Default Cover Image

2018 Sixth International Conference on Advanced Cloud and Big Data (CBD)

Aug. 12 2018 to Aug. 15 2018

Lanzhou, China

Table of Contents

Title Page iFreely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-11
Message from Conference ChairsFreely available from IEEE.pp. 12-12
Message from Program ChairsFreely available from IEEE.pp. 13-13
Conference OrganizationFreely available from IEEE.pp. 14-14
Program CommitteeFreely available from IEEE.pp. 15-16
ReviewersFreely available from IEEE.pp. 17-18
Load-Balanced Cluster for Scale-Out Storage of KnowledgeFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A Scalable and Hierarchical Load Balancing Model for Control Plane of SDNFull-text access may be available. Sign in or learn about subscription options.pp. 6-11
Scheduling Bag-of-Tasks Applications with Budget Constraints on Hybrid CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 12-17
Parallel K-Medoids Improved Algorithm Based on MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 18-23
CASS: A Cooperative Hybrid Storage System Consisting of an SSD and a SMR DriveFull-text access may be available. Sign in or learn about subscription options.pp. 24-29
An In-Network Aggregation Scheme for Erasure Coding Storage Systems in Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 36-41
Using PVS for Modeling and Verifying Cloud Services and Their CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 42-47
From Network Perspective to Optimize Shuffling Phase in MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 48-53
Stock Transaction Analysis System Based on Hadoop and Capital FlowFull-text access may be available. Sign in or learn about subscription options.pp. 54-59
SARF: A Spark Based Recommendation Framework in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 60-65
A Cloud Resource Allocation Method Supporting Sudden and Urgent DemandsFull-text access may be available. Sign in or learn about subscription options.pp. 66-70
The Design of Distributed Power Big Data Analysis Framework and Its Application in Residential Electricity AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 77-82
A SINS-Assisted Fast Acquisition Method for GNSS Signals Based on Compressed SensingFull-text access may be available. Sign in or learn about subscription options.pp. 83-88
Track Quality Evaluation Method Research on Tactical Data LinkFull-text access may be available. Sign in or learn about subscription options.pp. 89-92
A Query Construction Method Based on Data Dependency for Gesture InteractionFull-text access may be available. Sign in or learn about subscription options.pp. 93-99
A News Event Clustering Algorithm Based on Semantic Relationship GraphFull-text access may be available. Sign in or learn about subscription options.pp. 100-105
A Value-Attribute Mapping Method Based on Inverted IndexFull-text access may be available. Sign in or learn about subscription options.pp. 106-111
A Sample-Based Approximate Ranking Method for Large GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 112-117
Detecting Network-Wide Abnormal Behavior for Network Data Streams Based on SketchFull-text access may be available. Sign in or learn about subscription options.pp. 118-123
Comparative Analysis of Different Sketch Methods in Practical UseFull-text access may be available. Sign in or learn about subscription options.pp. 124-129
Research on Enterprise Knowledge Unified Retrieval Based on Industrial Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 130-134
A Learning-Based Semantic Approximate Query over RDF Knowledge GraphFull-text access may be available. Sign in or learn about subscription options.pp. 135-141
Research on Distributed Algorithm for Automatic Optimization of Turfgrass IntroductionFull-text access may be available. Sign in or learn about subscription options.pp. 142-147
Research on Community Detection Algorithm for Complex Networks with Multi-Attribute NodesFull-text access may be available. Sign in or learn about subscription options.pp. 148-153
Analysis of Shareholders Structure in Chinese Stock Market from a Complex Network PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 154-159
Comparative Analysis of Chinese Airway Network Based on Complex NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 160-164
Building Corporate Reputation on the Internet: Is the Claimed Sales-Ranking Trustworthy?Full-text access may be available. Sign in or learn about subscription options.pp. 165-170
Online Tourism Purchase Analysis and PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 171-176
Spatio-Temporal Pattern Analysis and Prediction for Urban CrimeFull-text access may be available. Sign in or learn about subscription options.pp. 177-182
Community Detection Method Based on User Influence Probability and SimilarityFull-text access may be available. Sign in or learn about subscription options.pp. 183-190
A Semantic-Based Adaptive Recommendation Mechanism for Location ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 191-196
One Quantifiable Security Evaluation Model for Cloud Computing PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 197-201
A Secure and Efficient ID-Based Signature Scheme with Revocation for IOT DeploymentFull-text access may be available. Sign in or learn about subscription options.pp. 202-207
Research on a Trust Model Based on the QoS and Malicious Node DeletionFull-text access may be available. Sign in or learn about subscription options.pp. 208-214
A New Distributed Intrusion Detection Method Based on Immune Mobile AgentFull-text access may be available. Sign in or learn about subscription options.pp. 215-219
An Adaptive Blind Watermarking Algorithm Based on DCT and Its Application in Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 220-224
A Cooperative Deep Belief Network for Intrusion DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 230-236
A Mutual Authentication Method For Local MAC Address AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 237-242
Homomorphic Hash and Blockchain Based Authentication Key Exchange Protocol for StrangersFull-text access may be available. Sign in or learn about subscription options.pp. 243-248
Fingerprinting Network Device Based on Traffic Analysis in High-Speed Network EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 249-256
Privacy Preservation of Location Information Based on MinHash Algorithm in Online Ride-Hailing ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 257-262
Privacy Preserving Profile Matching for Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 263-268
New Pruning Methods for Mining Minimal Functional Dependencies from Large-Scale Distributed DataFull-text access may be available. Sign in or learn about subscription options.pp. 269-274
Reconstruction of 12-Lead Electrocardiogram Based on GVMFull-text access may be available. Sign in or learn about subscription options.pp. 275-280
A Parallel Approach on Clustering Traffic Data Stream Based on the DensityFull-text access may be available. Sign in or learn about subscription options.pp. 281-286
DeepDiagnosis: DNN-Based Diagnosis Prediction from Pediatric Big Healthcare DataFull-text access may be available. Sign in or learn about subscription options.pp. 287-292
Hierarchy Training Strategy in Image ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 293-297
A Method of Rainfall Runoff Forecasting Based on Deep Convolution Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 304-310
A Hybrid BLSTM-C Neural Network Proposed for Chinese Text ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 311-315
Improved Weight Slope One Algorithm of Integrating Expert Similarity and Item CharacteristicsFull-text access may be available. Sign in or learn about subscription options.pp. 316-321
A New Structure for Internet Video Traffic Classification Using Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 322-327
Anomaly Detection Using LSTM in IP NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 334-337
A Stock Trading Intention Recognition Model Based on Data ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 338-343
Texture Recognition and Classification Based on Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 344-348
TC and PPGL Detection Based on Machine Learning ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 349-353
Load-Aware AP Scheduling in Green WLANsFull-text access may be available. Sign in or learn about subscription options.pp. 354-359
Detecting Repackaged Android Malware Based on Mobile Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 360-365
Multi-view Learning Based Edge Storage Management StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 366-371
Service Deployment for Latency Sensitive Applications in Mobile Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 372-377
Author IndexFreely available from IEEE.pp. 379-381
Publisher's InformationFreely available from IEEE.pp. 382-382
Showing 75 out of 75