A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | zp | |||||||||||||||||||||||||
2 | Last update (IEEE CPS DataCom/SC2): 2019.10.23 PM 6:54 (GMT+8) | |||||||||||||||||||||||||
3 | Conference | Paper Title | Registration | Camera Ready Paper | ||||||||||||||||||||||
4 | SC2 (LNCS) | uNVMe-TCP: A user space approach to optimizing NVMe over Fabrics TCP transport | √ | √ | SC2 1 | |||||||||||||||||||||
5 | SC2 (LNCS) | ExpanAI: A Smart End-to-End Platform for the development of AI applications | √ | √ | Poster II | |||||||||||||||||||||
6 | SC2 (LNCS) | An Ethereum-based Data Synchronization Platform for Distributed Networks | √ | √ | SC2 II | |||||||||||||||||||||
7 | SC2 (LNCS) | Distributed Logging Service with Distributed Hash Table for Cloud | missing | √ | SC2 II | |||||||||||||||||||||
8 | SC2 (LNCS) | FLEDGE: Kubernetes Compatible Container Orchestration on Low-resource Edge Devices | √ | √ | SC2 II | |||||||||||||||||||||
9 | SC2 (LNCS) | Accelerated Promethee Algorithm based on Dimensionality Reduction | √ | √ | SC2 II | |||||||||||||||||||||
10 | SC2 (LNCS) | Implementing a Business/Technology Architecture Alignment-Oriented Process Applied to the Social-Sanitary Sector | √ | √ | SC2 III | old title: Business/Technological Management Through an Enterprise Architecture Alignment-Oriented Method | ||||||||||||||||||||
11 | SC2 (LNCS) | A Lightweight Time Series Main-memory Database for IoT Real-time Services | √ | √ | SC2 III | |||||||||||||||||||||
12 | SC2 (LNCS) | A review on blockchain-based systems and applications | √ | √ | SC2 III | |||||||||||||||||||||
13 | SC2 (LNCS) | Tuning Runtimes in Open Source FaaS | √ | √ | SC2 III | |||||||||||||||||||||
14 | SC2 (LNCS) | Achieving Dynamic Resource Allocation in the Hadoop Cloud System | √ | √ | SC2 IV | |||||||||||||||||||||
15 | SC2 (LNCS) | qCUDA-ARM: Virtualization for Embedded GPU Architectures | √ | √ | SC2 I | |||||||||||||||||||||
16 | SC2 (LNCS) | A Workflow Interoperability Approach Based on Blockchain | √ | √ | SC2 IV | |||||||||||||||||||||
17 | SC2 (LNCS) | Air Pollution Forecasting Using LSTM-Multivariate Regression Model | √ | √ | SC2 IV | |||||||||||||||||||||
18 | SC2 (LNCS) | Human-centered design tools for smart toys | √ | √ | SC2 IV | |||||||||||||||||||||
19 | SC2 (LNCS) | Smoke and Stress Tests for Travel Service Applications via LoadRunner | √ | √ | Poster II | |||||||||||||||||||||
20 | SC2 (LNCS) | Privacy-Preserving Content-Based Publish/Subscribe Service Based on Order Preserving Encryption | √ | √ | Poster II | |||||||||||||||||||||
21 | SC2 (LNCS) | Improve the House Price Prediction Accuracy with a Stacked Generalization Ensemble Model | √ | √ | Poster II | |||||||||||||||||||||
22 | SC2 (IEEE) | Dysphasia’s Voice Extraction and Period Selection in Deep Learning Framework | √ | √ | Poster II | |||||||||||||||||||||
23 | SC2 (IEEE) | Serverless Skeletons for Elastic Parallel Processing | √ | √ | SC2 V | |||||||||||||||||||||
24 | SC2 (IEEE) | A Realtime Crypto Computing and Block-Dependability | √ | √ | SC2 V | |||||||||||||||||||||
25 | SC2 (IEEE) | Architecture to Speed up Redundant Data Processing in a MapReduce Cloud | √ | √ | SC2 V | |||||||||||||||||||||
26 | SC2 (IEEE) | Rethinking Software Defined Cloud Storage for Disaggregation | √ | √ | SC2 I | |||||||||||||||||||||
27 | SC2 (IEEE) | Offloading Optimization with Delay Distribution in the 3-tier Federated Cloud, Edge, and Fog Systems | √ | √ | SC2 V | |||||||||||||||||||||
28 | SC2 (IEEE) | A SaaS-Native Wildcard Searchable Encryption Scheme for Protecting Privacy in Cloud Services | √ | √ | SC2 I | |||||||||||||||||||||
29 | SC2 (IEEE) | AI Model Repository for dynamic model selection on edge devices | √ | √ | Poster II | |||||||||||||||||||||
30 | SC2 (IEEE) | Enumerating-Based Apriori Algorithms for Mining Frequent Patterns on MapReduce | √ | √ | Poster II | |||||||||||||||||||||
31 | SC2 (IEEE) | Overall mortality risk identification in breast cancer registry database | √ | √ | Poster II | |||||||||||||||||||||
32 | SC2 (IEEE) | Representing cloud security and privacy policies and detecting potential problems | √ | √ | SC2 IV | |||||||||||||||||||||
33 | ||||||||||||||||||||||||||
34 | IOV(LNCS) | A novel protocol for Information Dissemination in Vehicular Networks | √ | √ | IOV 2 | |||||||||||||||||||||
35 | IOV(LNCS) | Uplink Access Control in Narrowband IoT | √ | √ | IOV 1 | |||||||||||||||||||||
36 | IOV(LNCS) | Dynamic Path Planning Method Based on Cluster Queuing Communication in VANET | √ | √ | IOV 2 | |||||||||||||||||||||
37 | IOV(LNCS) | Performance Evaluation of Citywide Intersections Traffic Control Algorithm inVANETs-Based | √ | √ | IOV 2 | |||||||||||||||||||||
38 | IOV(LNCS) | Task Planning with Manual Intervention using Improved JSHOP2 Planner | √ | √ | IOV 2 | |||||||||||||||||||||
39 | IOV(LNCS) | Multi-task Planning with the Consideration of Task Priority | √ | √ | IOV 3 | |||||||||||||||||||||
40 | IOV(LNCS) | From AI to CI: A Definition of Cooperative Intelligence in Autonomous Driving | √ | √ | IOV 3 | |||||||||||||||||||||
41 | IOV(LNCS) | Utilizing Connectivity Maps to Accelerate V2I Communication in Cellular Network Dead Spots | √ | √ | IOV 1 | |||||||||||||||||||||
42 | IOV(LNCS) | Learning Route Planning from Experienced Drivers Using Generalized Value Iteration Network | √ | √ | IOV 3 | |||||||||||||||||||||
43 | IOV(LNCS) | Development of Low-Cost Sensors based Multi-sensors Integration Positioning Algorithm for Land Vehicle Tracking and Monitoring Device | √ | √ | IOV 1 | |||||||||||||||||||||
44 | IOV(LNCS) | Multi-class Vehicle Detection using Multi-scale Hard Negative Mining | √ | √ | IOV 1 | |||||||||||||||||||||
45 | IOV(LNCS) | Edge Service Migration for Vehicular Networks Based on Multi-Agent Deep Reinforcement Learning | √ | √ | Poster II | |||||||||||||||||||||
46 | IOV(LNCS) | Predicting Steering for Autonomous Vehicles Based on Crowd Sensing and Deep Learning | √ | √ | IOV 3 | |||||||||||||||||||||
47 | IOV(LNCS) | A Road Traffic Guidance Service Based on Deep Reinforcement Learning | √ | √ | Poster II | |||||||||||||||||||||
48 | ||||||||||||||||||||||||||
49 | DataCom (IEEE) | SSN:A Spatial Semantic Network for High-accuracy, Stable and Generalized Intent Detection | √ | √ | DataCom I | |||||||||||||||||||||
50 | DataCom (IEEE) | Mid-Tier Models for Big Data | √ | √ | Poster I | |||||||||||||||||||||
51 | DataCom (IEEE) | Blockchain Synchronisation Performance Enhancement Using Forwarder Assignment in an Overlay Network | √ | √ | DataCom 3 | |||||||||||||||||||||
52 | DataCom (IEEE) | Leveraging Reinforcement Learning to Allocate Bandwidth in the Agent-based Resource Management System | √ | √ | DataCom 3 | |||||||||||||||||||||
53 | DataCom (IEEE) | Data Analysis of Portfolio Optimization using Artificial Neural Network in China's Stock Market | √ | √ | Datacom II | |||||||||||||||||||||
54 | DataCom (IEEE) | Forecasting Daily Accommodation Occupancy for Supply Preparation by a Sharing Economy Platform | √ | √ | DataCom 6 / Poster I | |||||||||||||||||||||
55 | DataCom (IEEE) | SCNNSC: Spelling Check based Neural Network for Sentiment Classification | √ | √ | Datacom II | |||||||||||||||||||||
56 | DataCom (IEEE) | Computational modelling of speech data integration to assess interactions in B2B sales calls | √ | √ | DataCom 6 | |||||||||||||||||||||
57 | DataCom (IEEE) | Data-Pattern Driven Cache-Collision Timing Attacks Against AES-GCM | √ | √ | DataCom 3 | |||||||||||||||||||||
58 | DataCom (IEEE) | Improve User-Experience of E-Commerce Website by Graph Analysis with Deep Learning | √ | √ | Poster I | |||||||||||||||||||||
59 | DataCom (IEEE) | A Data-Driven Approach to Monitoring Colocation Data Centers | √ | √ | Poster I | |||||||||||||||||||||
60 | DataCom (IEEE) | Using Inaccurate Job Prediction for Detecting Machine Failures in Parallel Computing Cluster | √ | √ | DataCom 3 | |||||||||||||||||||||
61 | DataCom (IEEE) | A Data Mining Approach to Surveying Literature on Behavioral Big Data in Operations Management Academic Research | √ | √ | DataCom 5 | |||||||||||||||||||||
62 | DataCom (IEEE) | TF-RNN: A Method of Rumor Detection on Social Media | √ | √ | Datacom II | |||||||||||||||||||||
63 | DataCom (IEEE) | Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss | √ | √ | DataCom I | |||||||||||||||||||||
64 | DataCom (IEEE) | Motion Capture System Towards Big Data Collection of Craftsmanship | √ | √ | DataCom I | |||||||||||||||||||||
65 | DataCom (IEEE) | Combining Multiple Ranking Systems on the Generalized Permutation Rank Space | √ | √ | DataCom 5 | |||||||||||||||||||||
66 | DataCom (IEEE) | Predicting Performance of Social Media Postings using Data Mining Methods | √ | √ | Datacom II | |||||||||||||||||||||
67 | DataCom (IEEE) | Robust Classification of Step Data of Exercise | √ | √ | DataCom 4 | |||||||||||||||||||||
68 | DataCom (IEEE) | Where are the optimization potential of machine learning kernels? | √ | √ | DataCom 5 | |||||||||||||||||||||
69 | DataCom (IEEE) | Dangerous Goods Detection System of X-ray Images Based on Mask R-CNN | √ | √ | DataCom 4 | |||||||||||||||||||||
70 | DataCom (IEEE) | A Data-Driven Knowledge-Enriched Framework for Dialogue Modeling | √ | √ | DataCom I | |||||||||||||||||||||
71 | DataCom (IEEE) | Distributed-Memory Vertex-Centric Network Embedding for Large-Scale Graphs | √ | √ | DataCom 5 | |||||||||||||||||||||
72 | DataCom (IEEE) | Recommendation System for Online Programming Judge Platforms | √ | √ | DataCom 6 | |||||||||||||||||||||
73 | DataCom (IEEE) | Face Swapping Neural Networks Based on Improved Autoencoders | √ | √ | DataCom 4 | |||||||||||||||||||||
74 | DataCom (IEEE) | An Empirical Study on Abnormal Trajectory Detection | √ | √ | Poster I | |||||||||||||||||||||
75 | DataCom (IEEE) | Fuzzy–based approach for identifying epistasis in large-scale data | √ | √ | DataCom 6 | |||||||||||||||||||||
76 | DataCom (IEEE) | Forecasting hotel accommodation demand: the study in Kaohsiung | √ | √ | Poster I | |||||||||||||||||||||
77 | DataCom (IEEE) | Coronary heart diseases prediction based on cardiology clinical features | √ | √ | Poster I | |||||||||||||||||||||
78 | DataCom (IEEE) | Tiered Financial Fraud Detection Utilizing Precision Stratified Random Forest Assembly | √ | √ | Poster I | |||||||||||||||||||||
79 | DataCom (IEEE) | An Analysis of the Number of Passengers Collected with A Practical Management Support System for Regional Public Transportation Service | √ | √ | Poster I | |||||||||||||||||||||
80 | DataCom (IEEE) | Demo: Stream Processing of Software-Defined Video Analytics on a Smart Campus | √ | √ | Poster I | |||||||||||||||||||||
81 | DataCom (IEEE) | Transparent Big Data Infrastructural Services for Semiconductor Wafer Fabrication Foundries | √ | √ | Poster I | |||||||||||||||||||||
82 | DataCom (IEEE) | Interpretable Distance Metric Learning for Handwritten Chinese Character Recognition | √ | √ | DataCom 4 | |||||||||||||||||||||
83 | ||||||||||||||||||||||||||
84 | DataCom-KDBD (IEEE) | Instantaneous Availability Model for Systems Considering Multi-factor Logistic Delay | √ | √ | KDBD I | |||||||||||||||||||||
85 | DataCom-KDBD (IEEE) | An optimization for spare parts transportation route based on real-time monitoring | √ | √ | KDBD I | |||||||||||||||||||||
86 | DataCom-KDBD (IEEE) | Multiple Kernel K-means Clustering : A Self-weighted Learning Approach | √ | √ | KDBD I | |||||||||||||||||||||
87 | DataCom-KDBD (IEEE) | Bilinear CNN for Low-shot Footprint Classification | √ | √ | KDBD I | |||||||||||||||||||||
88 | DataCom-KDBD (IEEE) | Abnormal Detection of Gas Turbine Engine Based on Time-Frequency Feature Analysis | √ | √ | KDBD II | |||||||||||||||||||||
89 | DataCom-KDBD (IEEE) | Analysis and Design of Network Public Opinion Early Warning System for Emergencies | √ | √ | KDBD II | |||||||||||||||||||||
90 | DataCom-KDBD (IEEE) | Source Apportionment of Heavy Metals in Soils Based on Hierarchical Clustering | √ | √ | KDBD II | |||||||||||||||||||||
91 | DataCom-KDBD (IEEE) | Correlated and Uncorrelated Feature Co-Learning with Dual Graph Regularization for Multi-View Data Clustering | √ | √ | KDBD II | |||||||||||||||||||||
92 | ||||||||||||||||||||||||||
93 | SOCA(IEEE) | Making Sense of a Service-Oriented Architecture (SOA) Governance Framework in Digital Ecosystem Utilizing a Sociotechnical Approach | √ | √ | SOCA 2 | |||||||||||||||||||||
94 | SOCA(IEEE) | Implementation of a Personal Authentication System T-TIME | √ | √ | SOCA 3 | |||||||||||||||||||||
95 | SOCA(IEEE) | Software Architecture Design of Cloud Platforms in Automotive Domain: An Online Survey | √ | √ | SOCA 7 | |||||||||||||||||||||
96 | SOCA(IEEE) | Evaluation of Autoscaling Metrics for (stateful) IoT Gateways | √ | √ | SOCA 1 | |||||||||||||||||||||
97 | SOCA(IEEE) | Concept and Implementation of an Adaptive Decentralized Control System for Human-Technology Interaction | √ | √ | SOCA 5 | |||||||||||||||||||||
98 | SOCA(IEEE) | Sitting Posture Prediction and Correction System using Arduino-Based Chair and Deep Learning Model | √ | √ | SOCA 4 | |||||||||||||||||||||
99 | SOCA(IEEE) | Step-by-Step Guidelines for Making Smart Contract Smarter | √ | √ | SOCA 1 | |||||||||||||||||||||
100 | SOCA(IEEE) | Serving Machine Learning Workloads in Resource Constrained Environments - a Serverless Deployment Example | √ | √ | SOCA 3 |