Default Cover Image

2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)

Nov. 6 2020 to Nov. 8 2020

Austin, TX, USA

ISBN: 978-1-7281-9829-3

Table of Contents

Hieff: Enabling Efficient VNF Clusters by Coordinating VNF Scaling and Flow SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
LIDAUS: Localization of IoT Device via Anchor UAV SLAMFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Website Recommendation with Side Information Aided Variational AutoencoderFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
FluxInfer: Automatic Diagnosis of Performance Anomaly for Online Database SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Privacy Preserving Inference with Convolutional Neural Network EnsembleFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
On Machine Learning-based Stage-aware Performance Prediction of Spark ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Adaptive Video Streaming via Deep Reinforcement Learning from User Trajectory PreferencesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
A Dynamic Task Assignment Framework based on Prediction and Adaptive BatchingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Network Resource Scheduling For Cloud/Edge Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Efficient arithmetic expression optimization with weighted adjoint matrixFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
REPROOF: Quantifying the Jam Resistance of REBUFFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Open Framework of Gateway Monitoring System for Internet of Things in Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
SEC: Secure, Efficient, and Compatible Source Address Validation with Packet TagsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
BonnMotion 4 – Taking Mobility Generation to the Next LevelFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Modeling Energy Consumption of Virtual Machines in DVFS-Enabled Cloud Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Lifecycle Management Protocols for Batteryless, Intermittent Sensor NodesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Authentication Based on BlockchainFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Deploying Network Key-Value SSDs to Disaggregate Resources in Big Data Processing FrameworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Efficient Architecture Paradigm for Deep Learning Inference as a ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Paradox of AlphaZero: Strategic vs. Optimal PlaysFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
What You See Is Not What You Get: Towards Deception-Based Data Moving Target DefenseFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
P4SFC: Service Function Chain Offloading with Programmable SwitchesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Performance and Consistency Analysis for Distributed Deep Learning ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Budgeted Persuasion on User Opinions via Varying SusceptibilityFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
UAV Swarm Communication Aware Formation Control via Deep Q NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Distributed Scheduling Algorithm for Optimizing Age of Information in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Software Define Radio in Realizing the Intruding UAS Group Behavior PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Supporting Efficient Dynamic Update in Public Integrity Verification of Cloud DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Secure Decentralized Application Development of Blockchain-based GamesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
The Practical Application of IoT for Large-scale Instruments and Equipment Sharing Management PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Edge Computing Based Privacy-Preserving Data Aggregation Scheme in Smart GridFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Improved Window Segmentation for Deep Learning Based Inertial OdometryFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Spatio-Temporal Data Mining for Aviation Delay PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Experiments with Non-Cooperative Space DTN RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Discussion on Application of the Internet of Things in Modern Agricultural Experimental BaseFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A sensor attack detection method based on fusion interval and historical measurement in CPSFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A Unite and Conquer Based Ensemble learning Method for User Behavior ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Automatic Recognition of Identification Schemes for IoT Identifiers via Sequence-to-Sequence ModelFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Deep Learning for IoTFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
A Connection-Free Reliable Transport ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Policy Units and Categories: Networking Models for Simplifying Security Policy ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
NRV: Leveraging Secure Multi-Party Computation for Lightweight BGP Security EnhancementFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Research on Security Estimation and Control of Cyber-Physical SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Socially-Aware D2D Pair Strategy: A Stable Matching ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
FProbe: Detecting Stealthy DGA-based Botnets by Group Activities AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
AdaEmb-Encoder: Adaptive Embedding Spatial Encoder-Based Deduplication for Backing Up Classifier Training DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Design Alternatives for Performance Monitoring Counter based Malware DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Showing 58 out of 58