Default Cover Image

2016 IEEE 18th International Conference on High-Performance Computing and Communications, IEEE 14th International Conference on Smart City, and IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)

Dec. 12 2016 to Dec. 14 2016

Sydney, NSW

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-xvii
Message from HPCC2016 ChairsFreely available from IEEE.pp. xviii-xviii
HPCC2016 Organizing and Program CommitteesFreely available from IEEE.pp. xix-xxi
Message from SmartCity2016 ChairsFreely available from IEEE.pp. xxii-xxii
SmartCity2016 Organizing and Program CommitteesFreely available from IEEE.pp. xxiii-xxv
Message from DSS2016 ChairsFreely available from IEEE.pp. xxvi-xxvi
DSS2016 Organizing and Program CommitteesFreely available from IEEE.pp. xxvii-xxix
Fast Community Detection in Large Weighted Networks Using GraphX in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
On Speeding-Up Parallel Jacobi Iterations for SVDsFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Big Data: The V's of the Game Changer ParadigmFull-text access may be available. Sign in or learn about subscription options.pp. 17-24
A Hybrid Samples Generation Approach in Speculative MultithreadingFull-text access may be available. Sign in or learn about subscription options.pp. 35-41
An Experimental Study of Redundant Array of Independent SSDs and FilesystemsFull-text access may be available. Sign in or learn about subscription options.pp. 42-49
Social Recommendation GIS for Urban Tourist SpotsFull-text access may be available. Sign in or learn about subscription options.pp. 50-57
Identifying Tunnelled Proxies through Passively Monitoring Network TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 63-69
A Node Stability-Based Multipath Routing Protocol in Heterogeneous Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 70-77
A Dynamic Pricing Method for Carpooling Service Based on Coalitional Game AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 78-85
SpongeNet+: A Two-Layer Bandwidth Allocation Framework for Cloud DatacenterFull-text access may be available. Sign in or learn about subscription options.pp. 86-93
An Empirical Study of VM Provisioning Strategies on IaaS CloudFull-text access may be available. Sign in or learn about subscription options.pp. 94-101
Reducing the Communication Costs of Graph Analysis by Read-Only Replicas and Prioritized ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 102-109
Enhancing Network Security Strategies against External Threats to Civil AircraftFull-text access may be available. Sign in or learn about subscription options.pp. 110-115
SAWS: Selective Asymmetry-Aware Work-Stealing for Asymmetric Multi-core ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 116-123
A Load-Balancing Data Caching Scheme in Multi-tiered Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 124-127
Managing Performance Degradation of Collocated Virtual Machines in Private CloudFull-text access may be available. Sign in or learn about subscription options.pp. 128-135
Smart Energy-Aware Data Allocation for Heterogeneous MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 136-143
A Novel Automated GUI Testing Echnology Based on Image RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 144-149
Periodic Scheduling of Deadline-Constrained Bandwidth Reservations for Scientific CollaborationFull-text access may be available. Sign in or learn about subscription options.pp. 150-157
Leveraging Locality to Boost the Update Performance of Network-Coding-Based Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 158-165
When Video Streaming Meets Named Data Networking: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 166-173
Predicting the Bursts of Data Access Streams by Filtering Correlated I/OsFull-text access may be available. Sign in or learn about subscription options.pp. 174-181
Towards Efficient Collaborative Filtering Using Parallel Graph Model and Improved Similarity MeasureFull-text access may be available. Sign in or learn about subscription options.pp. 182-189
Composable Locality Optimizations for Accelerating Parallel Forest ComputationsFull-text access may be available. Sign in or learn about subscription options.pp. 190-197
Understanding Data Analytics Workloads on Intel(R) Xeon Phi(R)Full-text access may be available. Sign in or learn about subscription options.pp. 206-215
Congestion-Aware Adaptive Routing with Quantitative Congestion InformationFull-text access may be available. Sign in or learn about subscription options.pp. 216-223
Optimized GPU Acceleration Algorithm of Convolutional Neural Networks for Target DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 224-230
MR-MC: A Joint Routing Protocol in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 231-236
Accelerating Range Query Execution of In-Memory Stores: A Performance StudyFull-text access may be available. Sign in or learn about subscription options.pp. 237-244
Restricted Boltzmann Machines and Deep Belief Networks on Sunway ClusterFull-text access may be available. Sign in or learn about subscription options.pp. 245-252
A Content Store-Based Module for Congestion Control Algorithms of Named Data NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 253-259
LLC Buffer for Arbitrary Data Sharing in Heterogeneous SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 260-267
TBuffer: Constructing a Tail Buffer in DRAM for Flash-Based Main Memory SystemFull-text access may be available. Sign in or learn about subscription options.pp. 276-283
PCAFP for Solving CNOP in Double-Gyre Variation and Its Parallelization on ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 284-291
A Hybrid Power-Performance Adjustment Strategy for Clustered Multi-threading ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 292-300
Time-Sharing Redux for Large-Scale HPC SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 301-308
STARS: Startup-Time-Aware Resource Provisioning and Real-Time Task Scheduling in CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 309-316
Automatic, On-Line Tuning of YARN Container Memory and CPU ParametersFull-text access may be available. Sign in or learn about subscription options.pp. 317-324
Cooperative Content Dissemination Based on User Grouping in Multimedia CloudFull-text access may be available. Sign in or learn about subscription options.pp. 325-332
Parallel Modified Artificial Bee Colony Algorithm for Solving Conditional Nonlinear Optimal PerturbationFull-text access may be available. Sign in or learn about subscription options.pp. 333-340
Compression and De-calcification for MemcachedFull-text access may be available. Sign in or learn about subscription options.pp. 341-347
GAMS: Genome Assembly on Multi-GPU Using String GraphFull-text access may be available. Sign in or learn about subscription options.pp. 348-355
An Improved Community Detection Algorithm Based on the Edge-Graph of Network under the Spark EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 356-363
Energy-Aware Dynamic Resource Allocation on Hadoop YARN ClusterFull-text access may be available. Sign in or learn about subscription options.pp. 364-371
The Real-Time Scheduling Strategy Based on Traffic and Load Balancing in StormFull-text access may be available. Sign in or learn about subscription options.pp. 372-379
Dynamic Resource Provisioning for Video Transcoding in IaaS CloudFull-text access may be available. Sign in or learn about subscription options.pp. 380-384
Strengthen Software-Defined Network in CloudFull-text access may be available. Sign in or learn about subscription options.pp. 385-392
Optimized Hybrid Redundant Multi-cloud Method with Deduplication MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 393-397
Space and Time Constrained Data Offloading in Vehicular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 398-405
A Graph-Based Thread Partition Approach in Speculative MultithreadingFull-text access may be available. Sign in or learn about subscription options.pp. 406-413
Power Analysis with Variable Traffic Loads for Next Generation Interconnection NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 422-429
Study on Address Blocks with Inaccurate Geolocations of China's InternetFull-text access may be available. Sign in or learn about subscription options.pp. 438-442
Implementing Molecular Dynamics Simulation on Sunway TaihuLight SystemFull-text access may be available. Sign in or learn about subscription options.pp. 443-450
A Description Method for Network ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 451-456
SLA-Aware and Green Resource Management of IaaS CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 457-464
Defect Prediction on Unlabeled Datasets by Using Unsupervised ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 465-472
Exploring Application Performance on Emerging Hybrid-Memory SupercomputersFull-text access may be available. Sign in or learn about subscription options.pp. 473-480
Directional Core Selection Approach for Delay and Delay Variation Multicast RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 481-488
RBT-MF: A Distributed Rubber Band Technique for Maximum Flow Problem in AzureFull-text access may be available. Sign in or learn about subscription options.pp. 489-496
HPGraph: A High Parallel Graph Processing System Based on Flash ArrayFull-text access may be available. Sign in or learn about subscription options.pp. 497-505
A Novel Secure Coding-Based Approach for Multi-cast TransmissionFull-text access may be available. Sign in or learn about subscription options.pp. 506-513
A Proactive Forensics Approach for Virtual Machines via Dynamic and Static AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 514-521
Br2Br: A Vector-Based Trust Framework for WebRTC Calling ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 522-529
A Resource Provisioning Strategy for Elastic Analytical Workflows in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 538-545
Energy Optimization for Multi-level Cell STT-MRAM Using State RemappingFull-text access may be available. Sign in or learn about subscription options.pp. 546-553
Two-Stage Game for Joint Bandwidth and Multiple Homing Relay Allocation in Cooperative D2D NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 554-561
WiseFi: Activity Localization and Recognition on Commodity Off-the-Shelf WiFi DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 562-569
HMSS: A High Performance Host-Managed Shingled Storage System Based on Awareness of SMR on Block LayerFull-text access may be available. Sign in or learn about subscription options.pp. 570-577
A Novel Method for Tuning Configuration Parameters of Spark Based on Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 586-593
Group Feature Selection via Structural Sparse Logistic Regression for IDSFull-text access may be available. Sign in or learn about subscription options.pp. 594-600
Parallel Solution of Diagonally Dominant Banded Triangular Toeplitz Systems Using Taylor PolynomialsFull-text access may be available. Sign in or learn about subscription options.pp. 601-607
Reducing Access Latency in Virtual Machine AssignmentsFull-text access may be available. Sign in or learn about subscription options.pp. 616-622
S-Storm: A Slot-Aware Scheduling Strategy for Even Scheduler in StormFull-text access may be available. Sign in or learn about subscription options.pp. 623-630
DAG Constrained Scheduling Prototype for an Astronomy Exa-Scale HPC ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 631-638
dMath: Linear Algebra for Scaleout GP-GPUsFull-text access may be available. Sign in or learn about subscription options.pp. 647-654
SLA-Aware Scheduling of Map-Reduce Applications on Public CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 655-662
TZ-KPM:Kernel Protection Mechanism on Embedded Devices on Hardware-Assisted Isolated EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 663-670
On the Design and Implementation of a Security Architecture for Software Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 671-678
Parallel Image Processing on the Sunway Many-Core ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 679-686
One-to-Many File Transfers Using Multipath-Multicast with Coding at SourceFull-text access may be available. Sign in or learn about subscription options.pp. 687-694
Showing 100 out of 224