


default search action
41st IPCCC 2022: Austin, TX, USA
- IEEE International Performance, Computing, and Communications Conference, IPCCC 2022, Austin, TX, USA, November 11-13, 2022. IEEE 2022, ISBN 978-1-6654-8018-5

- Tyler Holmes, Charlie McLarty, Yong Shi, Patrick Bobbie, Kun Suo:

Energy Efficiency on Edge Computing: Challenges and Vision. 1-6 - Kun Suo, Tu N. Nguyen, Yong Shi, Jing Selena He, Chih-Cheng Hung:

Keep Clear of the Edges : An Empirical Study of Artificial Intelligence Workload Performance and Resource Footprint on Edge Devices. 7-16 - Pawissakan Chirupphapa, Md Delwar Hossain

, Hiroshi Esaki, Hideya Ochiai:
Unsupervised Anomaly Detection in RS-485 Traffic using Autoencoders with Unobtrusive Measurement. 17-23 - Kefeng Wu, Chunlei Xu, Mingming Zhang, Xiongfeng Hu, Yibo Jin, Zhuzhong Qian:

RCM: Residue-aware Consolidation for Heterogeneous MLaaS Cluster. 24-31 - Yahan Hu, Kewei Lv, Jie Ma, Bin Qi:

Privacy-Preserving Closest Point Determination Based on Ciphertext Comparison. 32-40 - Justus Renkhoff

, Wenkai Tan, Alvaro Velasquez, William Yichen Wang, Yongxin Liu, Jian Wang, Shuteng Niu, Lejla Begic Fazlic
, Guido Dartmann
, Houbing Song
:
Exploring Adversarial Attacks on Neural Networks: An Explainable Approach. 41-42 - Shulin Sun, Lijun Sun, Xinran Ma, Zhenzhen Pan, Hongxin Jin:

A Trusted Distributed Crowdsourcing Framework Based on User Preferences. 43-48 - Ming Xu, Baoming Zhang, Meng Cao, Hualei Yu, Chongjun Wang:

LSEGNN: Encode Local Topology Structure in Graph Neural Networks. 49-56 - Wenxuan Yu

, Minghui Xu, Dongxiao Yu, Xiuzhen Cheng, Qin Hu, Zehui Xiong
:
zk-PCN: A Privacy-Preserving Payment Channel Network Using zk-SNARKs. 57-64 - Zenan Sun, Jingyi Su, Donghyun Jeon, Alvaro Velasquez, Houbing Song

, Shuteng Niu:
Reinforced Contrastive Graph Neural Networks (RCGNN) for Anomaly Detection. 65-72 - Shuaicong Yu, Changqing An

, Tao Yu, Ziyi Zhao, Tianshu Li, Jilong Wang:
Phishing Detection Based on Multi-Feature Neural Network. 73-79 - Shuaili Liu, Licheng Zhang, Peifa Sun

, Yingshuo Bao, Lizhi Peng:
Video traffic identification with a distribution distance-based feature selection. 80-86 - Yuxi Sun, Wang Yang, Lihuan Hui:

Eliminating Communication Bottlenecks in Consensus Protocols using NDN. 87-93 - Jacob Cleveland, Robert Short, Alan Hylton:

Tropical Geometric Route Decision-Making in Simulated Lunar Gateway Communications. 94-100 - Sabur Baidya

, Sumit K. Das, Mohammad Helal Uddin
, Chase Kosek, Chris Summers:
Digital Twin in Safety-Critical Robotics Applications: Opportunities and Challenges. 101-107 - Xiaofeng He, Yuchao Zhang, Xiaotian Wang:

A Scalable Nested Blockchain Framework with Dynamic Node Selection Approach for IoT. 108-113 - Yuxin Chen, Dongyang Wang, Gang Lu, Junhong Ye, Feng Jin, Zhiqiang He, Bei Hua:

DTS: A Dual Transport Switching Scheme for RDMA-based Applications. 114-119 - Chen Chen, Yingwen Chen, Zhaoyun Chen

, Jianchen Han, Guangtao Xue:
PickyMan: A Preemptive Scheduler for Deep Learning Jobs on GPU Clusters. 120-129 - A. B. M. Mohaimenur Rahman

, Pu Wang
, Weichao Wang, Yu Wang:
PaWLA: PPG-based Weight Lifting Assessment. 130-137 - Vishal Deep, Mathew L. Wymore, Daji Qiao, Henry Duwe:

Toward a Shared Sense of Time for a Network of Batteryless, Intermittently-powered Nodes. 138-146 - Qing Cao, Weisheng Si

:
PECS: A Pareto-efficient and Envy-free Cloud Resource Scheduler. 147-152 - Qing Cao, Haoran Niu

:
Higher-order Markov Graph based Bug Detection in Cloud-based Deployments. 153-160 - Chen Lou, Yu-e Sun, He Huang, Yang Du, Shigang Chen, Guoju Gao, Hongli Xu:

An Efficient Adaptive Denoising Sketch for Per-flow Traffic Measurement. 161-168 - Yongxin Chen, Yongjun Wang, Lumming Yang, Yuchuan Luo, Mantun Chen:

TForm-RF: An Efficient Data Augmentation for Website Fingerprinting Attack. 169-178 - Qiaojie Lu, Nan Wang, Kun Li:

MFIP: Multi-Factor Interlinked Point-of-Interest Recommendation in Location-Based Social Network. 179-184 - Ashkan Gholamhosseinian

, Jochen Seitz:
Empirical Estimation of ETSI ITS-G5 Performance Over an IPv6-based Platform. 185-193 - Xuewei Ma, Wenyuan Yang, Yuesheng Zhu, Zhiqiang Bai:

A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing. 194-201 - Junhua Wong, Qingxue Zhang:

Deep Convolutional Autoencoder for Energy-efficient Smart Health Wearables In the Era of Big Data. 202-206 - Kushan Sudheera Kalupahana Liyanage, Zixu Tian

, Dinil Mon Divakaran, Mun Choon Chan, Mohan Gurusamy:
APEX: Characterizing Attack Behaviors from Network Anomalies. 207-216 - Betis Baheri

, Jacob Tronge, Bo Fang, Ang Li, Vipin Chaudhary, Qiang Guan:
MARS: Malleable Actor-Critic Reinforcement Learning Scheduler. 217-226 - Liqing Shan, Ming Chen, Fenghui Zhang, Yuntao Hu, Aici Wei:

A Novel Approach to Energy Efficiency Optimization in NOMA-Aided V2X Networks. 227-232 - Lizong Zhang, Yutao Jiang, Bei Hui, Zhe Liu, Guisong Liu:

An Enhanced Representation Method for Pedestrian Trajectory Prediction based on Adaptive GCN. 233-239 - Yaliang Shi, Xiwen Huang, Qihang Jiang, Qiuling Yang:

A Multi-Controllers Architecture for Software-Defined Underwater Acoustic Sensor Networks. 240-245 - Xingong Guo, Longlong Zhu, Dong Zhang, Chunming Wu:

Libra: A Stateful Layer-4 Load Balancer with Fair Load Distribution. 246-253 - Hao Xu, Long Peng, Xiaodong Liu, Menglin Zhang, Jun Ma, Jie Yu, Zibo Yi:

KylinTune: DQN-based Energy-efficient Model for Browser in Mobile Devices. 254-262 - Xueqing Wang, Liang Wang, Zhiwen Yu, Zichuan Xu, Yao Zhang, Weibo Chu:

Pricing in the Open Market of Crowdsourced Video Edge Caching: A Newcomer Perspective. 263-268 - Jonathan Bader, Fabian Lehmann

, Alexander Groth, Lauritz Thamsen, Dominik Scheinert, Jonathan Will, Ulf Leser, Odej Kao:
Reshi: Recommending Resources for Scientific Workflow Tasks on Heterogeneous Infrastructures. 269-274 - Yuxin Yuan, Xiao Shi, Zhengyu Lei, Xiaohong Wang, Xiaofang Zhao:

SMPI: Scalable Serverless MPI Computing. 275-282 - Wenrui Mu, Ying Mao, Long Cheng, Qingle Wang, Weiwen Jiang, Pin-Yu Chen:

Iterative Qubits Management for Quantum Index Searching in a Hybrid System. 283-289 - Yicheng Zeng, Jiaqian Peng, Zhihui Zhao, Zhanwei Song, Hongsong Zhu, Limin Sun:

SIFOL: Solving Implicit Flows in Loops for Concolic Execution. 290-297 - Peng Zhou, Zhenyu Wang, Wen Xia, Haotong Zhang:

UltraCDC:A Fast and Stable Content-Defined Chunking Algorithm for Deduplication-based Backup Storage Systems. 298-304 - Jiayao Wang, Ziling Wei, Baosheng Wang, Jincheng Zhong, Shuhui Chen:

FATSS: Filter-Assisted Tuple Space Search for Packet Classification. 305-312 - Jianpo Li

, Kun Liu, Jun Wang:
Data Query Routing Algorithm with Cluster Bridge for Wireless Sensor Network. 313-318 - Hao Zhang, Yuandong Min, Sanya Liu, Hang Tong, Yaopeng Li:

MODLSTM: A Method to Recognize DoS Attacks on Modbus/TCP. 319-324 - Mingxi Liu, Yongcheng Liu, Zhifei Ma, Zachary Porter, Jae Chung, Saahil Claypool, Feng Li, Jacob Tutlis, Mark Claypool:

The Effects of a Performance Enhancing Proxy on TCP Congestion Control over a Satellite Network. 325-331 - Shafayat Mowla Anik, Byeong Kil Lee:

Trace Characterization based Cache Replacement Policy. 332-337 - Amani Benamor, Oussama Habachi

, Inès Kammoun, Jean-Pierre Cances:
NOMA-based Power Control for Machine-Type Communications: A Mean Field Game Approach. 338-343 - Derun Zou, Xusheng Liu, Lintan Sun, Jian-Hui Duan, Ruichen Li, Yeting Xu, Wenzhong Li, Sanglu Lu:

FedMC: Federated Reinforcement Learning on the Edge with Meta-Critic Networks. 344-351 - Qinyu Xia, Shi Dong, Tao Peng:

An Abnormal Traffic Detection Method for IoT Devices Based on Federated Learning and Depthwise Separable Convolutional Neural Networks. 352-359 - Ismail Ataie, Tania Taami, Sadoon Azizi, Md Mainuddin

, Daniel Schwartz:
D2FO: Distributed Dynamic Offloading Mechanism for Time-Sensitive Tasks in Fog-Cloud IoT-based Systems. 360-366 - Hadi Sahin, Kemal Akkaya, Sukumar Ganapati

:
Optimal Incentive Mechanisms for Fair and Equitable Rewards in PoS Blockchains. 367-373 - Baisong Li, Wenlong Tian, Ruixuan Li, Weijun Xiao, Zhongming Fu, Xuming Ye

, Renjiao Duan, Yusheng Li, Zhiyong Xu:
Cross-domain Resemblance Detection based on Meta-learning for Cloud Storage. 374-379 - Xiaohui Wei, Xiukun Wei, Xingwang Wang, Yundi Wang, Yan Niu:

HRCache: Edge-End Collaboration for Mobile Deep Vision Based on H.264 and Approximated Reuse. 380-388 - Xijia Lu

, Xingwei Wang, Jie Jia, Xue Wang, Min Huang:
Max-Min Fairness based Scheduling Optimization Mechanism on Switches. 389-396 - Ripon Patgiri

, Malaya Dutta Borah:
HEX-BLOOM: An Efficient Method for Authenticity and Integrity Verification in Privacy-preserving Computing. 397-403 - Xiaoqing Sun, Jiahai Yang:

HetGLM: Lateral Movement Detection by Discovering Anomalous Links with Heterogeneous Graph Neural Network. 404-411 - Jui Mhatre, Ahyoung Lee:

Dynamic Reinforcement Learning based Scheduling for Energy-Efficient Edge-Enabled LoRaWAN. 412-413 - Yuqi Fu, Naseem Machlovi, Ying Mao, Jiayin Wang, Long Cheng, Qingzhi Liu

:
Performance Evaluation of Resource Management Schemes for Cloud Native Platforms with Computing Containers. 414-415 - Shuhan Chen, Congqi Shen, Chunming Wu, Yi Shen:

DeepThrottle: Deep Reinforcement Learning for Router Throttling to Defend Against DDoS Attack in SDN. 416-417 - Amin Sarihi, Michael A. Schoenfelder, Abdel-Hameed A. Badawy:

Performance Evaluation of an Out-of-Order RISC-V CPU: A SPEC INT 2017 Study. 418-419

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














