Default Cover Image

2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)

Dec. 2 2020 to Dec. 4 2020

Hong Kong

ISBN: 978-1-7281-9074-7

Table of Contents

[Title page]Freely available from IEEE.pp. 1-1
CopyrightFreely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. v-xvii
Message from the General ChairFreely available from IEEE.pp. xviii-xviii
Message from the Program ChairFreely available from IEEE.pp. xix-xx
Organizing CommitteeFreely available from IEEE.pp. xxi-xxi
Program CommitteeFreely available from IEEE.pp. xxii-xxvi
Steering CommitteeFreely available from IEEE.pp. xxvii-xxvii
ReviewersFreely available from IEEE.pp. xxviii-xxxi
LTG-LSM: The Optimal Structure in LSM-tree Combined with Reading HotnessFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Efficient Sparse-Dense Matrix-Matrix Multiplication on GPUs Using the Customized Sparse Storage FormatFull-text access may be available. Sign in or learn about subscription options.pp. 19-26
Joint Service Placement and Request Scheduling for Multi-SP Mobile Edge Computing NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 27-34
A similarity clustering-based deduplication strategy in cloud storage systemsFull-text access may be available. Sign in or learn about subscription options.pp. 35-43
A Fair Task Assignment Strategy for Minimizing Cost in Mobile CrowdsensingFull-text access may be available. Sign in or learn about subscription options.pp. 44-53
Communication-Aware Load Balancing of the LU Factorization over Heterogeneous ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 54-63
An Efficient Work-Stealing Scheduler for Task Dependency GraphFull-text access may be available. Sign in or learn about subscription options.pp. 64-71
A Method to Detecting Artifact Anomalies in A Microservice ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 81-88
Contention resolution on a restrained channelFull-text access may be available. Sign in or learn about subscription options.pp. 89-98
Real-Time Scheduling and Analysis of OpenMP Programs with Spin LocksFull-text access may be available. Sign in or learn about subscription options.pp. 99-108
Predicting Performance Degradation on Adaptive Cache Replacement PolicyFull-text access may be available. Sign in or learn about subscription options.pp. 109-116
Making Inconsistent Components More Efficient For Hybrid B+TreesFull-text access may be available. Sign in or learn about subscription options.pp. 117-123
XOR-Net: An Efficient Computation Pipeline for Binary Neural Network Inference on Edge DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 124-131
Load Balance Awared Data Sharing Systems In Heterogeneous Edge EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 132-139
Themis: Malicious Wear Detection and Defense for Persistent Memory File SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 140-147
Incentive Mechanism Design for Federated Learning: A Two-stage Stackelberg Game ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 148-155
Time Efficient Federated Learning with Semi-asynchronous CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 156-163
Multi-agent Fault-tolerant Reinforcement Learning with Noisy EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 164-171
Decentralized Exploration of a Structured Environment Based on Multi-agent Deep Reinforcement LearningFull-text access may be available. Sign in or learn about subscription options.pp. 172-179
D2D-Enabled Reliable Data Collection for Mobile Crowd SensingFull-text access may be available. Sign in or learn about subscription options.pp. 180-187
Improving the Applicability of Visual Peer-to-Peer Navigation with CrowdsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 188-195
An Effective Design to Improve the Efficiency of DPUs on FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 206-213
Lightweight Mobile Devices Indoor Location Based on Image DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 214-221
Mitigating Cross-Technology Interference in Heterogeneous Wireless Networks based on Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 230-237
Accelerating PageRank in Shared-Memory for Efficient Social Network Graph AnalyticsFull-text access may be available. Sign in or learn about subscription options.pp. 238-247
Joint Service Placement and Computation Offloading in Mobile Edge Computing: An Auction-based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 256-265
Accelerating Deep Learning Tasks with Optimized GPU-assisted Image DecodingFull-text access may be available. Sign in or learn about subscription options.pp. 274-281
Scheduling Rechargeable UAVs for Long Time Barrier CoverageFull-text access may be available. Sign in or learn about subscription options.pp. 282-289
Use of Genetic Programming Operators in Data Replication and Fault ToleranceFull-text access may be available. Sign in or learn about subscription options.pp. 290-299
Multiple Balance Subsets Stacking for Imbalanced Healthcare DatasetsFull-text access may be available. Sign in or learn about subscription options.pp. 300-307
Securing App Behaviors in Smart Home: A Human-App Interaction PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 308-315
Task Offloading in Trusted Execution Environment empowered Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 316-323
Gecko: Guaranteeing Latency SLO on a Multi-Tenant Distributed Storage SystemFull-text access may be available. Sign in or learn about subscription options.pp. 324-333
A Learning-based Dynamic Load Balancing Approach for Microservice Systems in Multi-cloud EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 334-341
Enhancing Availability for the MEC Service: CVaR-based Computation OffloadingFull-text access may be available. Sign in or learn about subscription options.pp. 342-347
Intermediate Value Size Aware Coded MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 348-355
A Customized Reinforcement Learning based Binary Offloading in Edge CloudFull-text access may be available. Sign in or learn about subscription options.pp. 356-362
Optimal Use Of The TCP/IP Stack in User-space Storage Applications with ADQ feature in NICFull-text access may be available. Sign in or learn about subscription options.pp. 363-371
SIC2: Securing Microcontroller Based IoT Devices with Low-cost Crypto CoprocessorsFull-text access may be available. Sign in or learn about subscription options.pp. 372-381
Intelligent Detection Algorithm Against UAVs' GPS Spoofing AttackFull-text access may be available. Sign in or learn about subscription options.pp. 382-389
An Efficient and Scalable Sparse Polynomial Multiplication Accelerator for LAC on FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 390-397
Secure Door on Cloud: A Secure Data Transmission Scheme to Protect Kafka's DataFull-text access may be available. Sign in or learn about subscription options.pp. 406-413
A Solution to Data Accessibility Across Heterogeneous BlockchainsFull-text access may be available. Sign in or learn about subscription options.pp. 414-421
PrivAG: Analyzing Attributed Graph Data with Local Differential PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 422-429
A Deep Learning Framework Supporting Model Ownership Protection and Traitor TracingFull-text access may be available. Sign in or learn about subscription options.pp. 438-446
A social link based private storage cloudFull-text access may be available. Sign in or learn about subscription options.pp. 447-455
Enabling Generic Verifiable Aggregate Query on Blockchain SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 456-465
SrSpark: Skew-resilient Spark based on Adaptive Parallel ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 466-475
Optimizing Multi-way Theta Join for Data Skew in Sub-second Stream ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 476-485
OOOPS: An Innovative Tool for IO Workload Management on SupercomputersFull-text access may be available. Sign in or learn about subscription options.pp. 486-493
URFS: A User-space Raw File System based on NVMe SSDFull-text access may be available. Sign in or learn about subscription options.pp. 494-501
DyRAC: Cost-aware Resource Assignment and Provider Selection for Dynamic Cloud WorkloadsFull-text access may be available. Sign in or learn about subscription options.pp. 502-509
WMAlloc: A Wear-Leveling-Aware Multi-Grained Allocator for Persistent Memory File SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 510-517
Optimizing Complex OpenCL Code for FPGA: A Case Study on Finite Automata TraversalFull-text access may be available. Sign in or learn about subscription options.pp. 518-527
FastCredit: Expediting Credit-based Proactive Transports in DatacentersFull-text access may be available. Sign in or learn about subscription options.pp. 528-535
Proactive Failure Recovery for Stateful NFVFull-text access may be available. Sign in or learn about subscription options.pp. 536-543
TEEp: Supporting Secure Parallel Processing in ARM TrustZoneFull-text access may be available. Sign in or learn about subscription options.pp. 544-553
Compressive Sensing based Predictive Online Scheduling with Task Colocation in Cloud Data CenterFull-text access may be available. Sign in or learn about subscription options.pp. 554-562
Non-Technical Losses Detection in Smart Grids: An Ensemble Data-Driven ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 563-568
Virtual Machine Consolidation for NUMA Systems: A Hybrid Heuristic Grey Wolf ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 569-576
A Novel Classification Model to Predict Batch Job Failures in Co-located CloudFull-text access may be available. Sign in or learn about subscription options.pp. 577-584
Robust Federated Learning Approach for Travel Mode Identification from Non-IID GPS TrajectoriesFull-text access may be available. Sign in or learn about subscription options.pp. 585-592
Deep Spatio-Temporal Attention Model for Grain Storage Temperature ForecastingFull-text access may be available. Sign in or learn about subscription options.pp. 593-600
Proactive Content Caching for Internet-of-Vehicles based on Peer-to-Peer Federated LearningFull-text access may be available. Sign in or learn about subscription options.pp. 601-608
ABC: An Auction-Based Blockchain Consensus-Incentive MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 609-616
A Trustworthy Blockchain-based Decentralised Resource Management System in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 617-624
DCVP: Distributed Collaborative Video Stream Processing in Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 625-632
Efficient Post-quantum Identity-based Encryption with Equality TestFull-text access may be available. Sign in or learn about subscription options.pp. 633-640
How Fast Can We Insert? An Empirical Performance Evaluation of Apache KafkaFull-text access may be available. Sign in or learn about subscription options.pp. 641-648
MPI Parallelization of NEUROiD Models Using Docker SwarmFull-text access may be available. Sign in or learn about subscription options.pp. 655-660
S-GAT: Accelerating Graph Attention Networks Inference on FPGA Platform with Shift OperationFull-text access may be available. Sign in or learn about subscription options.pp. 661-666
Dynamic-Static-based Spatiotemporal Multi-Graph Neural Networks for Passenger Flow PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 673-678
Incentive-driven Data Offloading and Caching Replacement Scheme in Opportunistic Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 679-684
Adaptive DNN Partition in Edge Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 685-690
Efficient Edge Service Migration in Mobile Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 691-696
A protocol-independent container network observability analysis system based on eBPFFull-text access may be available. Sign in or learn about subscription options.pp. 697-702
Performance Guaranteed Single Link Failure Recovery in SDN Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 703-708
A Personal Distributed Real-time Collaborative SystemFull-text access may be available. Sign in or learn about subscription options.pp. 709-715
Cooperative Resource Sharing Strategy With eMBB Cellular and C-V2X SlicesFull-text access may be available. Sign in or learn about subscription options.pp. 716-721
CP-BZD Repair Codes Design for Distributed Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 722-727
Showing 100 out of 102