Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICPADS
ICPADS 2020
Generate Citations
2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)
Dec. 2 2020 to Dec. 4 2020
Hong Kong
ISBN: 978-1-7281-9074-7
Table of Contents
[Title page]
Freely available from IEEE.
pp. 1-1
2020 IEEE 26th International Conference on Parallel and Distributed Systems
Freely available from IEEE.
pp. 1-1
Copyright
Freely available from IEEE.
pp. 1-1
Table of Contents
Freely available from IEEE.
pp. v-xvii
Message from the General Chair
Freely available from IEEE.
pp. xviii-xviii
Message from the Program Chair
Freely available from IEEE.
pp. xix-xx
Organizing Committee
Freely available from IEEE.
pp. xxi-xxi
Program Committee
Freely available from IEEE.
pp. xxii-xxvi
Steering Committee
Freely available from IEEE.
pp. xxvii-xxvii
Reviewers
Freely available from IEEE.
pp. xxviii-xxxi
LTG-LSM: The Optimal Structure in LSM-tree Combined with Reading Hotness
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
JiaPing Yu
,
HuaHui Chen
,
JiangBo Qian
,
YiHong Dong
Improved MapReduce Load Balancing through Distribution-Dependent Hash Function Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-18
by
Zafar Ahmad
,
Sharmila Duppala
,
Rezaul Chowdhury
,
Steven Skiena
Efficient Sparse-Dense Matrix-Matrix Multiplication on GPUs Using the Customized Sparse Storage Format
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-26
by
Shaohuai Shi
,
Qiang Wang
,
Xiaowen Chu
Joint Service Placement and Request Scheduling for Multi-SP Mobile Edge Computing Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-34
by
Zhengwei Lei
,
Hongli Xu
,
Liusheng Huang
,
Zeyu Meng
A similarity clustering-based deduplication strategy in cloud storage systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-43
by
Saiqin Long
,
Zhetao Li
,
Zihao Liu
,
Qingyong Deng
,
Sangyoon Oh
,
Nobuyoshi Komuro
A Fair Task Assignment Strategy for Minimizing Cost in Mobile Crowdsensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-53
by
Yujun Liu
,
Yongjian Yang
,
En Wang
,
Wenbin Liu
,
Dongming Luan
,
Xiaoying Sun
,
Jie Wu
Communication-Aware Load Balancing of the LU Factorization over Heterogeneous Clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-63
by
Lucas Leandro Nesi
,
Lucas Mello Schnorr
,
Arnaud Legrand
An Efficient Work-Stealing Scheduler for Task Dependency Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-71
by
Chun-Xun Lin
,
Tsung-Wei Huang
,
Martin D. F. Wong
LBNN: Perceiving the State Changes of a Core Telecommunications Network via Linear Bayesian Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-80
by
Yanying Lin
,
Kejiang Ye
,
Ming Chen
,
Naitian Deng
,
Tailin Wu
,
Cheng-Zhong Xu
A Method to Detecting Artifact Anomalies in A Microservice Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-88
by
Faisal Fahmi
,
Pei-Shu Huang
,
Feng-Jian Wang
Contention resolution on a restrained channel
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-98
by
Elijah Hradovich
,
Marek Klonowski
,
Dariusz. R. Kowalski
Real-Time Scheduling and Analysis of OpenMP Programs with Spin Locks
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-108
by
He Du
,
Xu Jiang
,
Tao Yang
,
Mingsong Lv
,
Wang Yi
Predicting Performance Degradation on Adaptive Cache Replacement Policy
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-116
by
Yi Zhang
,
Ran Cui
,
Mingsong Lv
,
Chuanwen Li
,
Qingxu Deng
Making Inconsistent Components More Efficient For Hybrid B
+
Trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-123
by
Xiongxiong She
,
Chengliang Wang
,
Fenghua Tu
XOR-Net: An Efficient Computation Pipeline for Binary Neural Network Inference on Edge Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-131
by
Shien Zhu
,
Luan H. K. Duong
,
Weichen Liu
Load Balance Awared Data Sharing Systems In Heterogeneous Edge Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-139
by
Sheng Chen
,
Zheng Chen
,
Siyuan Gu
,
Baochao Chen
,
Junjie Xie
,
Deke Guo
Themis: Malicious Wear Detection and Defense for Persistent Memory File Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-147
by
Wenbin Wang
,
Chaoshu Yang
,
Runyu Zhang
,
Shun Nie
,
Xianzhang Chen
,
Duo Liu
Incentive Mechanism Design for Federated Learning: A Two-stage Stackelberg Game Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-155
by
Guiliang Xiao
,
Mingjun Xiao
,
Guoju Gao
,
Sheng Zhang
,
Hui Zhao
,
Xiang Zou
Time Efficient Federated Learning with Semi-asynchronous Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-163
by
Jiangshan Hao
,
Yanchao Zhao
,
Jiale Zhang
Multi-agent Fault-tolerant Reinforcement Learning with Noisy Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-171
by
Canhui Luo
,
Xuan Liu
,
Xinning Chen
,
Juan Luo
Decentralized Exploration of a Structured Environment Based on Multi-agent Deep Reinforcement Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-179
by
Dingjie He
,
Dawei Feng
,
Hongda Jia
,
Hui Liu
D2D-Enabled Reliable Data Collection for Mobile Crowd Sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-187
by
Pengfei Wang
,
Zhen Yu
,
Chi Lin
,
Leyou Yang
,
Yaqing Hou
,
Qiang Zhang
Improving the Applicability of Visual Peer-to-Peer Navigation with Crowdsourcing
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-195
by
Erqun Dong
,
Jianzhe Liang
,
Zeyu Wang
,
Jingao Xu
,
Longfei Shangguan
,
Qiang Ma
,
Zheng Yang
Massively Parallel Causal Inference of Whole Brain Dynamics at Single Neuron Resolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-205
by
Wassapon Watanakeesuntorn
,
Keichi Takahashi
,
Kohei Ichikawa
,
Joseph Park
,
George Sugihara
,
Ryousei Takano
,
Jason Haga
,
Gerald M. Pao
An Effective Design to Improve the Efficiency of DPUs on FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-213
by
Yutian Lei
,
Qingyong Deng
,
Saiqin Long
,
Shaohui Liu
,
Sangyoon Oh
Lightweight Mobile Devices Indoor Location Based on Image Database
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-221
by
Ran Gao
,
Yanchao Zhao
,
Maoxing Tang
A Dynamic Escape Route Planning Method for Indoor Multi-floor Buildings Based on Real-time Fire Situation Awareness
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-229
by
Chun Wang
,
Juan Luo
,
CuiJun Zhang
,
Xuan Liu
Mitigating Cross-Technology Interference in Heterogeneous Wireless Networks based on Deep Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-237
by
Weidong Zheng
,
Junmei Yao
,
Kaishun Wu
Accelerating PageRank in Shared-Memory for Efficient Social Network Graph Analytics
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-247
by
Baofu Huang
,
Zhidan Liu
,
Kaishun Wu
Using Configuration Semantic Features and Machine Learning Algorithms to Predict Build Result in Cloud-Based Container Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-255
by
Yiwen Wu
,
Yang Zhang
,
Junsheng Chang
,
Bo Ding
,
Tao Wang
,
Huaimin Wang
Joint Service Placement and Computation Offloading in Mobile Edge Computing: An Auction-based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-265
by
Lei Zhang
,
Zhihao Qu
,
Baoliu Ye
,
Bin Tang
Multi-user Edge-assisted Video Analytics Task Offloading Game based on Deep Reinforcement Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 266-273
by
Yu Chen
,
Sheng Zhang
,
Mingjun Xiao
,
Zhuzhong Qian
,
Jie Wu
,
Sanglu Lu
Accelerating Deep Learning Tasks with Optimized GPU-assisted Image Decoding
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-281
by
Lipeng Wang
,
Qiong Luo
,
Shengen Yan
Scheduling Rechargeable UAVs for Long Time Barrier Coverage
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-289
by
Zhouqing Han
,
Xiaojun Zhu
,
Lijie Xu
Use of Genetic Programming Operators in Data Replication and Fault Tolerance
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-299
by
Syed Mohtashim Abbas Bokhari
,
Oliver Theel
Multiple Balance Subsets Stacking for Imbalanced Healthcare Datasets
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-307
by
Yachao Shao
,
Tao Zhao
,
Xiaoning Wang
,
Xiaofeng Zou
,
Xiaoming Fu
Securing App Behaviors in Smart Home: A Human-App Interaction Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-315
by
Jinlei Li
,
Yan Meng
,
Lu Zhou
,
Haojin Zhu
Task Offloading in Trusted Execution Environment empowered Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-323
by
Yuepeng Li
,
Deze Zeng
,
Lin Gu
,
Andong Zhu
,
Quan Chen
Gecko: Guaranteeing Latency SLO on a Multi-Tenant Distributed Storage System
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-333
by
Zhenyu Leng
,
Dejun Jiang
,
Liuying Ma
,
Jin Xiong
A Learning-based Dynamic Load Balancing Approach for Microservice Systems in Multi-cloud Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-341
by
Jieqi Cui
,
Pengfei Chen
,
Guangba Yu
Enhancing Availability for the MEC Service: CVaR-based Computation Offloading
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-347
by
Shengli Pan
,
Zhiyong Zhang
,
Tao Xue
,
Guangmin Hu
Intermediate Value Size Aware Coded MapReduce
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-355
by
Yamei Dong
,
Bin Tang
,
Baoliu Ye
,
Zhihao Qu
,
Sanglu Lu
A Customized Reinforcement Learning based Binary Offloading in Edge Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-362
by
Yuepeng Li
,
Lvhao Chen
,
Deze Zeng
,
Lin Gu
Optimal Use Of The TCP/IP Stack in User-space Storage Applications with ADQ feature in NIC
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-371
by
Ziye Yang
,
Ben Walker
,
James R Harris
,
Yadong Li
,
Gang Cao
SIC
2
: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-381
by
Bryan Pearson
,
Cliff Zou
,
Yue Zhang
,
Zhen Ling
,
Xinwen Fu
Intelligent Detection Algorithm Against UAVs' GPS Spoofing Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-389
by
Shenqing Wang
,
Jiang Wang
,
Chunhua Su
,
Xinshu Ma
An Efficient and Scalable Sparse Polynomial Multiplication Accelerator for LAC on FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-397
by
Jipeng Zhang
,
Zhe Liu
,
Hao Yang
,
Junhao Huang
,
Weibin Wu
Secure and Verifiable Data Access Control Scheme With Policy Update and Computation Outsourcing for Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 398-405
by
Yue Guan
,
Songtao Guo
,
Pan Li
,
Yuanyuan Yang
Secure Door on Cloud: A Secure Data Transmission Scheme to Protect Kafka's Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-413
by
Hanyi Zhang
,
Liming Fang
,
Keyu Jiang
,
Weiting Zhang
,
Minghui Li
,
Lu Zhou
A Solution to Data Accessibility Across Heterogeneous Blockchains
Full-text access may be available. Sign in or learn about subscription options.
pp. 414-421
by
Zhihui Wu
,
Yang Xiao
,
Enyuan Zhou
,
Qingqi Pei
,
Quan Wang
PrivAG: Analyzing Attributed Graph Data with Local Differential Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 422-429
by
Zichun Liu
,
Liusheng Huang
,
Hongli Xu
,
Wei Yang
,
Shaowei Wang
Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-437
by
Yunzhe Tian
,
Yingdi Wang
,
Endong Tong
,
Wenjia Niu
,
Liang Chang
,
Qi Alfred Chen
,
Gang Li
,
Jiqiang Liu
A Deep Learning Framework Supporting Model Ownership Protection and Traitor Tracing
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-446
by
Guowen Xu
,
Hongwei Li
,
Yuan Zhang
,
Xiaodong Lin
,
Robert H. Deng
,
Xuemin Shen
A social link based private storage cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-455
by
Michalis Konstantopoulos
,
Nikos Chondros
,
Mema Roussopoulos
Enabling Generic Verifiable Aggregate Query on Blockchain Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-465
by
Yanchao Zhu
,
Zhao Zhang
,
Cheqing Jin
,
Aoying Zhou
SrSpark: Skew-resilient Spark based on Adaptive Parallel Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 466-475
by
Yijie Shen
,
Jin Xiong
,
Dejun Jiang
Optimizing Multi-way Theta Join for Data Skew in Sub-second Stream Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 476-485
by
Xiaopeng Fan
,
Xinchun Liu
,
Yang Wang
,
Youjun Wang
,
Jing Li
OOOPS: An Innovative Tool for IO Workload Management on Supercomputers
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-493
by
Lei Huang
,
Si Liu
URFS: A User-space Raw File System based on NVMe SSD
Full-text access may be available. Sign in or learn about subscription options.
pp. 494-501
by
Yaofeng Tu
,
Yinjun Han
,
Zhenghua Chen
,
Zhengguang Chen
,
Bing Chen
DyRAC: Cost-aware Resource Assignment and Provider Selection for Dynamic Cloud Workloads
Full-text access may be available. Sign in or learn about subscription options.
pp. 502-509
by
Yannis Sfakianakis
,
Manolis Marazakis
,
Angelos Bilas
WMAlloc: A Wear-Leveling-Aware Multi-Grained Allocator for Persistent Memory File Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 510-517
by
Shun Nie
,
Chaoshu Yang
,
Runyu Zhang
,
Wenbin Wang
,
Duo Liu
,
Xianzhang Chen
Optimizing Complex OpenCL Code for FPGA: A Case Study on Finite Automata Traversal
Full-text access may be available. Sign in or learn about subscription options.
pp. 518-527
by
Marziyeh Nourian
,
Mostafa Eghbali Zarch
,
Michela Becchi
FastCredit: Expediting Credit-based Proactive Transports in Datacenters
Full-text access may be available. Sign in or learn about subscription options.
pp. 528-535
by
Dezun Dong
,
Shan Huang
,
Zejia Zhou
,
Wenxiang Yang
,
Hanyi Shi
Proactive Failure Recovery for Stateful NFV
Full-text access may be available. Sign in or learn about subscription options.
pp. 536-543
by
Zhenyi Huang
,
Huawei Huang
TEEp: Supporting Secure Parallel Processing in ARM TrustZone
Full-text access may be available. Sign in or learn about subscription options.
pp. 544-553
by
Zinan Li
,
Wenhao Li
,
Yubin Xia
,
Binyu Zang
Compressive Sensing based Predictive Online Scheduling with Task Colocation in Cloud Data Center
Full-text access may be available. Sign in or learn about subscription options.
pp. 554-562
by
Yunhin Chan
,
Ke Luo
,
Xu Chen
Non-Technical Losses Detection in Smart Grids: An Ensemble Data-Driven Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 563-568
by
Yufeng Xing
,
Lei Guo
,
Zongchao Xie
,
Lei Cui
,
Longxiang Gao
,
Shui Yu
Virtual Machine Consolidation for NUMA Systems: A Hybrid Heuristic Grey Wolf Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 569-576
by
Kangli Hu
,
Weiwei Lin
,
Tiansheng Huang
,
Keqin Li
,
Like Ma
A Novel Classification Model to Predict Batch Job Failures in Co-located Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 577-584
by
Yurui Li
,
Weiwei Lin
,
Keqin Li
,
James Z. Wang
,
Fagui Liu
,
Jie Liu
Robust Federated Learning Approach for Travel Mode Identification from Non-IID GPS Trajectories
Full-text access may be available. Sign in or learn about subscription options.
pp. 585-592
by
Yuanshao Zhu
,
Shuyu Zhang
,
Yi Liu
,
Dusit Niyato
,
James J.Q. Yu
Deep Spatio-Temporal Attention Model for Grain Storage Temperature Forecasting
Full-text access may be available. Sign in or learn about subscription options.
pp. 593-600
by
Shanshan Duan
,
Weidong Yang
,
Xuyu Wang
,
Shiwen Mao
,
Yuan Zhang
Proactive Content Caching for Internet-of-Vehicles based on Peer-to-Peer Federated Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 601-608
by
Zhengxin Yu
,
Jia Hu
,
Geyong Min
,
Han Xu
,
Jed Mills
ABC: An Auction-Based Blockchain Consensus-Incentive Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 609-616
by
Zhengpeng Ai
,
Yuan Liu
,
Xingwei Wang
A Trustworthy Blockchain-based Decentralised Resource Management System in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 617-624
by
Zhiming Zhao
,
Chunming Rong
,
Martin Gilje Jaatun
DCVP: Distributed Collaborative Video Stream Processing in Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 625-632
by
Shijing Yuan
,
Jie Li
,
Chentao Wu
,
Yusheng Ji
,
Yongbing Zhang
Efficient Post-quantum Identity-based Encryption with Equality Test
Full-text access may be available. Sign in or learn about subscription options.
pp. 633-640
by
Willy Susilo
,
Dung Hoang Duong
,
Huy Quoc Le
How Fast Can We Insert? An Empirical Performance Evaluation of Apache Kafka
Full-text access may be available. Sign in or learn about subscription options.
pp. 641-648
by
Guenter Hesse
,
Christoph Matthies
,
Matthias Uflacker
Graph-based Approaches for the Interval Scheduling Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 649-654
by
Panagiotis Oikonomou
,
Nikos Tziritas
,
Georgios Theodoropoulos
,
Maria Koziri
,
Thanasis Loukopoulos
,
Samee U. Khan
MPI Parallelization of NEUROiD Models Using Docker Swarm
Full-text access may be available. Sign in or learn about subscription options.
pp. 655-660
by
Raghu Sesha Iyengar
,
Mohan Raghavan
S-GAT: Accelerating Graph Attention Networks Inference on FPGA Platform with Shift Operation
Full-text access may be available. Sign in or learn about subscription options.
pp. 661-666
by
Weian Yan
,
Weiqin Tong
,
Xiaoli Zhi
Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System
Full-text access may be available. Sign in or learn about subscription options.
pp. 667-672
by
Xiaojin Wang
,
Yingxiao Xiang
,
Wenjia Niu
,
Endong Tong
,
Jiqiang Liu
Dynamic-Static-based Spatiotemporal Multi-Graph Neural Networks for Passenger Flow Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 673-678
by
Jingyan Ma
,
Jingjing Gu
,
Qiang Zhou
,
Qiuhong Wang
,
Ming Sun
Incentive-driven Data Offloading and Caching Replacement Scheme in Opportunistic Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 679-684
by
Tong Wu
,
Xuxun Liu
,
Deze Zeng
,
Huan Zhou
,
Shouzhi Xu
Adaptive DNN Partition in Edge Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 685-690
by
Weiwei Miao
,
Zeng Zeng
,
Lei Wei
,
Shihao Li
,
Chengling Jiang
,
Zhen Zhang
Efficient Edge Service Migration in Mobile Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 691-696
by
Zeng Zeng
,
Shihao Li
,
Weiwei Miao
,
Lei Wei
,
Chengling Jiang
,
Chuanjun Wang
,
Mingxuan Zhang
A protocol-independent container network observability analysis system based on eBPF
Full-text access may be available. Sign in or learn about subscription options.
pp. 697-702
by
Chang Liu
,
Zhengong Cai
,
Bingshen Wang
,
Zhimin Tang
,
Jiaxu Liu
Performance Guaranteed Single Link Failure Recovery in SDN Overlay Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 703-708
by
Lilei Zheng
,
Hongli Xu
,
Suo Chen
,
Liusheng Huang
A Personal Distributed Real-time Collaborative System
Full-text access may be available. Sign in or learn about subscription options.
pp. 709-715
by
Michalis Konstantopoulos
,
Nikos Chondros
,
Mema Roussopoulos
Cooperative Resource Sharing Strategy With eMBB Cellular and C-V2X Slices
Full-text access may be available. Sign in or learn about subscription options.
pp. 716-721
by
Yan Liang
,
Xin Chen
,
Shuang Chen
,
Ying Chen
CP-BZD Repair Codes Design for Distributed Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 722-727
by
Shuangshuang Lu
,
Chanting Zhang
,
Mingjun Dai
Showing 100 out of 102
Load More
Load All