Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IPCCC
IPCCC 2020
Generate Citations
2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)
Nov. 6 2020 to Nov. 8 2020
Austin, TX, USA
ISBN: 978-1-7281-9829-3
Table of Contents
Hieff: Enabling Efficient VNF Clusters by Coordinating VNF Scaling and Flow Scheduling
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zenan Wang
,
Jiao Zhang
,
Haoran Wei
,
Tao Huang
LIDAUS: Localization of IoT Device via Anchor UAV SLAM
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Yue Sun
,
Deqiang Xu
,
Zhuoming Huang
,
Honggang Zhang
,
Xiaohui Liang
Website Recommendation with Side Information Aided Variational Autoencoder
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Pinhao Wang
,
Wenzhong Li
,
Zepeng Yu
,
Baoguo Lu
,
Sanglu Lu
FluxInfer: Automatic Diagnosis of Performance Anomaly for Online Database System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ping Liu
,
Shenglin Zhang
,
Yongqian Sun
,
Yuan Meng
,
Jiahai Yang
,
Dan Pei
Privacy Preserving Inference with Convolutional Neural Network Ensemble
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Alexander Xiong
,
Michael Nguyen
,
Andrew So
,
Tingting Chen
Evaluation of the interest of an extra-slot for a grouped polling-selecting method
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Guéréguin Der Sylvestre SIDIBE
,
Raphaël BIDAUD
,
Marie-Françoise SERVAJEAN
,
Nadir HAKEM
,
Michel MISSON
A Multimodal Feature Fusion-Based Method for Individual Depression Detection on Sina Weibo
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yiding Wang
,
Zhenyi Wang
,
Chenghao Li
,
Yilin Zhang
,
Haizhou Wang
On Machine Learning-based Stage-aware Performance Prediction of Spark Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Guangjun Ye
,
Wuji Liu
,
Chase Q. Wu
,
Wei Shen
,
Xukang Lyu
Adaptive Video Streaming via Deep Reinforcement Learning from User Trajectory Preferences
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Qingyu Xiao
,
Jin Ye
,
Chengjie Pang
,
Liangdi Ma
,
Wengchao Jiang
Interrupting Real-Time IoT Tasks: How Bad Can It Be to Connect Your Critical Embedded System to the Internet?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ilja Behnke
,
Lukas Pirl
,
Lauritz Thamsen
,
Robert Danicki
,
Andreas Polze
,
Odej Kao
SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Ziyang Wang
,
Fangyu Zheng
,
Jingqiang Lin
,
Guang Fan
,
Jiankuo Dong
A Dynamic Task Assignment Framework based on Prediction and Adaptive Batching
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Lijun Sun
,
Xiaojie Yu
,
Shicong Chen
,
Yang Yan
Network Resource Scheduling For Cloud/Edge Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Yuhan Zhao
,
Wei Zhang
,
Meihong Yang
,
Huiling Shi
Efficient arithmetic expression optimization with weighted adjoint matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xiahua Liu
,
Chun Yang
,
Zixin Guan
REPROOF: Quantifying the Jam Resistance of REBUF
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Joshua Groen
,
Peter Howell
,
Michael Collins
Open Framework of Gateway Monitoring System for Internet of Things in Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ke Han
,
Youyan Duan
,
Rui Jin
,
Zhicheng Ma
,
Hui Rong
,
Xiaobo Cai
SEC: Secure, Efficient, and Compatible Source Address Validation with Packet Tags
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xinyu Yang
,
Jiahao Cao
,
Mingwei Xu
BonnMotion 4 – Taking Mobility Generation to the Next Level
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Alexander Bothe
,
Nils Aschenbruck
Modeling Energy Consumption of Virtual Machines in DVFS-Enabled Cloud Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jianzhou Mao
,
Tathagata Bhattacharya
,
Xiaopu Peng
,
Ting Cao
,
Xiao Qin
Lifecycle Management Protocols for Batteryless, Intermittent Sensor Nodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mathew L. Wymore
,
Vishal Deep
,
Vishak Narayanan
,
Henry Duwe
,
Daji Qiao
Authentication Based on Blockchain
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Norah Alilwit
Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Lixin Wang
,
Jianhua Yang
,
Mary Mccormick
,
Peng-Jun Wan
,
Xiaohua Xu
Deploying Network Key-Value SSDs to Disaggregate Resources in Big Data Processing Frameworks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mahsa Bayati
,
Harsh Roogi
,
Ron Lee
,
Ningfang Mi
Efficient Architecture Paradigm for Deep Learning Inference as a Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jin Yu
,
Xiaopeng Ke
,
Fengyuan Xu
,
Hao Huang
Paradox of AlphaZero: Strategic vs. Optimal Plays
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Ze-Li Dou
,
Liran Ma
,
Khiem Nguyen
,
Kien X. Nguyen
Research on Power Quality Data Placement Strategy Based on Improved Particle Swarm Optimization Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Chengdong Wang
,
Jun Fang
,
Zhuofeng Zhao
,
Bo Zhao
A Modular and Distributed Setup for Power and Performance Analysis of Multi-Processor System-on-Chip at Electronic System Level
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Muhammad Mudussir Ayub
,
Franz Kreupl
What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yaqin Zhang
,
Duohe Ma
,
Xiaoyan Sun
,
Kai Chen
,
Feng Liu
P4SFC: Service Function Chain Offloading with Programmable Switches
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Junte Ma
,
Sihao Xie
,
Jin Zhao
Performance and Consistency Analysis for Distributed Deep Learning Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Danlin Jia
,
Manoj Pravakar Saha
,
Janki Bhimani
,
Ningfang Mi
Budgeted Persuasion on User Opinions via Varying Susceptibility
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Wenyi Tang
,
Xinrui Xu
,
Guangchun Luo
,
Zaobo He
,
Kaiming Zhan
UAV Swarm Communication Aware Formation Control via Deep Q Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Chengtao Xu
,
Kai Zhang
,
Houbing Song
Distributed Scheduling Algorithm for Optimizing Age of Information in Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Dongxiao Yu
,
Xinpeng Duan
,
Feng Li
,
Yi Liang
,
Huan Yang
,
Jiguo Yu
Software Define Radio in Realizing the Intruding UAS Group Behavior Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Joshua Eason
,
Chengtao Xu
,
Houbing Song
When is Enough Enough? "Just Enough" Decision Making with Recurrent Neural Networks for Radio Frequency Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Megan Moore
,
William H. Clark
,
R. Michael Buehrer
,
William C. Headley
Supporting Efficient Dynamic Update in Public Integrity Verification of Cloud Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Jiawei Wan
,
Shijie Jia
,
Limin Liu
,
Yang Zhang
Secure Decentralized Application Development of Blockchain-based Games
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Natalia Trojanowska
,
Michal Kedziora
,
Moataz Hanif
,
Houbing Song
The Practical Application of IoT for Large-scale Instruments and Equipment Sharing Management Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Guangjun Shi
,
Liang Liu
,
Fu Chen
Research of Knowledge Graph Technology and its Applications in Agricultural Information Consultation Field
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Fan zhang
,
Jizhou Wu
,
Yingli Nie
,
Lihua Jiang
,
Ailian Zhou
,
Nengfu Xie
Edge Computing Based Privacy-Preserving Data Aggregation Scheme in Smart Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yuhao Kang
,
Songtao Guo
,
Pan Li
,
Yuanyuan Yang
Improved Window Segmentation for Deep Learning Based Inertial Odometry
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Siyu Chen
,
Yu Zhu
,
Xiaoguang Niu
,
Zhiyong Hu
Spatio-Temporal Data Mining for Aviation Delay Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Kai Zhang
,
Yushan Jiang
,
Dahai Liu
,
Houbing Song
Experiments with Non-Cooperative Space DTN Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ricardo Lent
Discussion on Application of the Internet of Things in Modern Agricultural Experimental Base
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Lihua Jiang
,
Jiawei Yan
,
Nengfu Xie
A sensor attack detection method based on fusion interval and historical measurement in CPS
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Xiaobo Cai
,
Ke Han
,
Yan Li
,
Xuefei Li
,
Jiajin Zhang
,
Yue Zhang
A Unite and Conquer Based Ensemble learning Method for User Behavior Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Abdoulaye Diop
,
Nahid Emad
,
Thierry Winter
Automatic Recognition of Identification Schemes for IoT Identifiers via Sequence-to-Sequence Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xiaotao Li
,
Shujuan You
,
Wai Chen
Deep Learning for IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Tao Lin
A Connection-Free Reliable Transport Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
J. J. Garcia-Luna-Aceves
,
Abdulazaz Ali Albalawi
FPGA Implementation of a Pseudo-Random Signal Generator for RF Hardware Test and Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Randeep S. Baweja
,
Devin Ridge
,
Harpreet S. Dhillon
,
William C. Headley
Policy Units and Categories: Networking Models for Simplifying Security Policy Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Madeline Van Ness
,
Xin Sun
NRV: Leveraging Secure Multi-Party Computation for Lightweight BGP Security Enhancement
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Guoqiang Zhang
,
Mingwei Xu
,
Jiang Li
Research on Security Estimation and Control of Cyber-Physical System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Xiaobo Cai
,
Ke Han
,
Yan Li
,
Huihui Wang
,
Jiajin Zhang
,
Yue Zhang
An Encrypted Traffic Classification Method Combining Graph Convolutional Network and Autoencoder
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Boyu Sun
,
Wenyuan Yang
,
Mengqi Yan
,
Dehao Wu
,
Yuesheng Zhu
,
Zhiqiang Bai
Socially-Aware D2D Pair Strategy: A Stable Matching Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Xian Zhou
,
Daru Pan
,
Hui Song
,
Xu Huang
FProbe: Detecting Stealthy DGA-based Botnets by Group Activities Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jiawei Sun
,
Yuan Zhou
,
Shupeng Wang
,
Lei Zhang
,
Junjiao Liu
,
Junleng Hou
,
Zhicheng Liu
AdaEmb-Encoder: Adaptive Embedding Spatial Encoder-Based Deduplication for Backing Up Classifier Training Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yaobin Qin
,
David J. Lilja
Design Alternatives for Performance Monitoring Counter based Malware Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Jordan Pattee
,
Byeong Kil Lee
Showing 58 out of 58