


default search action
10. 3PGCIC 2015: Krakow, Poland
- Fatos Xhafa, Leonard Barolli, Fabrizio Messina, Marek R. Ogiela:

10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-9473-4
3PGCIC 2015
Session 1: Cloud and Grid Computing Systems
- Luiz Fernando Bittencourt, Marcio Moraes Lopes, Ioan Petri

, Omer F. Rana
:
Towards Virtual Machine Migration in Fog Computing. 1-8 - Jorge Miguel

, Santi Caballé
, Fatos Xhafa:
A MapReduce Approach for Processing Student Data Activity in a Peer-to-Peer Networked Setting. 9-16 - Pankaj Pandey, Steven De Haes:

A Variable Payout Information Security Financial Instrument and Trading Mechanism to Address Information Security Risk. 17-25 - Kun Ma

, Bo Yang:
Live Data Replication Approach from Relational Tables to Schema-Free Collections Using Stream Processing Framework. 26-31 - Viliam Malcher:

Design Patterns in Cloud Computing. 32-35 - Wenting Shen, Jia Yu, Rong Hao, Xu An Wang

:
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation. 36-39
Session 2: P2P and eLearning Systems
- Mehdi Seydali Seyfabad, Behzad Akbari:

Virtual Machine Allocation in P2P-cloud Live Video Straming. 40-45 - Gianluca Moro

, Tommaso Pirini, Claudio Sartori
:
Network Traffic Load Balancing in Hierarchical Peer-to-Peer Systems. 46-53 - Rajendra G. Singh, Margaret A. Bernard:

Combining eLearning and P2P File-Sharing Technologies. 54-63 - Nicola Capuano

, Santi Caballé
:
Towards Adaptive Peer Assessment for MOOCs. 64-69 - Santi Caballé

, Fatos Xhafa:
Towards a Notification System for Mobile Devices to Support Collaborative Learning. 70-76 - Adel Boukhadra

, Karima Benatchba, Amar Balla
:
Towards Efficient and Effective Distributed Discovery of SWs in P2P Overlay Networks. 77-84
Session 3: Big Data, Parallel Algorithms and Applications
- Maria Mirto, Giovanni Aloisio

:
A Parallel Algorithm for the Prediction of Protein Binding Sites. 85-91 - Jakub Nalepa

, Miroslaw Blocho:
A Parallel Algorithm with the Search Space Partition for the Pickup and Delivery with Time Windows. 92-99 - Mijeom Kim, Jungin Choi, Jaeweon Yoon:

Development of the Big Data Management System on National Virtual Power Plant. 100-107 - Mak Sharma

, Philip Davies, David Newell, Philip Moore
, Chander Sidhu:
Text Mining Terms and Condition to Provide a Confidence Factor for the Use of Cloud Services. 108-115 - Baojiang Cui, Peilin Shi, Jun Yang, Yongle Hao:

Uploading Deferrable Big Data to the Cloud by Improved Dynamic Self-Adaption Algorithm. 116-120 - Shicong Ma, Baosheng Wang, Xianming Gao, Xiaozhe Zhang:

Two-Tier Model for Supporting Network Functions Virtualization with FoCES. 121-126
Session 4: Mobile Computing and Social Networking
- Khaled O. Darwish, Islam El Madahh, Hoda K. Mohamed

, Hadia El Hennawy:
Towards Reliable Mobile Cloud Computing. 127-133 - Sachi Nishida, Yoshiyuki Shinkawa:

A Performance Prediction Model for Google App Engine. 134-140 - Sung Woo Cho:

P2P-based Mobile Social Networks. 141-145 - Kunliang Liu, Dakun Zhang, Xu An Wang

, Guozhi Song, Shuxia Ren:
Research and Implementation on Visual Analysis of Geological Volume. 146-150 - Guozhi Song, Shuxia Ren, Dakun Zhang, Kunliang Liu, Yumeng Sun, Xu An Wang

:
Research on War Strategy Games on Mobile Phone Based on Cocos2d-JS. 151-155 - Valentin Burger, George Darzanos, Ioanna Papafili, Michael Seufert

:
Trade-Off between QoE and Operational Cost in Edge Resource Supported Video Streaming. 156-161
Session 5: Scheduling and Resource Management in Cloud and Grid Computing
- Alba Amato

, Beniamino Di Martino, Marco Scialdone, Salvatore Venticinque
:
A Virtual Market for Energy Negotiation and Brokering. 162-168 - Innocenzo Mungiello:

Experimental Evaluation of Memory Optimizations on an Embedded GPU Platform. 169-174 - Michal Gregus, Jakub Zilincan:

Improving Rank of a Website in Search Results - An Experimental Approach. 175-182 - Michal Gregus, Vincent Karovic

:
Practical Implementation of Private Cloud Based on Open Source ownCloud for Small Teams - Case Study. 183-187 - Qingyu Chen, Longsheng Wu, Li Li, Xuhan Ma, Xu An Wang

:
Enhanced Reliability Scheduling Method for the Data in Register File. 188-193 - Xianming Gao, Baosheng Wang, Xiaozhe Zhang, Xu An Wang

:
Software Data Plane and Flow Switching Plane Separation in Next-Generation Router Architecture. 194-199
Session 6: High Performance and Scalable Computing
- Fatos Xhafa, Daniel Garcia, Daniel Ramirez, Santi Caballé

:
Performance Evaluation of a MapReduce Hadoop-Based Implementation for Processing Large Virtual Campus Log Files. 200-206 - Heinz Kredel, Hans-Günther Kruse, Sabine Richling

:
A Hierarchical Model for the Analysis of Efficiency and Speed-Up of Multi-core Cluster-Computers. 207-215 - Hiroyuki Ishigami, Kinji Kimura, Yoshimasa Nakamura:

A New Parallel Symmetric Tridiagonal Eigensolver Based on Bisection and Inverse Iteration Algorithms for Shared-Memory Multi-core Processors. 216-223 - Anna Antonyova, Peter Antony:

Managing Control the Water Treatment Using the Electro-Flotation Technology That is Based on the Pervasive Computing with the Internet Connection. 224-230 - Qingli Zhao, Jin Li, Juxin Chen, Xu An Wang

:
Efficient Numerical Simulation for the Quasilinear Elliptic Problems. 231-235 - Yin-Fu Huang, Wei-Cheng Chen:

Parallel Query on the In-Memory Database in a CUDA Platform. 236-243
Session 7: Distributed Computing
- Darshika G. Perera, Kin Fun Li:

Analysis of Computational Models and Application Characteristics Suitable for Reconfigurable FPGAs. 244-247 - Massimiliano De Benedetti

, Fabio D'Urso, Fabrizio Messina, Giuseppe Pappalardo, Corrado Santoro
:
UAV-based Aerial Monitoring: A Performance Evaluation of a Self-Organising Flocking Algorithm. 248-255 - Domenico Argenziano:

Implementation of an FFT Hardware Accelerator for Security Applications. 256-259 - Florian Burgstaller, Andreas Derler, Stefan Kern, Gabriel Schanner, Andreas Reiter:

Anonymous Communication in the Browser via Onion-Routing. 260-267 - Walayat Hussain

, Farookh Khadeer Hussain, Omar Khadeer Hussain
, Elizabeth Chang
:
Profile-Based Viable Service Level Agreement (SLA) Violation Prediction Model in the Cloud. 268-272 - Hua-Chun Yang:

Face Detection Based on Multi-parts and Multi-features. 273-277
Session 8: Next Generation Systems for Mobile and Cloud Computing (Special Track)
- George Suciu

, Cristina Butca, Victor Suciu, Alin Geaba, Alexandru Stancu, Stefan Arseni
:
Basic Internet Foundation and Cloud Computing. 278-284 - Cristian Chilipirea

, Andreea-Cristina Petre, Ciprian Dobre
, Maarten van Steen
:
Filters for Wi-Fi Generated Crowd Movement Data. 285-290 - Bogdan-Costel Mocanu

, Florin Pop, Alexandra Mihaita Mocanu, Ciprian Dobre
, Valentin Cristea:
SPIDER: A Bio-inspired Structured Peer-to-Peer Overlay for Data Dissemination. 291-295 - Ionut-Gabriel Raducu, Valentina-Camelia Bojan, Florin Pop, Mariana Mocanu, Valentin Cristea:

Real-Time Alert Service for Cyber-Infrastructure Environments. 296-303 - Alexandra Mihaita, Ciprian Dobre

, Bogdan-Costel Mocanu
, Florin Pop, Valentin Cristea:
Analysis of Security Approaches for Vehicular Ad-Hoc Networks. 304-309 - Cristian Chilipirea

, Andreea-Cristina Petre, Ciprian Dobre
, Maarten van Steen
:
Proximity Graphs for Crowd Movement Sensors. 310-314
Session 9: High Performance Algorithms and Applications
- Julien Duchateau, François Rousselle

, Nicolas Maquignon, Gilles Roussel, Christophe Renaud
:
Accelerating Physical Simulations from a Multicomponent Lattice Boltzmann Method on a Single-Node Multi-GPU Architecture. 315-322 - José Luis Jodrá, Ibai Gurrutxaga, Javier Muguerza

:
A Study of Memory Consumption and Execution Performance of the cuFFT Library. 323-327 - Maurizio Macri, Alessio De Rango, Davide Spataro, Donato D'Ambrosio

, William Spataro:
Efficient Lava Flows Simulations with OpenCL: A Preliminary Application for Civil Defence Purposes. 328-335 - Nils Potthoff, Carsten Gremzow, Christoph Brandau, Dietmar Tutsch:

Performance Increase by Software Decomposition with Characteristics of Combinational Logic. 336-343 - Antonella Di Stefano, Giovanni Cammarata, Giovanni Morana, Daniele Zito

:
A4SDN - Adaptive Alienated Ant Algorithm for Software-Defined Networking. 344-350 - Raffaele Pizzolante, Arcangelo Castiglione

, Bruno Carpentieri
, Alfredo De Santis
, Francesco Palmieri
, Aniello Castiglione
:
Format-Independent Protection of DNA Microarray Images. 351-357
Session 10: BioInspired Computing and eHealth Applications
- Tomasz Hachaj

, Marek R. Ogiela, Katarzyna Koptyra:
Learning from Annotated Video: An Initial Study Based on Oyama Karate Tournament Recordings. 358-362 - Marcin Piekarczyk

, Marek R. Ogiela:
Usability of the Fuzzy Vault Scheme Applied to Predetermined Palm-Based Gestures as a Secure Behavioral Lock. 363-367 - Lidia Ogiela, Marek R. Ogiela:

Bio-inspired Algorithms in Data Management Processes. 368-371 - Philip Moore

, Hai Van Pham
, Bin Hu
, Hong Liu, Tarik Qassem:
Machine Cognition and the Integration of Emotional Response in the Monitoring of Mental Disorders. 372-379 - Jan Sliwa:

Statistical Challenges for Quality Assessment of Smart Medical Devices. 380-385 - Jirí Bíla

, Martina Mironovova:
Interpretation of New ECG Signal Shapes for Diagnostics of Cardio-Vascular System. 386-391 - Toto Saktioto

, Dedi Irawan
, Sofia Anita, Jalil Ali:
Multiport Single Mode Fiber Coupler Technique for Mechanical Microactuator to Damped Blood Flow. 392-397
Session 11: Security and Authentication Algorithms
- Shuanggen Liu, Guanglu Qi, Xu An Wang

:
Fast and Secure Elliptic Curve Scalar Multiplication Algorithm Based on a Kind of Deformed Fibonacci-Type Series. 398-402 - Yanjing Hu, Liaojun Pang, Qingqi Pei, Xu An Wang

:
Analyze Network Protocol's Hidden Behavior. 403-406 - Chunsheng Gu, Zhimin Yu, Zhengjun Jing

, Peizhong Shi, Jin Qian:
Improvement of GGH Multilinear Map. 407-411 - Jizhong Wang, Chunxiao Wang:

Full Secure Identity-Based Encryption Scheme over Lattices in the Standard Model. 412-415 - Pengpeng Yang, Baojiang Cui, Ziyue Wang, Xiaobing Liang, Yilun Fu:

Study on Security Protocol Analysis and Design Technology for RFID System. 416-419 - Xiaoyan Deng, Xiaohui Song, Yunlong Ge:

Performance Analysis of an Improved Signal Detection Based on SDQR Decomposition Algorithm. 420-423
Session 12: Data Storage and Software Security
- Xu An Wang

, Jianfeng Ma, Fatos Xhafa:
Another Look at Ciphertext Updating Algorithms for Cloud Storage. 424-429 - Yong Wang, Ming Li, Hailin Yan, Zhenyan Liu, Jingfeng Xue, Changzhen Hu:

Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs. 430-434 - Lei Liu, Guijie Han, Zixin Zhou, Sikun Li:

Efficient Cryptology-Specific Instructions Generation with Algebra Primitives. 435-439 - Huang Hong-Mei:

Quantum Secure Direct Communication Protocol Based on Cluster Entangled State. 440-443 - Xu An Wang

, Jianfeng Ma, Fatos Xhafa:
Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency. 444-448 - Leyou Zhang

, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully Secure Hierarchical Inner Product Encryption for Privacy Preserving Keyword Searching in Cloud. 449-453
Session 13: Data Encryption and Privacy
- Yiqun Liu, Jianqi Zhang, Peng Luo, Xiaorui Wang:

Joint DWT and Integral Imaging for a Three-Dimensional Watermarking System. 454-457 - Jianlei Zhang, Yiqun Liu, Xiaorui Wang:

Method for Eliminating the Black Zone of Integral Imaging. 458-461 - Jie Qin, Hui Tian

, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai, Xu An Wang
:
An Efficient VoIP Steganography Based on Random Binary Matrix. 462-465 - Feng Zeng, Wei Wang, Min Tang, Zhanghua Cao:

Exposing Blurred Image Forgeries through Blind Image Restoration. 466-469 - Wenhao Liu, Shengbao Wang, Xiao Tan, Qi Xie, Qizhen Wang:

Identity-Based One Round Key Agreement Protocol without Bilinear Pairings. 470-473 - Qingli Zhao, Shengxiang Xia, Zongcheng Li:

Efficient Numerical Simulation for the Nonlinear Laplacian Problem. 474-477
BIDS 2015 Workshop
Session 1: Decision Support and Services
- Minami Suzuki, Shu Li, Toshiya Iiba, Kosuke Takano:

Related-Item Display Support Based on Customer Queries in a Store. 478-483 - Marcel Dix, Lennart Merkert

, Zied M. Ouertani, Markus Aleksy
, Reinhard Bauer:
Simulation and Re-engineering of Industrial Services: A Case Study from an Industrial Equipment Manufacturer. 484-489 - Gulnar Ali, Kin Fun Li:

C2C Web Transaction Reliability. 490-493 - Torben Jastrow, Thomas Preuss

:
The Entity-Attribute-Value Data Model in a Multi-tenant Shared Data Environment. 494-497
CADSA 2015 Workshop
Session 1: Cloud Computing Applications
- Gianluca Zangara, Diego Terrana, Pietro Paolo Corso, Marco Ughetti, Guido Montalbano:

A Cloud Federation Architecture. 498-503 - Massimiliano De Benedetti

, Fabio D'Urso, Fabrizio Messina, Giuseppe Pappalardo, Corrado Santoro
:
A Hybrid Model for Ranking Cloud Services. 504-509 - Alessandro Cilardo:

The HtComp Research Project: An Overview. 510-514 - Simon Kwoczek, Sergio Di Martino

, Thomas Rustemeyer
, Wolfgang Nejdl
:
An Architecture to Process Massive Vehicular Traffic Data. 515-520 - Mario Barbareschi

, Sara Romano, Antonino Mazzeo:
A Cloud Based Architecture for Massive Sensor Data Analysis in Health Monitoring Systems. 521-526
Session 2: Distributed Computing for Smart Cities
- Ugo Gentile

, Stefano Marrone
, Francesco M. De Paola, Roberto Nardone
, Nicola Mazzocca
, Maurizio Giugni:
Model-Based Water Quality Assurance in Ground and Surface Provisioning Systems. 527-532 - Angelo Chianese, Paolo Benedusi, Fiammetta Marulli

, Francesco Piccialli
:
An Associative Engines Based Approach Supporting Collaborative Analytics in the Internet of Cultural Things. 533-538 - Salvatore Cuomo

, Pasquale De Michele
, Ardelio Galletti
, Francesco Piccialli
:
A Cultural Heritage Case Study of Visitor Experiences Shared on a Social Network. 539-544 - Giuseppe Caggianese

, Luigi Gallo
, Pietro Neroni:
User-Driven View Management for Wearable Augmented Reality Systems in the Cultural Heritage Domain. 545-550 - Marco Pota, Angela Fuggi, Massimo Esposito

, Giuseppe De Pietro:
Extracting Compact Sets of Features for Question Classification in Cognitive Systems: A Comparative Study. 551-556
Session 3: Technologies for Distributed Applications
- Salvatore Cuomo

, Ardelio Galletti
, Livia Marcellino
:
A GPU Algorithm in a Distributed Computing System for 3D MRI Denoising. 557-562 - Mario Barbareschi

, Pierpaolo Bagnasco, Antonino Mazzeo:
Authenticating IoT Devices with Physically Unclonable Functions Models. 563-567 - Flora Amato

, Francesco Moscato, Dario Pianese:
An Agent-Based Model for Autonomous Planning in Distrubuted Critical Systems. 568-573 - Domenico Argenziano:

A Research Project on FPGA-accelerated Cryptographic Computing. 574-577 - Fabio Persia

, Daniela D'Auria:
A Distributed Framework for Event Detection in Video Surveillance Context. 578-583
CIDM 2015 Workshop
Session 1: Techniques for Disaster Management and Threat Detection
- Chinyelu Philomena Udeagwu, Stelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis

, Marcello Trovati
:
Analysis of Techniques for Visualizing Security Risks and Threats. 584-590 - Marko Gaj, Nik Bessis

, Lu Liu
:
Introducing Auto Generated Certificates to Rank Wireless Home Network Security. 591-596 - Marcello Trovati

, Richard Hill
, Nik Bessis
:
A Non-genuine Message Detection Method Based on Unstructured Datasets. 597-600 - Oladotun Omosebi, Stelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis

, Marcello Trovati
, Richard Hill
:
Designing a Subscription Service for Earthquake Big Data Analysis from Multiple Sources. 601-604
DEM 2015 Workshop
Session 1: Distributed Embedded Software and Hardware
- Jens Vankeirsbilck

, Hans Hallez
, Jeroen Boydens
:
Soft Error Protection in Safety Critical Embedded Applications: An Overview. 605-610 - Yorick De Bock

, Jan Broeckhove, Peter Hellinckx
:
Hierarchical Real-Time Multi-core Scheduling through Virtualization: A Survey. 611-616 - Bert Van Acker, Joachim Denil

, Hans Vangheluwe
, Paul De Meulenaere:
Managing Heterogeneity in Model-Based Systems Engineering of Cyber-Physical Systems. 617-622 - Glenn Ergeerts, Maciej Nikodem

, Dragan Subotic, Tomasz Surmacz
, Bartosz Wojciechowski, Paul De Meulenaere
, Maarten Weyn
:
DASH7 Alliance Protocol in Monitoring Applications. 623-628 - Bart Praats, Rafael Berkvens

, Glenn Ergeerts, Maarten Weyn
:
Large Scale Distributed Localization Based on RSS and Mass-Spring Model. 629-634
MWVRTA 2015 Workshop
Session 1: Multimedia Systems and Applications
- Yiqun Liu:

A Three-Dimensional Optical Image Cryptosystem Based on Integral Imaging. 635-638 - Yixiao Sun, Renjun Zhan, Gengrui Wu, Yang Wu:

A Real-Time Video Information Hiding Method Based on CAVLC Encoding. 639-644 - Masaya Yamazaki, Kazuhiro Takahagi, Tomoyuki Ishida, Kaoru Sugita, Noriki Uchida, Yoshitaka Shibata:

Proposal of Information Acquisition Method Utilizing CCN in a Time of Large Scale Natural Disaster. 645-650 - Ken Nishimura, Kaoru Sugita:

A Preliminary Evaluation of Web Based Communication Services for Reducing Power Consumption. 651-654 - Kaoru Sugita, Ken Nishimura, Masao Yokota:

Evaluation of Power Consumption for Multimedia Contents Considering Difference in Computer Skill and Devices. 655-660 - Yasuo Ebara:

Fundamental Study on Simultaneous Display of Enormous Multimedia Contents in Ultra-Resolution Display Environment. 661-664
SecureSysComm 2015 Workshop
Session 1: Security in Cloud, Systems and Communication Networks
- Justice Opara-Martins

, Reza Sahandi, Feng Tian:
A Business Analysis of Cloud Computing: Data Security and Contract Lock-In Issues. 665-670 - Juha Puttonen, Samuel Olaiya Afolaranmi

, Luis E. Gonzalez Moctezuma, Andrei Lobov
, José L. Martínez Lastra
:
Security in Cloud-Based Cyber-Physical Systems. 671-676 - Valentina Casola

, Alessandra De Benedictis
, Massimiliano Rak
, Umberto Villano:
DoS Protection in the Cloud through the SPECS Services. 677-682 - Roberto Pietrantuono

, Massimo Ficco, Stefano Russo
, Gabriella Gigante
:
Sampling UAV Most Informative Diagnostic Signals. 683-688 - Mauro Migliardi

, Alessio Merlo, Andrea Passaglia:
On the Feasibility of Moderating a Peer-to-Peer CDN System: A Proof-of-Concept Implementation. 689-694 - Maria Mirto, Andrea Mariello

, Alessandra Nuzzo
, Marco Mancini
, Alessandro Raolil, Osvaldo Marra, Sandro Fiore
, Costantino Sirca
, Michele Salis
, Valentina Bacciu
, Donatella Spano
, Giovanni Aloisio
:
The OFIDIA Fire Danger Rating System. 695-700
Session 2: Cyber-Physical Threats, Countermeasures and Security Tools
- Gianni D'Angelo

, Salvatore Rampone
, Francesco Palmieri
:
An Artificial Intelligence-Based Trust Model for Pervasive Computing. 701-706 - Raffaele Pizzolante, Arcangelo Castiglione

, Bruno Carpentieri
, Alfredo De Santis
, Aniello Castiglione
:
Reversible Copyright Protection for DNA Microarray Images. 707-712 - Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Gaetano Papale, Luigi Sgaglione, Ferdinando Campanile:

Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns. 713-717 - Luis Gómez-Miralles

, Joan Arnedo-Moreno:
Lockup: A Software Tool to Harden iOS by Disabling Default Lockdown Services. 718-723 - Rafal Kozik

, Michal Choras:
Adapting an Ensemble of One-Class Classifiers for a Web-Layer Anomaly Detection System. 724-729
SMDMS 2015 Workshop
Session 1: Stream Media Delivery and Management Systems
- Yusuke Gotoh, Tomoki Yoshihisa:

A Scheduling Method to Reduce Waiting Time for Close-Range Delivery. 730-735 - Yuzo Taenaka, Kazuya Tsukamoto:

A Radio Interference Aware Dynamic Channel Utilization Method on Software Defined WMN. 736-741 - Tomoya Kawakami, Yoshimasa Ishi, Tomoki Yoshihisa, Yuuichi Teranishi:

A P2P Sensor Data Stream Delivery System to Accommodate Heterogeneous Cycles Using Skip Graphs. 742-747 - Tomoki Yoshihisa, Yoshimasa Ishi, Kodai Mako, Tomoya Kawakami, Yuuichi Teranishi:

A Sensor Data Stream Delivery System with Different Delivery Cycles for IoT Environments. 748-753 - Yousuke Watanabe, Haruo Yokota

:
Dynamic Modification of Continuous Queries by Using RDF Metadata of Information Sources. 754-759
SMECS 2015 Workshop
Session 1: Modelling for Information Security
- Yixiao Sun, Renjun Zhan, Zhexin Han, Qixiang Lin:

A Watermark Algorithm for Image Content Authentication and Correcting Errors in Terms of Pixels. 760-765 - Hua-Chun Yang, Xu An Wang

:
Cascade Face Detection Based on Histograms of Oriented Gradients and Support Vector Machine. 766-770 - Huiwen Jia, Yupu Hu, Xu An Wang

, Zheliang Liu, Wei Xiong:
Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps. 771-774 - Zixin Zhou, Lei Liu, Guijie Han:

Survival Continuity on Intrusion Detection System of Wireless Sensor Networks. 775-779 - Hu Chen, Yupu Hu, Huiwen Jia:

An Additively Homomorphic Encryption from Ideal Lattices. 780-784 - Shuanggen Liu, Huatong Yao, Xu An Wang

:
SPA Resistant Scalar Multiplication Based on Addition and Tripling Indistinguishable on Elliptic Curve Cryptosystem. 785-790
Session 2: Networking Modelling and Simulation
- Yanjing Hu, Liaojun Pang, Qingqi Pei, Xu An Wang:

Instruction Clustering Analysis for Network Protocol's Abnormal Behavior. 791-794 - Shuxia Ren, Dakun Zhang, Kunliang Liu, Tianyu Lu, Guozhi Song:

Research on Web Intelligent Robot Based on Virtual Reality. 795-799 - Zhiping Peng, Bo Xu, Delong Cui

, Weiwei Lin, Xu An Wang
:
Deployment Method of Virtual Machine Cluster Based on Energy Minimization and Graph Cuts Theory. 800-803 - Liming Zheng, Xiaodong Li:

A Content-Based Adaptive Event Routing Algorithm. 804-809 - Rui Ma, Yue Liu, Chun Shan, Xiaolin Zhao, Xu An Wang

:
Research on Identification and Addressing of the Internet of Things. 810-814 - Jiuru Wang, Haifeng Wang, Xu An Wang

, Yunpeng Cao:
An Authentication Key Agreement Scheme for Heterogeneous Sensor Network Based on Improved Counting Bloom Filter. 815-820
Session 3: Data Security Modelling and Performance
- Jing Zhang:

Replacement Strategy of Web Cache Based on Data Mining. 821-823 - Lei Liu, Jianlu Luo, Xiaoyan Deng, Sikun Li:

FPGA-based Acceleration of Deep Neural Networks Using High Level Method. 824-827 - Ping Zhang:

DOA Estimation Method Based on Neural Network. 828-831 - Jihua Yang, Longjun Zhang, Xu An Wang

:
On Cloud Computing Middleware Architecture. 832-835 - Xiuxiu Jiang, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:

A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data. 836-839 - Fanyu Kong, Jie Wang, Jia Yu, Xu An Wang

:
Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase. 840-843
Session 4: Encryption and Authentication Techniques
- Xu An Wang

:
Proxy Re-signature Supporting Conditional Delegation. 844-848 - Hong-Mei Huang, Lu-Ping Xu:

Design and Analysis of the Secure Scheme for Quantum Positioning Based on Entangled Photon Pair. 849-852 - Fenghe Wang, Xu An Wang

, Chunxiao Wang:
Lattice-Based Dynamical and Anonymous Broadcast Encryption Scheme. 853-858 - Xiangsong Zhang, Zhenhua Liu, Xu An Wang

:
Ring Signature Scheme from Multilinear Maps in the Standard Model. 859-864 - Liu Fang:

A Tentative Study on MOOC-based Strategies of College Stuents' Self-Learning Ability. 865-867 - Huawei Huang, Lunzhi Deng, Yunyun Qu, Chunhua Li:

A Zero-Knowledge Identification Scheme Based on Matrix Power Problem. 868-871

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














