Ye, Mengmeng Yang, Tingting Liao, Wanlei Zhou:
Simultaneously Advising via Differential Privacy in Cloud Servers Environment. 550-563 - Shizhao Wang, Chunhe Xia, Tianbo Wang:
Feature Generation: A Novel Intrusion Detection Model Based on Prototypical Network. 564-577 - Shengwei Lei, Chunhe Xia, Tianbo Wang, Shizhao Wang:
Topic Reconstruction: A Novel Method Based on LDA Oriented to Intrusion Detection. 578-594 - Ying Zhao, Junjun Chen, Jiale Zhang, Di Wu, Jian Teng, Shui Yu:
PDGAN: A Novel Poisoning Defense Method in Federated Learning Using Generative Adversarial Network. 595-609 - Li Luo, Zhenzhen Han, Chuan Xu, Guofeng Zhao:
A Geo-indistinguishable Location Privacy Preservation Scheme for Location-Based Services in Vehicular Networks. 610-623 - Jianguo Jiang, Qilei Yin, Zhixin Shi, Guokun Xu, Xiaoyu Kang:
A Behavior-Based Method for Distinguishing the Type of C&C Channel. 624-636
IoT and CPS Computing
- Weiqing Huang, Shao-yi Zhu, Siye Wang, Jinxing Xie, Yanfang Zhang:
Sparse Representation for Device-Free Human Detection and Localization with COTS RFID. 639-654 - Yuyin Ma, Junyang Zhang, Shu Wang, Yunni Xia, Peng Chen, Lei Wu, Wanbo Zheng:
A Novel Approach to Cost-Efficient Scheduling of Multi-workflows in the Edge Computing Environment with the Proximity Constraint. 655-668 - Junfang Wu, Weizhong Qiang, Tianqing Zhu, Hai Jin, Peng Xu, Sheng Shen:
Differential Privacy Preservation for Smart Meter Systems. 669-685
Performance Modelling and Evaluation
- Maomao Fu, Xiaozhuo Gu, Wenhao Dai, Jingqiang Lin, Han Wang:
Secure Multi-receiver Communications: Models, Proofs, and Implementation. 689-709
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.