Login / Signup
ICA3PP (Workshops and Symposiums)
2015
2015
2015
Keyphrases
Publications
2015
Ryan K. L. Ko
,
Giovanni Russello
,
Richard Nelson
,
Shaoning Pang
,
Aloysius Cheang
,
Gillian Dobbie
,
Abdolhossein Sarrafzadeh
,
Sivadon Chaisiri
,
Muhammad Rizwan Asghar
,
Geoffrey Holmes
STRATUS: Towards Returning Data Control to Cloud Users.
ICA3PP (Workshops and Symposiums)
(2015)
Chun-Ta Li
,
Cheng-Chi Lee
,
Chun-Cheng Wang
,
Tzu-Hui Yang
,
Song-Jhih Chen
Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments.
ICA3PP (Workshops and Symposiums)
(2015)
Lifang Liu
,
Xiaogang Qi
,
Gengzhong Zheng
,
Mande Xie
An Energy-Efficient Aggregation and Collection Algorithm for Heterogeneous Wireless Sensor Network.
ICA3PP (Workshops and Symposiums)
(2015)
Hui Li
,
Nengjun Qiu
,
Mei Chen
,
Hongyuan Li
,
Zhenyu Dai
,
Ming Zhu
,
Menglin Huang
FASTDB: An Array Database System for Efficient Storing and Analyzing Massive Scientific Data.
ICA3PP (Workshops and Symposiums)
(2015)
Chengcheng Xu
,
Shuhui Chen
,
Xiaofeng Wang
,
Jinshu Su
An Efficient Pre-filter to Accelerate Regular Expression Matching.
ICA3PP (Workshops and Symposiums)
(2015)
Jin B. Hong
,
Chun-Jen Chung
,
Dijiang Huang
,
Dong Seong Kim
Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
ICA3PP (Workshops and Symposiums)
(2015)
Zheng Xu
,
Buyang Cao
A Parallel Tabu Search Algorithm with Solution Space Partition for Cohesive Clustering Problems.
ICA3PP (Workshops and Symposiums)
(2015)
Qun Liao
,
Shuangshuang Jiang
,
Qiaoxiang Hei
,
Tao Li
,
Yulu Yang
Scheduling Stochastic Tasks with Precedence Constrain on Cluster Systems with Heterogenous Communication Architecture.
ICA3PP (Workshops and Symposiums)
(2015)
Luyan Nie
,
Chuanzhi Xie
,
Yujun Yin
,
Xin Li
Context-Aware QoS Assurance for Smart Grid Big Data Processing with Elastic Cloud Resource Reconfiguration.
ICA3PP (Workshops and Symposiums)
(2015)
Liu Yang
MTCPP: Multi-targets K-Coverage Preservation Protocol in Wireless Sensor Networks.
ICA3PP (Workshops and Symposiums)
(2015)
Fengli Zhang
,
Junjiao Zhang
,
Hongchuan Zhou
Unknown Bit Stream Protocol Message Discovery with Zero Knowledge.
ICA3PP (Workshops and Symposiums)
(2015)
Zhen Wang
,
Jianhui Jiang
Effect of Bias Temperature Instability on Soft Error Rate.
ICA3PP (Workshops and Symposiums)
(2015)
Zheng Ma
,
Jin Zheng
,
Weijia Jia
,
Guojun Wang
An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor Network.
ICA3PP (Workshops and Symposiums)
(2015)
Zhihai Wang
,
Weidong Chen
A Simple Local Search Algorithm for Minimizing Interference in Wireless Sensor Networks.
ICA3PP (Workshops and Symposiums)
(2015)
Yang Liu
,
Liang Deng
Acceleration of CFD Engineering Software on GPU and MIC.
ICA3PP (Workshops and Symposiums)
(2015)
Dacheng Wang
,
Hong Song
,
Yun Xu
,
Wenhao Zhang
,
Jianxin Wang
A Web-Based Resource Management Platform for Transparent Computing.
ICA3PP (Workshops and Symposiums)
(2015)
Wei Zhou
,
Yang Xu
,
Lijuan Yang
,
Guojun Wang
Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications.
ICA3PP (Workshops and Symposiums)
(2015)
Jun Xu
,
Yong Tang
Research of Improved Particle Swarm Optimization Based on Genetic Algorithm for Hadoop Task Scheduling Problem.
ICA3PP (Workshops and Symposiums)
(2015)
Yang Yu
,
Qi Dong
,
Zhipeng Luo
,
Hao Chen
,
Jun Deng
,
Wei Guan
A Security-Critical Task Management Method for Distributed Real-Time Systems.
ICA3PP (Workshops and Symposiums)
(2015)
Wei Shi
,
Gaofeng Lv
,
Zhigang Sun
,
Zhenghu Gong
HiTrans: An FPGA-Based Gateway Design and Implementation in HPC Environments.
ICA3PP (Workshops and Symposiums)
(2015)
Adil Amjad Sheikh
,
Ahmed Lbath
,
Ehsan Ullah Warriach
,
Emad A. Felemban
A Predictive Data Reliability Method for Wireless Sensor Network Applications.
ICA3PP (Workshops and Symposiums)
(2015)
Weixiang Zhang
,
Bo Wei
,
Huisen Du
An Output-Oriented Approach of Test Data Generation Based on Genetic Algorithm.
ICA3PP (Workshops and Symposiums)
(2015)
Yu Zhang
,
Yanbing Liu
,
Jing Yu
,
Ping Liu
,
Li Guo
VSEP: A Distributed Algorithm for Graph Edge Partitioning.
ICA3PP (Workshops and Symposiums)
(2015)
Peixin Chen
,
Xiaofeng Wang
,
Jinshu Su
An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage.
ICA3PP (Workshops and Symposiums)
(2015)
Guiyun Liu
,
Jing Yao
,
Hongbin Chen
,
Han Zhang
,
Dong Tang
Symmetric Game for Distributed Estimation in Energy Harvesting Wireless Sensor Networks with Selfish Sensors.
ICA3PP (Workshops and Symposiums)
(2015)
Changji Wang
,
Jing Liu
Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks.
ICA3PP (Workshops and Symposiums)
(2015)
Wenjuan Tang
,
Yang Xu
,
Guojun Wang
,
Yaoxue Zhang
An Illegal Indirect Access Prevention Method in Transparent Computing System.
ICA3PP (Workshops and Symposiums)
(2015)
Hongyun Xu
,
Jun Yang
,
Yong Zhang
,
Mengzhen Xu
,
Jiayi Gan
Study on Personalized Location Privacy Preservation Algorithms Based on Road Networks.
ICA3PP (Workshops and Symposiums)
(2015)
Mahnaz Malekzadeh
,
Iain Bate
Influential Nuisance Factors on a Decision of Sufficient Testing.
ICA3PP (Workshops and Symposiums)
(2015)
Shicong Ma
,
Baosheng Wang
,
Xianming Gao
,
Xiaozhe Zhang
A Sharing-Memory Based Ring Framework.
ICA3PP (Workshops and Symposiums)
(2015)
Anjana P. Das
,
Sabu M. Thampi
Single Anchor Node Based Localization in Mobile Underwater Wireless Sensor Networks.
ICA3PP (Workshops and Symposiums)
(2015)
Marcin Gorawski
,
Miroslaw Skrzewski
,
Michal Gorawski
,
Anna Gorawska
Neural Networks in Petrol Station Objects Calibration.
ICA3PP (Workshops and Symposiums)
(2015)
Hongling Xiao
,
Hong Song
,
Weiping Wang
EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks.
ICA3PP (Workshops and Symposiums)
(2015)
Deepa S. Nair
,
Muhammed Ilyas H.
Energy Efficient Encryption Scheme for Network-Coded Mobile Ad Hoc Networks.
ICA3PP (Workshops and Symposiums)
(2015)
Xia Wei
,
Wen-Xiang Li
,
Cong Ran
,
Chunchun Pi
,
Ya-Jie Ma
,
Yuxia Sheng
Architecture and Scheduling Method of Cloud Video Surveillance System Based on IoT.
ICA3PP (Workshops and Symposiums)
(2015)
Christian Esposito
,
Aniello Castiglione
,
Francesco Palmieri
Dealing with Reliable Event-Based Communications by Means of Layered Multicast.
ICA3PP (Workshops and Symposiums)
(2015)
Meili Cao
,
Haizhen He
,
Rongming Luo
,
Lei Wen
Nth-Order Multifunction Filter Employing Current Differencing Transconductance Amplifiers.
ICA3PP (Workshops and Symposiums)
(2015)
Xin Zhou
,
Hui Li
,
Xiao Zhang
,
Shan Wang
,
Yanyu Ma
,
Ke-yan Liu
,
Ming Zhu
,
Menglin Huang
ABR-Tree: An Efficient Distributed Multidimensional Indexing Approach for Massive Data.
ICA3PP (Workshops and Symposiums)
(2015)
Mingwu Zhang
,
Biwen Chen
,
Hua Shen
Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption.
ICA3PP (Workshops and Symposiums)
(2015)
Liu Chen
,
Wei Zhou
A Cycle-Time-Analysis Model for Byzantine Fault Tolerance.
ICA3PP (Workshops and Symposiums)
(2015)
Taehoon Eom
,
Jin B. Hong
,
Jong Sou Park
,
Dong Seong Kim
Security Modeling and Analysis of a SDN Based Web Service.
ICA3PP (Workshops and Symposiums)
(2015)
Yanzhu Liu
,
Zhi Li
,
Yuxia Sun
Distributed Authentication in the Cloud Computing Environment.
ICA3PP (Workshops and Symposiums)
(2015)
Sheng Xu
,
Binzhang Fu
,
Mingyu Chen
,
Lixin Zhang
An Effective Correlation-Aware VM Placement Scheme for SLA Violation Reduction in Data Centers.
ICA3PP (Workshops and Symposiums)
(2015)
Adrian Johannes
,
Priyadarsi Nanda
,
Xiangjian He
Resource Utilization Based Dynamic Pricing Approach on Cloud Computing Application.
ICA3PP (Workshops and Symposiums)
(2015)
Peixin Chen
,
Xiaofeng Wang
,
Baokang Zhao
,
Jinshu Su
,
Ilsun You
Removing Key Escrow from the LW-HIBE Scheme.
ICA3PP (Workshops and Symposiums)
(2015)
Tao Lin
,
Jianhua Gao
,
Xue Fu
,
Yan Lin
A Novel Bug Report Extraction Approach.
ICA3PP (Workshops and Symposiums)
(2015)
Leyou Zhang
,
Zhuanning Wang
,
Qing Wu
Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model.
ICA3PP (Workshops and Symposiums)
(2015)
Qun Li
,
Lei Zhang
,
Shifeng Hou
,
Zhenxiang Chen
,
Hongbo Han
Reconstruction of Android Applications' Network Behavior Based on Application Layer Traffic.
ICA3PP (Workshops and Symposiums)
(2015)
Roshni Kadeparambil Raphel
,
Muhammed Ilyas H.
,
Janu R. Panicker
Multiple Secret Sharing Using Natural Language Letter Based Visual Cryptography Scheme.
ICA3PP (Workshops and Symposiums)
(2015)
volume 9532, 2015
Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings
ICA3PP (Workshops and Symposiums)
9532 (2015)