


default search action
ICA3PP 2019: Melbourne, VIC, Australia
- Sheng Wen, Albert Y. Zomaya, Laurence T. Yang:

Algorithms and Architectures for Parallel Processing - 19th International Conference, ICA3PP 2019, Melbourne, VIC, Australia, December 9-11, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11944, Springer 2020, ISBN 978-3-030-38990-1
Parallel and Distributed Architectures
- Yi Dai, Ke Wu, Mingche Lai, Qiong Li, Dezun Dong:

PPS: A Low-Latency and Low-Complexity Switching Architecture Based on Packet Prefetch and Arbitration Prediction. 3-16 - Jie Wang, Dagang Li

:
SWR: Using Windowed Reordering to Achieve Fast and Balanced Heuristic for Streaming Vertex-Cut Graph Partitioning. 17-32 - Jens Froemmer, Nico Bannow, Axel Aue, Christoph Grimm, Klaus Schneider

:
Flexible Data Flow Architecture for Embedded Hardware Accelerators. 33-47 - Keyan Zhao, Junxiao Wang

, Heng Qi
, Xin Xie
, Xiaobo Zhou, Keqiu Li:
HBL-Sketch: A New Three-Tier Sketch for Accurate Network Measurement. 48-59 - Takuya Edamatsu, Daisuke Takahashi

:
Accelerating Large Integer Multiplication Using Intel AVX-512IFMA. 60-74 - Bei Wang, Yifeng Chen, Chaofeng Hou:

A Communication-Avoiding Algorithm for Molecular Dynamics Simulation. 75-88 - Christopher Schmidt

, Johannes Huegle, Siegfried Horschig, Matthias Uflacker:
Out-of-Core GPU-Accelerated Causal Structure Learning. 89-104
Software Systems and Programming Models
- Bin Qu, Song Liu, Hailong Huang, Jiajun Yuan, Qian Wang, Weiguo Wu:

Accelerating Lattice Boltzmann Method by Fully Exposing Vectorizable Loops. 107-121 - Chunjing Gan, Bin Wang, Zhi-Jie Wang, Huazhong Liu, Dingyu Yang, Jian Yin, Shiyou Qian, Song Guo:

A Solution for High Availability Memory Access. 122-137 - Gang Luo, Xi Zheng

, Huai Liu
, Rongbin Xu, Dinesh Nagumothu
, Ranjith Janapareddi, Er Zhuang, Xiao Liu
:
Verification of Microservices Using Metamorphic Testing. 138-152 - Heyan Chai, Shuqiang Yang, Zoe Lin Jiang, Xuan Wang, Yiqun Chen, Hengyu Luo:

A New Robust and Reversible Watermarking Technique Based on Erasure Code. 153-168 - Guoxi Li, Wenhai Lin, Wenzhi Chen:

Exit-Less Hypercall: Asynchronous System Calls in Virtualized Processes. 169-182 - Frédéric Loulergue

, Jolan Philippe
:
Automatic Optimization of Python Skeletal Parallel Programs. 183-197
Distributed and Parallel and Network-Based Computing
- Kartik Vishwakarma, Venkata M. V. Gunturi

:
Impromptu Rendezvous Based Multi-threaded Algorithm for Shortest Lagrangian Path Problem on Road Networks. 201-222 - Marcel Köster, Julian Groß, Antonio Krüger:

FANG: Fast and Efficient Successor-State Generation for Heuristic Optimization on GPUs. 223-241 - Cong Hu, Jiang Zhong, Qi Li, Qing Li

:
DETER: Streaming Graph Partitioning via Combined Degree and Cluster Information. 242-255 - Zhong Li, Chunhe Xia, Tianbo Wang, Xiaochen Liu:

Which Node Properties Identify the Propagation Source in Networks? 256-270 - Yuhao Chen, Haiping Huang, Xiping Liu, Hua Dai, Zhijie Han

:
t/t-Diagnosability of BCube Network. 271-282
Big Data and Its Applications
- Weitao Zou, Weipeng Jing, Guangsheng Chen, Yang Lu:

Strark-H: A Strategy for Spatial Data Storage to Improve Query Efficiency Based on Spark. 285-299 - Dunhui Yu

, Xiaoxiao Zhang
, Xingsheng Zhang
, Lingli Zhang
:
Multitask Assignment Algorithm Based on Decision Tree in Spatial Crowdsourcing Environment. 300-314 - Erzhou Zhu, Meng Li, Jia Xu

, Xuejun Li, Feng Liu, Futian Wang:
TIMOM: A Novel Time Influence Multi-objective Optimization Cloud Data Storage Model for Business Process Management. 315-329 - Hong Zhong

, JianZhong Zou
, Jie Cui
, Yan Xu
:
RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers. 330-344 - Zhen Cheng, Jiale Zhang, Hongyan Qian, Mingrong Xiang, Di Wu

:
A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing. 345-358 - Jianjun Qiu, Xin Li, Xiaolin Qin, Haiyan Wang, Yongbo Cheng:

Utility-Aware Edge Server Deployment in Mobile Edge Computing. 359-372 - Dongshi Liu, Bo Wang, Peng Li, Rebecca J. Stones, Trent G. Marbach

, Gang Wang, Xiaoguang Liu, Zhongwei Li:
Predicting Hard Drive Failures for Cloud Storage Systems. 373-388
Distributed and Parallel Algorithms
- Victoria Sanz, Adrián Pousa

, Marcelo R. Naiouf, Armando De Giusti:
Efficient Pattern Matching on CPU-GPU Heterogeneous Systems. 391-403 - Jintao Peng, Zhang Yang, Qingkai Liu:

Improving Performance of Batch Point-to-Point Communications by Active Contention Reduction Through Congestion-Avoiding Message Scheduling. 404-418
Applications of Distributed and Parallel Computing
- Yuxiang Chen, Guishan Dong, Yao Hao, Zhaolei Zhang, Haiyang Peng, Shui Yu

:
An Open Identity Authentication Scheme Based on Blockchain. 421-438 - Zhiyu Xu

, Tengyun Jiao, Lin Yang, Donghai Liu, Sheng Wen, Yang Xiang
:
RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain. 439-453 - Yanan Zhao

, Mingchu Li
, Cheng Guo
:
Developing Patrol Strategies for the Cooperative Opportunistic Criminals. 454-467 - Yuan Linghu, Xiangxue Li, Zhenlong Zhang:

Deep Learning vs. Traditional Probabilistic Models: Case Study on Short Inputs for Password Guessing. 468-483 - Jing Lv, Ning Xi, Xue Rao:

A Fully Anonymous Authentication Scheme Based on Medical Environment. 484-498
Service Dependability and Security
- Xinning Wang, Chong Li:

RaNetMalDozer: A Novel NN-Based Model for Android Malware Detection Over Task Kernel Structures. 501-517 - Huan Zhang

, Kangfeng Zheng
, Xiaodan Yan
, Shoushan Luo, Bin Wu:
Moving Target Defense Against Injection Attacks. 518-532 - Guishan Dong, Yuxiang Chen, Yao Hao, Zhaolei Zhang, Peng Zhang, Shui Yu:

Tiger Tally: Cross-Domain Scheme for Different Authentication Mechanism. 533-549 - Sheng Shen

, Tianqing Zhu, Dayong Ye
, Mengmeng Yang, Tingting Liao, Wanlei Zhou
:
Simultaneously Advising via Differential Privacy in Cloud Servers Environment. 550-563 - Shizhao Wang, Chunhe Xia, Tianbo Wang:

Feature Generation: A Novel Intrusion Detection Model Based on Prototypical Network. 564-577 - Shengwei Lei, Chunhe Xia, Tianbo Wang, Shizhao Wang:

Topic Reconstruction: A Novel Method Based on LDA Oriented to Intrusion Detection. 578-594 - Ying Zhao, Junjun Chen, Jiale Zhang, Di Wu

, Jian Teng, Shui Yu
:
PDGAN: A Novel Poisoning Defense Method in Federated Learning Using Generative Adversarial Network. 595-609 - Li Luo, Zhenzhen Han, Chuan Xu, Guofeng Zhao:

A Geo-indistinguishable Location Privacy Preservation Scheme for Location-Based Services in Vehicular Networks. 610-623 - Jianguo Jiang, Qilei Yin, Zhixin Shi, Guokun Xu, Xiaoyu Kang:

A Behavior-Based Method for Distinguishing the Type of C&C Channel. 624-636
IoT and CPS Computing
- Weiqing Huang, Shao-yi Zhu, Siye Wang

, Jinxing Xie, Yanfang Zhang:
Sparse Representation for Device-Free Human Detection and Localization with COTS RFID. 639-654 - Yuyin Ma, Junyang Zhang, Shu Wang, Yunni Xia, Peng Chen

, Lei Wu, Wanbo Zheng:
A Novel Approach to Cost-Efficient Scheduling of Multi-workflows in the Edge Computing Environment with the Proximity Constraint. 655-668 - Junfang Wu, Weizhong Qiang, Tianqing Zhu, Hai Jin, Peng Xu, Sheng Shen

:
Differential Privacy Preservation for Smart Meter Systems. 669-685
Performance Modelling and Evaluation
- Maomao Fu, Xiaozhuo Gu, Wenhao Dai, Jingqiang Lin, Han Wang:

Secure Multi-receiver Communications: Models, Proofs, and Implementation. 689-709

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














