Default Cover Image

2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)

Aug. 10 2019 to Aug. 12 2019

Zhangjiajie, China

ISBN: 978-1-7281-2058-4

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 3-3
[Copyright notice]Freely available from IEEE.pp. 4-4
Table of contentsFreely available from IEEE.pp. 5-45
HPCC/SmartCity/DSS 2019 PrefaceFreely available from IEEE.pp. 46-46
HPCC/SmartCity/DSS 2019 Keynote SpeechesFreely available from IEEE.pp. 47-50
Message from the HPCC 2019 General ChairsFreely available from IEEE.pp. 51-51
Message from the HPCC 2019 Program ChairsFreely available from IEEE.pp. 52-52
HPCC 2019 Organizing and Program CommitteesFreely available from IEEE.pp. 53-58
Message from the SmartCity 2019 General ChairsFreely available from IEEE.pp. 59-59
Message from the SmartCity 2019 Program ChairsFreely available from IEEE.pp. 60-60
SmartCity 2019 Organizing and Program CommitteesFreely available from IEEE.pp. 61-64
Message from the DSS 2019 General ChairsFreely available from IEEE.pp. 65-65
Message from the DSS 2019 Program ChairsFreely available from IEEE.pp. 66-66
DSS 2019 Organizing and Program CommitteesFreely available from IEEE.pp. 67-71
An Asynchronous ADMM Algorithm for Distributed Optimization with Dynamic Scheduling StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Sharing Path Awareness Scheduling Algorithm for Dataflow ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 9-18
A Parallel Implementation of an XDraw Viewshed Algorithm with SparkFull-text access may be available. Sign in or learn about subscription options.pp. 19-28
A Multi-Objective Localization Algorithm with Real Average Distance in WSNFull-text access may be available. Sign in or learn about subscription options.pp. 29-36
A Multi-Block Grids Load Balancing Algorithm with Improved Block Partitioning StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
A Dynamic Multi-Strategies Scheduling Algorithm for Heterogeneous Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 45-50
A Forwarding Strategy Based on Recommendation Algorithm in Named Data NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 51-53
A Heterogeneous Parallel Genetic Algorithm Based on SW26010 ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 54-61
A Scientific Data Traffic Scheduling Algorithm Based on Software-Defined NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 62-67
A Parallel BMH String Matching Algorithm Based on OpenMPFull-text access may be available. Sign in or learn about subscription options.pp. 75-81
A Case Study on the Efficiency of User-Level Parallel File SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 90-97
A Deadline-Constrained Scheduling Algorithm for Scientific Workflows in CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 98-105
Performance Modelling and Optimization of Controller Cluster Deployments in Software-Defined WANFull-text access may be available. Sign in or learn about subscription options.pp. 106-113
PDMF: Parallel Dictionary Motif Finder on Multicore and GPUFull-text access may be available. Sign in or learn about subscription options.pp. 114-122
ACWB: Access-Characteristic Write Buffer Management Scheme for Flash MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 123-129
MDT: A Multi-Description Topic Based Clustering Approach for Composite-Service DiscoveryFull-text access may be available. Sign in or learn about subscription options.pp. 130-137
A Fast and Secure GPU Memory AllocatorFull-text access may be available. Sign in or learn about subscription options.pp. 146-153
Performance Prediction for the Apache Kafka Messaging SystemFull-text access may be available. Sign in or learn about subscription options.pp. 154-161
POEM+: Pricing Longer for Mobile Blockchain Computation Offloading with Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 162-167
Efficient Parallel Sort on AVX-512-Based Multi-Core and Many-Core ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 168-176
Chaotic Pilot and Synchronization Encryption of Optical OFDM System Based on Polar CodeFull-text access may be available. Sign in or learn about subscription options.pp. 177-181
An Auto Code Generator for Stencil on SW26010Full-text access may be available. Sign in or learn about subscription options.pp. 182-190
An Apache Spark-Based Platform for Predicting the Performance of Undergraduate StudentsFull-text access may be available. Sign in or learn about subscription options.pp. 191-199
A Bayesian Improved Defense Model for Deceptive Attack in Honeypot-Enabled NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 208-214
Fast Convergence Average Consensus-Based Time Synchronization with Innovative ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 215-222
Failure Order: A Missing Piece in Disk Failure Processing of Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 223-230
Entropy-Based Gradient Compression for Distributed Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 231-238
Accelerating HotSpots in Deep Neural Networks on a CAPI-Based FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 248-256
A Distributed Class-Incremental Learning Method Based on Neural Network Parameter FusionFull-text access may be available. Sign in or learn about subscription options.pp. 257-264
ERBFT: Efficient and Robust Byzantine Fault ToleranceFull-text access may be available. Sign in or learn about subscription options.pp. 265-272
Inferring Behaviors via Encrypted Video Surveillance Traffic by Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 273-280
FPGA Realization of MRC with Optimized Exponent for Adaptive Array AntennasFull-text access may be available. Sign in or learn about subscription options.pp. 281-288
FLONet: Fewer Labeling Cost Active Learning for Deep Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 289-296
Extract, Attend, Predict: Aspect-Based Sentiment Analysis with Deep Self-Attention NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 297-304
Energy-Efficient Data Caching Framework for Spark in Hybrid DRAM/NVM Memory ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 305-312
Dynamic Scheduling of EDA Scientific Workflows in Hybrid Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 313-320
A Parallel Turbo Product Codes Decoder Based on Graphics Processing UnitsFull-text access may be available. Sign in or learn about subscription options.pp. 337-344
A Face Privacy Protection Scheme Using CNN Based ROI EditingFull-text access may be available. Sign in or learn about subscription options.pp. 345-352
Hash Hardware Generator Based on Mutual Perturbed Logistic MapFull-text access may be available. Sign in or learn about subscription options.pp. 353-358
Fusing Syntax and Word Embedding Knowledge for Measuring Semantic SimilarityFull-text access may be available. Sign in or learn about subscription options.pp. 359-366
Collaborative Management System Driven by Task Flow in Supercomputing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 367-372
Characterizations and Architectural Implications of NVM's External DRAM CacheFull-text access may be available. Sign in or learn about subscription options.pp. 373-380
Application-Grained Block I/O Analysis for Edge Computational IntelligentFull-text access may be available. Sign in or learn about subscription options.pp. 381-388
Access-Aware Self-Adaptive Data Mapping onto 3D-Stacked Hybrid DRAM-PCM Based Chip-MultiprocessorFull-text access may be available. Sign in or learn about subscription options.pp. 389-396
A Comparative Study of Large-Scale Cluster Workload Traces via Multiview AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 397-404
A Fault-Tolerant Routing Strategy with Graceful Performance Degradation for Fat-Tree Topology SupercomputerFull-text access may be available. Sign in or learn about subscription options.pp. 405-412
Pream: Enhancing HPC Storage System Performance with Pre-Allocated Metadata Management MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 413-420
A Session-Packets-Based Encrypted Traffic Classification Using Capsule Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 429-436
A Secure Wireless Communication Mechanism Based on Multi-WFRFFull-text access may be available. Sign in or learn about subscription options.pp. 437-442
PROFPRED: A Compiler-Level IR Based Performance Prediction Framework for MPI Industrial ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 443-451
A 3D Smooth Random Walk Mobility Model for FANETsFull-text access may be available. Sign in or learn about subscription options.pp. 460-467
Low-Rate DoS Attack Detection Based on Improved Logistic RegressionFull-text access may be available. Sign in or learn about subscription options.pp. 468-476
Matching-Based Channel Assignment for Cooperative Sensing in Full-Duplex Cognitive Radio NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 477-483
Efficient Large-Scale 1D FFT Vectorization on Multi-Core Vector AcceleratorFull-text access may be available. Sign in or learn about subscription options.pp. 484-491
Detecting Malicious Domains Using Modified SVM ModelFull-text access may be available. Sign in or learn about subscription options.pp. 492-499
Bottleneck-Aware Task Scheduling Based on Per-Stage and Multi-ML ProfilingFull-text access may be available. Sign in or learn about subscription options.pp. 510-518
A Learning-Based Vehicle-Trajectory Generation Method for Vehicular NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 519-526
WMUD: A Whitelist Method of USB Devices Redirection for Virtual DesktopFull-text access may be available. Sign in or learn about subscription options.pp. 527-533
Feature-Aware Task Scheduling on CPU-FPGA Heterogeneous PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 534-541
Design and Implementation of GPU Accelerated Active Storage in FastDFSFull-text access may be available. Sign in or learn about subscription options.pp. 542-551
An Efficient GPU Implementation Technique for Higher-Order 3D StencilsFull-text access may be available. Sign in or learn about subscription options.pp. 552-561
An Efficient Design and Implementation of Deduplication on Open-Channel SSDsFull-text access may be available. Sign in or learn about subscription options.pp. 562-569
Address Randomization for Dynamic Memory Allocators on the GPUFull-text access may be available. Sign in or learn about subscription options.pp. 570-577
A New Storage Workload Management Model for High-Performance I/O SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 578-582
A New Hybrid Approach for C&C Channel DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 583-590
Dynamic Multi-Keyword Ranked Search Based on Simhash in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 591-598
Dynamic Data Access Control for Multi-Authority Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 599-608
ClustCrypt: Privacy-Preserving Clustering of Unstructured Big Data in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 609-616
Availability-Aware Multi-Objective Virtual Cluster Allocation Optimization in Energy-Efficient DatacentersFull-text access may be available. Sign in or learn about subscription options.pp. 617-624
Automatic Virtual Network Embedding Based on Deep Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 625-631
An Efficient Data Collection Module on Petascale SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 632-637
Adaptive Performance Modeling and Prediction of Applications in Multi-Tenant CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 638-645
A Real-Time Identification System for VoIP Traffic in Large-Scale NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 646-653
Interference-Aware I/O Scheduling for Data-Intensive Applications on Hierarchical HPC Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 654-661
Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 662-669
Showing 100 out of 398