Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CBD
CBD 2018
Generate Citations
2018 Sixth International Conference on Advanced Cloud and Big Data (CBD)
Aug. 12 2018 to Aug. 15 2018
Lanzhou, China
Table of Contents
Title Page i
Freely available from IEEE.
pp. 1-1
Title Page iii
Freely available from IEEE.
pp. 3-3
Copyright Page
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-11
Message from Conference Chairs
Freely available from IEEE.
pp. 12-12
Message from Program Chairs
Freely available from IEEE.
pp. 13-13
Conference Organization
Freely available from IEEE.
pp. 14-14
Program Committee
Freely available from IEEE.
pp. 15-16
Reviewers
Freely available from IEEE.
pp. 17-18
Load-Balanced Cluster for Scale-Out Storage of Knowledge
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Zheng Xiong
,
Guocheng Zhu
,
Wei Yu
,
Sen Wang
,
Zhihong Chong
A Scalable and Hierarchical Load Balancing Model for Control Plane of SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-11
by
Qiaozhi Xu
,
Lin Li
,
Jiamei Liu
,
Junxing Zhang
Scheduling Bag-of-Tasks Applications with Budget Constraints on Hybrid Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-17
by
Yi Zhang
,
Jin Sun
,
Zebin Wu
,
Li Chen
Parallel K-Medoids Improved Algorithm Based on MapReduce
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-23
by
Yonghan Zhao
,
Bin Chen
,
Mengyu Li
CASS: A Cooperative Hybrid Storage System Consisting of an SSD and a SMR Drive
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-29
by
Wenguo Liu
,
Lingfang Zeng
,
Dan Feng
The Virtual Machine Placement Algorithm Based on Equivalent Resource Model in the Offloading Data Center of Mobile Cloud Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-35
by
Changming Zhao
,
Hao Yang
An In-Network Aggregation Scheme for Erasure Coding Storage Systems in Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-41
by
Junxu Xia
,
Chendie Yao
,
Jiangfan Li
Using PVS for Modeling and Verifying Cloud Services and Their Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-47
by
M. Saqib Nawaz
,
Meng Sun
From Network Perspective to Optimize Shuffling Phase in MapReduce
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-53
by
Haifeng Wang
,
Yunpeng Cao
Stock Transaction Analysis System Based on Hadoop and Capital Flow
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-59
by
Feng Yu
,
Sheng-lin Cao
,
Shu-cheng Huang
,
Peng-fei Gan
SARF: A Spark Based Recommendation Framework in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-65
by
Jieyao Zhou
,
Yifei Lu
,
Ka Bian
,
Lei Qian
A Cloud Resource Allocation Method Supporting Sudden and Urgent Demands
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-70
by
Jing Chen
Exploration of Secured Workflow Scheduling Models in Cloud Environment: A Survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-76
by
Akindipe Olusegun Francis
,
Bugingo Emmanuel
,
Defu Zhang
,
Wei Zheng
,
Yingsheng Qin
,
Dongzhan Zhang
The Design of Distributed Power Big Data Analysis Framework and Its Application in Residential Electricity Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-82
by
Peng Wu
,
Jing Tan
A SINS-Assisted Fast Acquisition Method for GNSS Signals Based on Compressed Sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-88
by
Junbing Cheng
,
Deng-ao Li
,
Jumin Zhao
,
Zheng Wei
Track Quality Evaluation Method Research on Tactical Data Link
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-92
by
Wang Jing
,
He Chenglong
,
Wu Wei
,
Zhang Guilin
A Query Construction Method Based on Data Dependency for Gesture Interaction
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-99
by
Cheng Chunling
,
Wang Xiyang
,
Yuan Chenhui
A News Event Clustering Algorithm Based on Semantic Relationship Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-105
by
Liu Zhikang
,
Cheng Chunling
A Value-Attribute Mapping Method Based on Inverted Index
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-111
by
Limin Wang
,
Mei Wang
,
Dehua Chen
,
Qiao Pan
A Sample-Based Approximate Ranking Method for Large Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-117
by
Rujun Sun
,
Lufei Zhang
,
Zuoning Chen
Detecting Network-Wide Abnormal Behavior for Network Data Streams Based on Sketch
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-123
by
Aiping Zhou
,
Yiwei Shi
,
Huisheng Zhu
,
Jinhai Li
,
Chengang Zhu
Comparative Analysis of Different Sketch Methods in Practical Use
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-129
by
Yuan Zhang
,
Haiting Zhu
,
Nan Bao
,
Lu Zhang
Research on Enterprise Knowledge Unified Retrieval Based on Industrial Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-134
by
Zhang Xu
A Learning-Based Semantic Approximate Query over RDF Knowledge Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-141
by
Zhangpeng Ge
,
Yuxiang Wang
,
Haijiang Yan
,
Xiaoliang Xu
Research on Distributed Algorithm for Automatic Optimization of Turfgrass Introduction
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-147
by
Wei Linjing
,
Dong Wenke
,
Zhou Hui
,
Gao Zhenni
,
Chen Lei
Research on Community Detection Algorithm for Complex Networks with Multi-Attribute Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-153
by
Chen Dong-ming
,
Yan Yun
,
Fang Bo
,
Huang Xin-yu
,
Wang Dong-qi
Analysis of Shareholders Structure in Chinese Stock Market from a Complex Network Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-159
by
Lei Pan
,
Danhua Wang
,
Qi Wang
,
Tianyu Hu
Comparative Analysis of Chinese Airway Network Based on Complex Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-164
by
Jiayi Wu
,
Yong Yang
,
Kaijun Xu
Building Corporate Reputation on the Internet: Is the Claimed Sales-Ranking Trustworthy?
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-170
by
Youquan Wang
,
Changjian Fang
,
Dongqin Shen
,
Zhiang Wu
,
Jie Cao
Online Tourism Purchase Analysis and Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-176
by
Guixiang Zhu
,
Zhiang Wu
,
Jie Cao
,
Jun Gu
Spatio-Temporal Pattern Analysis and Prediction for Urban Crime
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-182
by
Zhe Li
,
Tianfan Zhang
,
Zhi Yuan
,
Zhiang Wu
,
Zhen Du
Community Detection Method Based on User Influence Probability and Similarity
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-190
by
Sheng-chen Yang
,
Lei-lei Shi
,
Lu Liu
A Semantic-Based Adaptive Recommendation Mechanism for Location Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-196
by
Bing Jia
,
Kai Niu
,
Lifei Hao
One Quantifiable Security Evaluation Model for Cloud Computing Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-201
by
Aobing Sun
,
Guohong Gao
,
Tongkai Ji
,
Xuping Tu
A Secure and Efficient ID-Based Signature Scheme with Revocation for IOT Deployment
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-207
by
Xiaodong Yang
,
Jinli Wang
,
Tingchun Ma
,
Chunlin Chen
,
Caifen Wang
Research on a Trust Model Based on the QoS and Malicious Node Deletion
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-214
by
Jiang Jing
,
Yu Yonghong
A New Distributed Intrusion Detection Method Based on Immune Mobile Agent
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-219
by
Yongzhong Li
,
Miao Du
,
Jing Xu
An Adaptive Blind Watermarking Algorithm Based on DCT and Its Application in Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-224
by
Yongzhong Li
,
Yi Li
,
Xuan Luo
CLOAK: Visible Touching and Invisible Protecting: Cloud Privacy Protection Based on LSB and Chaotic Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-229
by
Meiya Dong
,
Jumin Zhao
,
Dengao Li
,
Biaokai Zhu
,
Zhaobin Liu
A Cooperative Deep Belief Network for Intrusion Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-236
by
Xudong Yang
,
Ling Gao
,
Hai Wang
,
Jie Zheng
,
Rui Cao
A Mutual Authentication Method For Local MAC Address Allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-242
by
Xinran Fan
,
Zhengyou Xia
Homomorphic Hash and Blockchain Based Authentication Key Exchange Protocol for Strangers
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-248
by
Hailong Yao
,
Caifen Wang
,
Bo Hai
,
Shiqiang Zhu
Fingerprinting Network Device Based on Traffic Analysis in High-Speed Network Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-256
by
Yiting Zhang
,
Ming Yang
,
Xiaodan Gu
,
Peilong Pan
,
Zhen Ling
Privacy Preservation of Location Information Based on MinHash Algorithm in Online Ride-Hailing Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-262
by
Miaomiao Li
,
Licheng Wang
Privacy Preserving Profile Matching for Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-268
by
Taolin Guo
,
Kai Dong
,
Lihe Wang
,
Ming Yang
,
Junzhou Luo
New Pruning Methods for Mining Minimal Functional Dependencies from Large-Scale Distributed Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-274
by
Feng Cheng
,
Zhe Yang
Reconstruction of 12-Lead Electrocardiogram Based on GVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-280
by
Zijian Xu
,
Rui Zhou
,
Yunshan Cao
,
Binbin Yong
,
Xin Wang
,
Qingguo Zhou
A Parallel Approach on Clustering Traffic Data Stream Based on the Density
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-286
by
Jiamin Lu
,
Jun Feng
,
Jin Zhang
,
Peipei Xia
,
Xianjian Xiao
DeepDiagnosis: DNN-Based Diagnosis Prediction from Pediatric Big Healthcare Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-292
by
Jia Shi
,
Xiaoliang Fan
,
Jinzhun Wu
,
Jian Chen
,
Wenbo Chen
Hierarchy Training Strategy in Image Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-297
by
Luyu Fan
,
Chunfang Li
,
Minyong Shi
Study on Most Important Factor and Most Vulnerable Location for a Forest Fire Case Using Various Machine Learning Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-303
by
Hanchao Li
,
Xiang Fei
,
Chaobo He
A Method of Rainfall Runoff Forecasting Based on Deep Convolution Neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-310
by
Xiaoli Li
,
Zhenlong Du
,
Guomei Song
A Hybrid BLSTM-C Neural Network Proposed for Chinese Text Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-315
by
Xutao Wang
,
Yue Li
,
Pengjian Xu
Improved Weight Slope One Algorithm of Integrating Expert Similarity and Item Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-321
by
Weiqian Li
,
Ling Gao
,
Hai Wang
,
Ziyun Zhang
,
Yi Zhang
A New Structure for Internet Video Traffic Classification Using Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-327
by
Zheng Wu
,
Yuning Dong
,
Lingyun Yang
,
Pingping Tang
SDCAE: Stack Denoising Convolutional Autoencoder Model for Accident Risk Prediction Via Traffic Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-333
by
Chao Chen
,
Xiaoliang Fan
,
Chuanpan Zheng
,
Lujing Xiao
,
Ming Cheng
,
Cheng Wang
Anomaly Detection Using LSTM in IP Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-337
by
Gang Qin
,
Ying Chen
,
Yu-Xin Lin
A Stock Trading Intention Recognition Model Based on Data Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-343
by
Sheng-lin Cao
,
Li-yan Liu
,
Feng Yu
,
Xue-mei Ma
Texture Recognition and Classification Based on Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-348
by
Gaoming Zhu
,
Bingchan Li
,
Shuai Hong
,
Bo Mao
TC and PPGL Detection Based on Machine Learning Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-353
by
Xin Wang
,
Binbin Yong
,
Yunshan Cao
,
Gaofeng Zhang
,
Qingguo Zhou
Load-Aware AP Scheduling in Green WLANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 354-359
by
Weihong Xu
,
Xiaomin Shi
,
Ming Yang
,
Wenjia Wu
Detecting Repackaged Android Malware Based on Mobile Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-365
by
Gaofeng He
,
Lu Zhang
,
Bingfeng Xu
,
Haiting Zhu
Multi-view Learning Based Edge Storage Management Strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-371
by
Quanli Gao
,
Ling Gao
,
Tao Xue
,
Xinjuan Zhu
,
Xueqing Zhao
,
Rui Cao
Service Deployment for Latency Sensitive Applications in Mobile Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-377
by
Jingya Zhou
,
Jianxi Fan
,
Jin Wang
,
Juncheng Jia
Author Index
Freely available from IEEE.
pp. 379-381
Publisher's Information
Freely available from IEEE.
pp. 382-382
Showing 75 out of 75