Abstract is missing.
- Reinforced Keyphrase Generation with BERT-based Sentence ScorerRui Liu, Zheng Lin 0001, Peng Fu 0008, Weiping Wang 0005. 1-8 [doi]
- SOG-Based Multi-Core LTL Model CheckingChiheb Ameur Abid, Kaïs Klai, Jaime Arias, Hiba Ouni. 9-17 [doi]
- A Task Execution Framework Based on Aging Indicator and SARIMIMinghao Tang, Peng Zhang, Haoqi Sun, Lei Zhang. 18-25 [doi]
- Framework-Agnostic Optimization of Repeated Skewed Joins at Massive ScaleAndrea Nardelli, Vladimir Viassow, Amir H. Payberah. 26-33 [doi]
- Parallel Computing and Optimization of Lattice Boltzmann Method Based on SW26010 ProcessorXiaoxiao Zhang, Liangjun Wang, XueSen Chu, Hu Ding, Wu Zhang. 34-40 [doi]
- A tile assembly model to calculate point-multiplication on conic curves over finite field GF(2n)Yongnan Li. 41-48 [doi]
- Evaluating DAG Scheduling Algorithms for Maximum ParallelismWei Zheng, Zhaobin Chen, Rizos Sakellariou, Lu Tang, Jinjun Chen. 49-56 [doi]
- Discrete Sine and Cosine Transform and Helmholtz Equation Solver on GPUMingming Ren, Yuyang Gao, Gang Wang, Xiaoguang Liu 0001. 57-66 [doi]
- CuCodeML: GPU-Accelerated CodeML for the Branch-Site Model in PhylogeneticsMingming Ren, Xiaomin Huang, Zhuofeng Wu 0002, Rebecca J. Stones, Xiaoguang Liu 0001, Gang Wang 0001. 67-75 [doi]
- Ptlbmalloc2: Reducing TLB Shootdowns with High Memory EfficiencyStijn Schildermans, Kris Aerts, Jianchen Shan, Xiaoning Ding. 76-83 [doi]
- Dependent and Heterogeneous Process Migration Based on CheckpointsNa Yang, Xia Wang, Yun Wang, Qi Zhai. 84-92 [doi]
- A Unified Page Walk Buffer and Page Walk CacheDunbo Zhang, Chaoyang Jia, Qiong Wang, Li Shen 0007. 93-101 [doi]
- Live Container Migration via Pre-restore and Random Access MemoryZhixing Yu, Kejing He, Chao Chen, Jian Wang. 102-109 [doi]
- A Fast Robustness Quantification Method for Evaluating Typical Deep Learning Models by Generally Image ProcessingHaocong Li, Yunjia Cheng, Wei Ren, Tianqing Zhu. 110-117 [doi]
- DLFusion: An Auto-Tuning Compiler for Layer Fusion on Deep Neural Network AcceleratorZihan Liu, Jingwen Leng, Quan Chen, Chao Li, Wenli Zheng, Li Li 0012, Minyi Guo. 118-127 [doi]
- Parallel Variational Autoencoders for Multiple Responses GenerationMiaojin Li, Peng Fu 0008, Zheng Lin 0001, Weiping Wang 0005. 128-136 [doi]
- Characterizing the I/O Pipeline in the Deployment of CNNs on Commercial AcceleratorsJiansong Li, Zihan Jiang, Fangxin Liu, Xiao Dong, Guangli Li, Xueying Wang, Wei Cao, Lei Liu, Yanzhi Wang, Tao Li, Xiaobing Feng 0002. 137-144 [doi]
- DCDFNE: build dataset to evaluate binary codes diffing tools and train deep learning modelsKe Zhan, Zhonghua Lu, Bingchang Liu. 145-152 [doi]
- APENAS: An Asynchronous Parallel Evolution Based Multi-objective Neural Architecture SearchMengtao Hu, Li Liu, Wei Wang, Yao Liu. 153-159 [doi]
- FPGA Implementation of MobileNetV2 CNN Model Using Semi-Streaming Architecture for Low Power Inference ApplicationsNazariy K. Shaydyuk, Eugene B. John. 160-167 [doi]
- Caching Resource Allocation and Mobility Aware in Information-Centric Networking with Mobile Edge ComputingDaud Khan, Haopeng Chen, Najamul Din. 168-174 [doi]
- Towards 6G Joint HAPS-MEC-Cloud 3C Resource Allocation for Delay-Aware Computation OffloadingYang Yang, Xiaolin Chang, Ziye Jia, Zhu Han, Zhen Han. 175-182 [doi]
- PCRec: A Private Coding Computation Scheme Based on Edge Computing for Recommendation SystemMengjia Zhai, Fei Gu, Jin Wang 0009, Lingzhi Li, Kejie Lu, Jianping Wang 0001. 183-191 [doi]
- MCSEC: Secure Coded Matrix Multiplication Scheme for Edge Computing with Minimum Communication CostTingting Dong, Jin Wang, Fei Gu, Jingya Zhou, Kejie Lu, Jianping Wang. 192-199 [doi]
- A Deep Reinforcement Learning based Mobile Device Task Offloading Algorithm in MECYang Li, Bing Shi. 200-207 [doi]
- SDWCM: A Software-Defined Wi-Fi Architecture For Collaborative ManagementMeimei Zhang, Yingying Xie, Xiang Chen, Bo Bai 0001, Gong Zhang, Kai Lei. 208-217 [doi]
- Cost-Efficient Request Dispatching in Geo-distributed Cloud Gaming InfrastructureYusen Li, Jinping Wu, Bingzheng Ma, Gang Wang, Xiaoguang Liu. 218-227 [doi]
- A New Paradigm of Cloud BrokerageSreekrishnan Venkateswaran, Santonu Sarkar. 228-235 [doi]
- Comat: An Effective Composite Matching Framework for Content-based Pub/Sub SystemsTianchen Ding, Shiyou Qian, Weidong Zhu, Jian Cao 0001, Guangtao Xue, Yanmin Zhu, Wenjuan Li 0002. 236-243 [doi]
- Demystifying the Largest Live Game Streaming Platform via Black-Box MeasurementXu Zhang, Kai Yang, Rongqi Zhang, Qilin Fan, Hong Tang, Zhan Ma. 244-250 [doi]
- Secure Spatio-textual Skyline Queries on Cloud PlatformYiping Teng, Dan Liu, Xiaoting Liu, Weiyu Zhao, Haigang Liu, Chunlong Fan. 251-259 [doi]
- Scaleplus: Towards Fast Scaling of Distributed Streaming DataflowsZan Zong, Lijie Wen, Xiao Liu, Li Lin 0011, Chen Qian, Leilei Lin. 260-268 [doi]
- TSSN: A Trusted Shared Storage Network Based on Blockchain and Bilateral MatchingShuokang Huang, Maoyu Du, Wei Li, Kai Lei. 269-276 [doi]
- Blockchain-based Access Control Mechanism of Federated Data Sharing SystemYan Ding, Liaoliao Feng, Ying Qin, Chenlin Huang, Pan Dong, Long Gao, Yusong Tan. 277-284 [doi]
- Multi-layer Access Control Mechanism based on Blockchain for Mobile Edge ComputingYichen Hou, Wenxin Liu, Hui Lin, Xiaoding Wang. 285-291 [doi]
- A cross-blockchain based distributed crowdsouring system for Internet of ThingsMin Peng, QinYang Miao, Hui Lin 0007, Xiaoding Wang. 292-297 [doi]
- An Systematic Study on Blockchain Transaction Databases Storage and OptimizationJingyu Zhang, Siqi Zhong, Jin Wang, Lei Wang. 298-304 [doi]
- Revisiting the Fairness and Randomness of Delegated Proof of Stake Consensus AlgorithmQi Wang 0014, Ming Xu, Xiangxue Li, Haifeng Qian. 305-312 [doi]
- Privacy Preserving Trajectory Data Publishing with Personalized Differential PrivacyRuxue Wen, Wenqing Cheng, Haojun Huang, Wang Miao, Chen Wang 0011. 313-320 [doi]
- Constructing Optimal Sparse Decision Tree for Analying I-SIG System AttackXiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Qi Alfred Chen, Gang Li, Jiqiang Liu, Long Li. 321-328 [doi]
- Fusion-based Spammer Detection Method by Embedding Review Texts and Weak Social RelationsJie Wen 0007, Jingyuan Hu, Hongbin Shi, Xin Wang, Chunyuan Yuan, Jizhong Han, Tao Guo. 329-336 [doi]
- AVDHRAM: Automated Vulnerability Detection based on Hierarchical Representation and Attention MechanismWenyan An, Liwei Chen, Jinxin Wang, Gewangzi Du, Gang Shi, Dan Meng. 337-344 [doi]
- Secure Deduplication Method Based on AutoencoderHui Qi, Tianwei Lu, Ligang Cong, Xiaoqiang Di. 345-352 [doi]
- Toward Automatic Mobile Application Fingerprint Extraction from Non-encrypted HTTP TrafficYafei Sang, Yan Xu, Yongzheng Zhang 0002, Peng Chang, Shuyuan Zhao, Yijing Wang. 353-362 [doi]
- Atomic Restriction: Hardware Atomization to Defend Against Preemption AttacksYaosong Lu, Weijie Liu 0004, Wenhao Wang 0001. 363-370 [doi]
- Analysis of security methods in Vehicular Ad-Hoc Network against Worm Hole and Gray Hole attacksKrzysztof Stepien, Aneta Poniszewska-Maranda. 371-378 [doi]
- Hardware Implementation of Security Association Lookup Device Based on RAMDongfang Li, Yasha Chen, Shuai Zhang, Wei Shen, Guang Yang. 379-383 [doi]
- Low-rate DoS Attack Detection Based on WPD-EE AlgorithmXiaocai Wang, Qiuwei Yang, Zichao Xie, Zhiqing Zheng, Yudong Yan, Dan Tang. 384-391 [doi]
- ASPGen: an Automatic Security Policy Generating Framework for AppArmorYun Li, Chenlin Huang, Lu Yuan, Yan Ding, Hua Cheng. 392-400 [doi]
- A Simulation-based Study on the Reliability of Data Center UpgradesYichuan Qi, Dan Feng 0001, Binbing Hou, Fang Wang, Jianxi Chen, Yun Liu. 401-408 [doi]
- IntruDTS: Interactive Visual Analysis System for Intrusion Detection in Time SeriesXuefei Tian, Chenlu Li, Aijuan Qian, Xiaoju Dong. 409-416 [doi]
- Improved Human Activity Recognition Model based on Sequence MixupRan Tan, Xuefeng Yan. 417-424 [doi]
- An Ego Network Embedding Model via Neighbors Sampling and Self-attention MechanismZiyu Guo, Shijun Liu, Li Pan, Qiang He. 425-432 [doi]
- User Preference Excitation Network for Sequential RecommendationJiong Wang, Yingshuai Kou, Neng Gao, Chenyang Tu. 433-440 [doi]
- Remote Procedure Call Optimization of Big Data Systems Based on Data AwarenessJin Wang, Yaqiong Yang, Jingyu Zhang, Lei Wang. 441-447 [doi]
- Feature Envy Detection based on Bi-LSTM with Self-Attention MechanismHongze Wang, Jing Liu, Jiexiang Kang, Wei Yin, Haiying Sun, Hui Wang. 448-457 [doi]
- Global Context-aware Representation for Implicit Discourse Relation RecognitionMeilin Zhou, Qi Liang 0002, Peng Zhang, Lu Ma, Dan Luo, Bin Wang. 458-465 [doi]
- Honeyeye: A Network Traffic Collection Framework for Distributed ICS HoneynetsChuan-Sheng, Yu Yao, Dongbiao Li, Hongna An, Wei Yang. 466-473 [doi]
- Multi-Relational Graph Convolutional Networks for Skeleton-Based Action RecognitionFang Liu, Qin Dai, Shengze Wang, Liang Zhao, Xiangbin Shi, Jianzhong Qiao. 474-480 [doi]
- NarGNN: Narrative Graph Neural Networks for New Script Event Prediction ProblemShuang Yang, Fali Wang, Daren Zha, Cong Xue, Zhihao Tang. 481-488 [doi]
- Social Recommendation based on Graph Neural NetworksHongji Sun, Lili Lin, Riqing Chen. 489-496 [doi]
- Effectively Refining Parameters for Unexpected Nodes on Structural Graph ClusteringChuanyu Zong, Chengwei Zhang, Xiufeng Xia, Tao Qiu, Jiaying Wang. 497-504 [doi]
- Effectively Explaining Missing Nodes on Structural Graph ClusteringXiufeng Xia, Jida Min, Chuanyu Zong, Jiajia Li, Xiangyu Liu, Tao Qiu. 505-512 [doi]
- A Span-based Model for Joint Entity and Relation Extraction with Relational GraphsXingang Wang, Dong Wang, Fengpo Ji. 513-520 [doi]
- Answer Graph-based Interactive Attention Network for Question Answering over Knowledge BaseLu Ma, Peng Zhang, Dan Luo, Meilin Zhou, Qi Liang 0002, Bin Wang. 521-528 [doi]
- Effectively Incremental Structural Graph Clustering for Dynamic ParameterChuanyu Zong, Xiufeng Xia, Chao Xian, Anzhen Zhang, Rui Zhu 0003, Jiaying Wang. 529-536 [doi]
- An Improved Sparrow Search AlgorithmWei Song, Song Liu, Xiaochun Wang, Weiguo Wu. 537-543 [doi]
- Highly Efficient and GPU-Friendly Implementation of BFS on Single-node SystemRongyu Dong, Huawei Cao, Xiaochun Ye, Yuan Zhang, Qinfen Hao, Dongrui Fan. 544-553 [doi]
- DE-CO: A Two-Step Spelling Correction Model for Combating Adversarial TyposZhengxiao Liu, Fali Wang, Zheng Lin 0001, Lei Wang, Zhiyi Yin. 554-561 [doi]
- Joint Extraction of Triple Knowledge Based on Relation PriorityChuanzhi Zhuang, Ningyu Zhang, Xiaolong Jin, Zhong Li, Shumin Deng, Huajun Chen. 562-569 [doi]
- A simple function embedding approach for binary similarity detectionWeilong Li, Shuyuan Jin. 570-577 [doi]
- Optimizing 3-D Placement of Multiple UAVs Based on Taguchi's MethodZiwen Ma, Wei Huangfu, Yaxi Liu. 578-585 [doi]
- A recommendation algorithm for sparse data via implicit relationshipMiao Xie, Shijun Liu, Li Pan. 586-592 [doi]
- A Hybrid Recommendation Algorithm with Short-term Preference and Knowledge PreferenceJia-Le Li, Zhi-Juan Du, Jian-Tao Zhou. 593-600 [doi]
- A Web API Recommendation Method with Composition Relationship Based on GCNYangqi Zhang, Haiyang Yang, Li Kuang. 601-608 [doi]
- A UAV Path and Action Planning Algorithm for Indoor Localization Information CollectionZijie Wang, Liang Liu, Jiankang Xu, Li Zeng. 609-616 [doi]
- Efficient Multi-Request Route Planning on Road NetworkJiajia Li, Jiahui Hu, Lei Li, Xing Xiong, Xiufeng Xia. 617-624 [doi]
- An efficient dynamic neural network for predicting time series data streamLiang Chen, Wei Wang, Yun Yang. 625-632 [doi]
- Predicting Residual Stress by Finding Peak Shape Using Artificial Neural NetworksLiu Yang, Junyu Zhang, Tingxuan Chen, Wuji Lei, Xiaolong Liu. 633-640 [doi]
- Task Merging Based on Scenarios of Functionally Unique Resources for Deadline-Constrained Workflow SchedulingPingping Li, Haopeng Chen. 641-648 [doi]
- APCC: Agile and Precise Congestion Control in DatacentersRenjie Zhou, Guoyuan Yuan, Dezun Dong, Shan Huang. 649-656 [doi]
- NVMCache: Wear-Aware Load Balancing NVM-based Caching for Large-Scale Storage SystemsZhenhua Cai, Jiayun Lin, Fang Liu, Zhiguang Chen, Hongtao Li. 657-665 [doi]
- Resource Scheduling Algorithm on Mobile P2P Distribution NetworksDoudou Wang, Xin Hu 0006, Quan Xue, Ze Li, Lexi Xu, Weidong Wang. 666-673 [doi]
- A Novel Influence Maximization-based Dynamic Forwarding Node Selection Scheme in SDVNsLiang Zhao 0004, Tong Zheng, Mingwei Lin, Ammar Hawbani, Jiaxing Shang. 674-682 [doi]
- Performance Modeling of a General GPS Scheduling Under Long Range Dependent TrafficRan Zhang, Lei Liu 0003, Xudong Lu, Zhongmin Yan, Hui Li. 683-689 [doi]
- Game-Based Negotiation between Power Demand and Supply in Green DatacentersMinh-Thuyen Thi, Jean-Marc Pierson, Georges Da Costa. 690-697 [doi]
- Multi-interest Aware Recommendation in CrowdIntell NetworkYixin Zhang, Wei He, LiZhen Cui, Lei Liu, Zhongmin Yan. 698-705 [doi]
- Encrypted Network Traffic Classification: A data driven approachZhongkai Zhang, Lei Liu, Xudong Lu, Zhongmin Yan, Hui Li. 706-712 [doi]
- Task Assignment with Consensus Decision for Spatial CrowdsouringXiaomeng Lian, Wei He, LiZhen Cui, Hui Li, Lei Liu. 713-720 [doi]
- Crowd Intelligence Empowered Video Transmission in Ultra-low-bandwidth Constrained CircumstancesHexiang Qiao, Zheming Yang, Bing Liang, Wen Ji. 721-727 [doi]
- Understanding Crowd Intelligence in Large-scale Systems: A Hierarchical Binary Particle Swarm Optimization ApproachLinqing Zhai, Zheming Yang, Wen Ji. 728-735 [doi]
- Continuous Debugging of MicroservicesHong Zhu 0002, Ian Bayley, Hongbo Wang. 736-745 [doi]
- Cloud - Edge Offloading Model for Vehicular Traffic AnalysisDragi Kimovski, Dijana Capeska Bogatinoska, Narges Mehran, Aleksandar Karadimce, Natasha Paunkoska, Radu Prodan, Ninoslav Marina. 746-753 [doi]
- Blockchain and Homomorphic Encryption For Digital Copyright ProtectionWenyue Sun, Haokun Fang, Shensheng Zheng, Quan Qian. 754-761 [doi]
- Hemp Disease Detection and Classification Using Machine Learning and Deep LearningBipasa Bose, Jyotsna Priya, Sonam Welekar, Zeyu Gao. 762-769 [doi]
- A Neural Attentive Model Using Human Semantic Knowledge for Clickbait DetectionFeng Wei 0002, Uyen Trang Nguyen. 770-776 [doi]
- Automatic Road Detection in Traffic VideosHadi Ghahremannezhad, Hang Shi, Chengjun Liu. 777-784 [doi]
- Energy-aware Multimedia Applications Scheduling on VFI-NoC-MPSoC using as an Edge-device in IoTUmair Ullah Tariq, Haider Ali 0001, John Panneerselvam, James Hardy, Lu Liu 0001. 785-793 [doi]
- Identifying the Right Person in Social Networks with Double Metaphone CodesJoshua D. Hamilton, Carson K. Leung, Sehaj Pal Singh. 794-801 [doi]
- Matching User Accounts across Large-scale Social Networks based on Locality-sensitive HashingYongjun Li, Xiangyu Li, Jiaqi Yang, Congjie Gao. 802-809 [doi]
- An Analysis of Twitter Responses to the 2019 Ridgecrest Earthquake SequenceTao Ruan, Qingkai Kong, Yawen Zhang, Sara K. McBride, Qin Lv. 810-818 [doi]
- Music Social Tags Representation in Dimensional Emotion ModelsNa He, Sam Ferguson. 819-826 [doi]
- Identifying Panic Triggers from Disaster-Related TweetsNasser Assery, Xiaohong Yuan, Xiuli Qu, Sultan Almalki, Kaushik Roy 0003. 827-836 [doi]
- Exploring the Usage of Online Food Delivery Data for Intra-Urban Job and Housing Mobility Detection and CharacterizationYawen Zhang, Seth Spielman, Qi Liu, Si Shen, Jason Shuo Zhang, Qin Lv. 837-844 [doi]
- Practical Strategy of Acquaintance Immunization without Contact TracingZhihao Dong, Yuanzhu Chen, Terrence S. Tricco, Cheng Li 0005, Ting Hu. 845-851 [doi]
- Analyzing Societal Impact of COVID-19: A Study During the Early Days of the PandemicSwaroop Gowdra Shanthakumar, Anand Seetharam, Arti Ramesh. 852-859 [doi]
- Hyper-Casual Endless Game Based Dynamic Difficulty Adjustment System For Players Replay AbilityZichu Yang, Bowen Sun. 860-866 [doi]
- Monitoring the Perception of Covid-19 Vaccine using Topic ModelsSwapna S. Gokhale. 867-874 [doi]
- A Cluster-based Solution to Achieve Fairness in Federated LearningFengpan Zhao, Yan Huang, Akshita Maradapu Vera Venkata Sai, Yubao Wu. 875-882 [doi]
- Low-light Image Enhancement based on Joint Decomposition and Denoising U-Net NetworkJiawei Deng, Guangyao Pang, Li Wan, Zhenming Yu. 883-888 [doi]
- Adherent Nuclei Edge Detection Based on Caps-UnetYuli Chen, Xingwei Li, Huiting Yao, Xue Li, Miao Ma, Zhao Pei, Cheng Lu. 889-894 [doi]
- Displacement detection method of QR code reference object based on computer visionQiuhui Yang, Xiaoyu Ji, Yanyan Liang. 895-900 [doi]
- A Multi-granularity Targeted Covert Collection Scheme for Internet DataYi Meng, Yangyang Li, Yashen Wang, Hao Jin, Chun Wei, Xiaoyan Yin 0001. 901-908 [doi]
- Resource Allocation Optimization with Guaranteed Security Level for Anti-traceable AccessBo Jin, Hao Jin, Yashen Wang, Yangyang Li, Xi Luo, Xiaoqing Gong, Xiaoyan Yin 0001. 909-916 [doi]
- Spatial-Domain Resource Scheduling for Wireless Computing and Energy Provision in Energy Self-Sustainable F-RANJie Hu, Tingyu Shui, Wei Zhang, Fan Wu, Kun Yang. 917-924 [doi]
- Reconfigurable Blockchains for Dynamic Cluster-based ApplicationsKhalil Saadat, Ning Wang, Xinpeng Wei, Bin Da, Rahim Tafazolli. 925-931 [doi]
- An Effective Three-Channel Combination Configuration Method for ZigBee with WiFi Channel InterferenceJianjun Tan, Xianbo Sun, Yong Huang, Jinqiao Yi, Tao Hu, Li Zhu. 932-940 [doi]
- A New Controller Placement Technique using Colored Petri-Nets Modelling for SDNsWael Hosny Fouad Aly. 941-947 [doi]
- Topic Clustering Using Induced Squared Correlation Thresholding with Dimension ReductionAyodeji Ayorinde, John Panneerselvam, Lu Liu 0001, Dejun Miao. 948-957 [doi]
- Temporal Data Analytics on COVID-19 Data with Ubiquitous ComputingYubo Chen 0003, Carson K. Leung, Siyuan Shang, Qi Wen. 958-965 [doi]
- Evaluating Cloud Auto-Scaler Resource Allocation Planning Under High-Performance Computing WorkloadsKester Leochico, Eugene John. 966-975 [doi]
- Container Scheduling in Blockchain-based Cloud Service PlatformYu Lei 0007, Philip S. Yu. 976-983 [doi]
- An Approach to Estimate Power Consumption of a CUDA KernelGargi Alavani, Jineet Desai, Santonu Sarkar. 984-991 [doi]
- ECOMA: Edge-Cloud Collaborative Framework for Multi-Task ApplicationsZhipeng Zhang, Wenting Ma, Qingqing Xu, Renjie Tang, Jinlang Wang, Wai Chen. 992-997 [doi]
- Real-time detection of cloud tenant malicious behavior based on CNNHao Chen, Ruizhi Xiao, Shuyuan Jin. 998-1005 [doi]
- Probabilistic Data Allocation in Pervasive Computing ApplicationsKostas Kolomvatsos. 1006-1013 [doi]
- Porosity prediction based on GS+GA-XGBoostZechen Zheng, ShaoWei Pan, Haining Luo, Zhi Guo. 1014-1020 [doi]
- Deep Learning Algorithms for Secure Robot Face Recognition in Cloud EnvironmentsKarri Chiranjeevi, M. S. R. Naidu. 1021-1028 [doi]
- The underlying causal network from global dyadic events: allies and rivals in international relationsLei Jiang. 1029-1036 [doi]
- A simulator for reinforcement learning training in the recommendation fieldGuangyao Pang, Xiaoying Zhu, Keda Lu, Zizhen Peng, Weitao Deng. 1037-1042 [doi]
- Twi Corpus: A Massively Twi-to-Handful Languages Parallel Bible CorpusMichael Adjeisah, Guohua Liu, Richard Nuetey Nortey, Jinling Song, Lamptey Khalid Odartey, Felix Nana Frimpong. 1043-1049 [doi]
- SP-BTM: A Specific Part-of-speech BTM for Service ClusteringRong Hu, Jianxun Liu, Yiping Wen. 1050-1057 [doi]
- A Kernel Density Estimation-Based Variation Sampling for Class Imbalance in Defect PredictionYuqing Zhang, Xuefeng Yan, Arif Ali Khan. 1058-1065 [doi]
- Multi-dimensional Analysis of Industrial Big Data Based JSON DocumentMinbo Li, Juxiong Xu, Le Han. 1066-1073 [doi]
- Commodity Search Algorithm based on Ant Colony AlgorithmZhishuo Liu, Zhuonan Han. 1074-1081 [doi]
- Research on Relation Extraction Method Based on Multi-channel Convolution and BiLSTM ModelTao Sun, Dong Wang. 1082-1090 [doi]
- A Real-time CSI-based Passive Intrusion Detection MethodXingang Wang, Yufei Wang, Dong Wang. 1091-1098 [doi]
- Multi-objective Particle Swarm Optimization Guided by Global Diversity and Cross-generation CompetitionJing Zhao, Xiangyu Qu. 1099-1106 [doi]
- Contributor Dilemma in Structured Tri-gameTongda Zhang, Futian Huang, Jun Qian, Xiao Sun, Yueting Chai, Yi Liu. 1107-1111 [doi]
- Performance Analysis of Road Intersections Based on Game Theory and Dynamic Level-k ModelHuisheng Wang, Yuejiang Li, H. Vicky Zhao. 1112-1119 [doi]
- A Data-Driven Dynamic Stochastic Programming Framework for Ride-Sharing Rebalancing Problem under Demand UncertaintyXiaoming Li, Chun Wang, Xiao Huang, Yimin Nie. 1120-1125 [doi]
- A Heuristic Region-based Concurrency Bug Testing ApproachKuo-Cheng Chin, Ren-Song Tsay, Hsin-I Wu. 1126-1135 [doi]
- Predicting Sex and Age using Swipe-Gesture Data from a Mobile DeviceStorm P. Davis, Alireza Ashayer, Nasseh Tabrizi. 1136-1143 [doi]
- A Virtual Teaching Machine System Based on Oracle-bone-script LearningLinlin Zhao, Qingsheng Li, Li Zhang, Zhiqiang Luo, Huahua Jiang, Chunzhu Jiang, Xiangyu Liu. 1144-1149 [doi]
- Distracted Driving Behavior Detection and Identification Based on Improved Cornernet-SaccadeWei Zheng, Qing-Qing Zhang, Zhen Hao Ni, Zhan Guo Ye, Yuan Min Hu, Zhong-jie Zhu. 1150-1155 [doi]
- The Influence of Emotion Expression on Ergonomics in Interface DesignMohan Yang, Bowen Sun, Jianming Yang. 1156-1162 [doi]
- A Novel Hierarchical Threshold Secret Image Sharing SchemeShiyue Qin, Zhenhua Tan, Hong Li. 1163-1167 [doi]
- S-IterE: Using text generation to solve entity sparseness in knowledge reasoningXingang Wang, Fengpo Ji, Dong Wang. 1168-1175 [doi]
- A Context-Aware Variational Auto-Encoder Model for Text GenerationZhiqiang Ma, Chunyu Wang, Ji Shen, Baoxiang Du. 1176-1182 [doi]
- Ontology-Based Modeling and Semantic Query for Mobile Trajectory DataPeng Shao, Ming Tao, Min Zhou, Tian Wang. 1183-1188 [doi]
- Customizing Super-Resolution Framework According to Image FeaturesNinghui Yuan, Jingyu Liu, Qiong Wang, Li Shen. 1189-1196 [doi]
- A Film and TV News Digest Generation method Based on HanLPQing Wu, Qingsheng Li, Jingjing Zhou, Xiaoya Long, Yunqing Guan, Hongping Lin. 1197-1204 [doi]
- Does Personality Evolve? A Ten-Years Longitudinal Study from Social Media PlatformsRaad Bin Tareaf, Seyed Ali Alhosseini, Christoph Meinel. 1205-1213 [doi]
- A Multi-Threaded Accelerated Drug Combination Pathway Network ImplementationHaolei Ye, Shu Liu, Wei Xiao, Eric C. McCreath, Xinzhuang Zhang. 1214-1220 [doi]
- Dynamic Task Allocation for Robotic Network Cloud SystemsSaeid Alirezazadeh, Luís A. Alexandre. 1221-1228 [doi]
- RSFP: Reliable Service Function Placement with Optimized Resource Consumption in Data Center NetworksHong Tang, Ao Ku, Wei Liu, Haojun Huang. 1229-1234 [doi]
- Network Evaluation and Planning for Large-scale Low Earth Orbit Satellite Constellation NetworksLi Shen, Huanren Zhou, Xiaoting Wang, Wenping Li, Yuanyuan Fan, Shan Wu, Shuaijun Liu. 1235-1240 [doi]
- A Novel Strong Cache Consistency Mechanism in ICN Based on Role Division and Lease ModelShuokang Huang, Shuai Zhu, Kai Lei, Haiyi Lian, Shouyang Wei. 1241-1248 [doi]
- An Aggregate Authentication Framework for Unmanned Aerial Vehicle Cluster NetworkJingyi Li, Meng Zhao, Yong Ding 0005, Dennis Y. W. Liu, Yujue Wang, Hai Liang. 1249-1256 [doi]
- Heuristically Speeding up Anonymous Dynamic Network ComputationsAustin Halper, Dariusz R. Kowalski, Miguel A. Mosteiro. 1257-1263 [doi]
- A Quality- Time Model of Heterogeneous Agents Measure for Crowd IntelligenceZheming Yang, Wen Ji. 1264-1270 [doi]
- A Spatio-Temporal Event Model for Unmanned System SwarmYukun Yang, Yuan Yao, Gang Yang 0008, Xingshe Zhou 0001. 1271-1277 [doi]
- User Identity Linkage across Location-Based Social Networks with Spatio- Temporal Check-in PatternsFengxiang Ding, Xiaoqiang Ma, Yang Yang, Chen Wang. 1278-1285 [doi]
- Maritime Broadband Communications: Applications, Challenges and an Offshore 5G-virtual MIMO ParadigmCunqian Yu, Jingyu Li, Chunfang Zhang, Hang Li, Rongxi He, Bin Lin 0001. 1286-1291 [doi]
- An Intelligent Evaluation Method of Application Scenario Complexity Level of Unmanned SwarmsWenliang Wu, Xingshe Zhou 0001. 1292-1299 [doi]
- Mobile Edge Computing for Intelligent Mining Safety: A Case Study of VentilatorYuchun Zhang, Liang Zhao 0004, Kaiqi Yang, Lexi Xu. 1300-1305 [doi]
- A Review of Routing Protocols for Wireless Body Area Networks for Miner SafetyYuchun Zhang, Liang Zhao, Junling Shi, Su Peng, Yunchong Guan, Jiaxing Shang. 1306-1310 [doi]
- A Practical Workflow in Cleaning Master DataShuang Yi, Hailiang Ye. 1311-1314 [doi]
- PORA: Piggybacking-based Opportunistic Routing for Asynchronous Duty-Cycled WSNsWeiqi Wu, Xingfu Wang, Ammar Hawbani, Taiyaba Qureshi. 1315-1320 [doi]
- Interoperable Multi-Modal Data Analysis Platform for Alzheimer's Disease ManagementZhen Pang, Shuhao Zhang 0007, Yun Yang 0003, Jun Qi, Po Yang0001. 1321-1327 [doi]
- Visual Analysis of Biomarkers Selected via Multi-Task Learning for Modeling Alzheimer's Disease ProgressionXulong Wang, Gaoshan Bi, Yu Zhang, Jun Qi, Yun Yang, Po Yang. 1328-1333 [doi]
- Investigation of Side-Polished Panda Fibers for Strain Measurement and Surface Plasmon Resonance-Based Biochemical SensingTiesheng Wu, Zhihui Liu, Huixian Zhang, Zuning Yang, Dan Yang, Yiping Wang. 1334-1341 [doi]
- A Hybrid Hierarchical Model for Accessing Physical Activity Recognition towards Free-living EnvironmentsJun Qi, Hai-Ning Liang, Jianjun Chen, Xiyang Peng, Lee Newcombe, Po Yang. 1342-1347 [doi]
- Experimental Analysis of Artificial Neural Networks Performance for Accessing Physical Activity Recognition in Daily LifeXiyang Peng, Xiang Wang, Jun Qi, Yun Yang, Jie Li, Po Yang. 1348-1353 [doi]
- Price Learning in Joint Resource Allocation and Power Control Game in Heterogeneous Cellular NetworksChen Sun, Bo Zhang, Wei Zheng, Jian Shu. 1354-1358 [doi]
- Capacity Enhancement in LTE Network based on Machine LearningJinge Guo, Zhongsheng Fan, Yang Zhang, HuangTao Song, Bao Guo. 1359-1363 [doi]
- Dynamic Beam Hopping of Multi-beam Satellite Based on Genetic AlgorithmLibing Wang, Xin Hu 0006, Shijun Ma, Sujie Xu, Weidong Wang. 1364-1370 [doi]
- An Improved Energy Saving Strategy for SDN-based Data CenterHongyu Peng, Hanliang Xiao, Tianlu Hao, Kan Wang, Zhenkai Chen, Lexi Xu. 1371-1376 [doi]
- An Energy Efficiency Strategy Based on Bayesian Classification in SDN Data CenterHanliang Xiao, Peng Hong Yu, Sha Gong. 1377-1382 [doi]
- An Improved Firework Algorithm Based on Local Search OptimizationSha Gong, Peng Hong Yu, Dai Qi, Hanliang Xiao. 1383-1388 [doi]
- Recognition and Optimization of Atmospheric Duct in TD-LTE System Based on Convolutional Neural NetworkJin-Hu Shen, Ji-Xiang Liu, Jing-Lei Zuo, Wen-Bo Ding, Ao Shen, Yuan Fang, Yang Zhang, Xi-Dian Wang, Feng Luo. 1389-1393 [doi]
- Design of Performance Benchmark for Time Series DatabasesMiaoqiong Wang, Siyuan Liu, Kai Wei, Han Liu, Chunyu Jiang, Shu Yan, Pengwei Ma. 1394-1399 [doi]
- Challenges and Opportunities for Terrestrial Network Operators in the Air-Space-Ground Integrated NetworkYushan Pei, Shouye Miao, Fuchang Li. 1400-1404 [doi]
- Exemplar Loss for Siamese Network in Visual TrackingShuo Chang, Hua Lu 0012, Sai Huang, Yifan Zhang 0003. 1405-1412 [doi]
- An Improved Small-World Topology for Optimizing the Performance of Echo State NetworkSha Gong, Peng Hong Yu, Dai Qi, Hanliang Xiao, Zhenkai Chen, Tianlu Hao. 1413-1419 [doi]
- Research and Application of AI in 5G Network Operation and MaintenanceMingxin Li, Mingde Huo, Xinzhou Cheng, Lexi Xu. 1420-1425 [doi]
- Research on Infrastructure Project Financial System based on Power Grid Big DataZhendong Li, Danwei Zhou, Xiangyang Zheng. 1426-1431 [doi]
- An Improved Data Discretization Algorithm based on Rough Sets TheoryHan Liu, Chunyu Jiang, Miaoqiong Wang, Kai Wei, Shu Yan. 1432-1437 [doi]
- State of Charge Estimation of Low-speed Electric Vehicle Battery using Back Propagation Neural NetworkMenglong Xu, Wenguang Wu, Wenwen Zhou, Yuanyuan Ma, Xiaolei Shi, Jun Li. 1438-1443 [doi]
- Research on Energy Dispatching Strategy Based on Energy Forecast Algorithm for Data CenterHanliang Xiao, Hongyu Peng, Sha Gong, Lexi Xu. 1444-1449 [doi]
- A Novel 5G Core Network Capability Exposure Method for Telecom OperatorLin Lin, Bin Zhu, Quangquan Wang, Lexi Xu, Jia Mu. 1450-1454 [doi]
- Research on Intelligent Optimization of Massive MIMO Coverage Based on 5G MRGuoping Xu, Tian Xiao, Tao Tao, Duo Zhang, Wei Li, Hongbing Ma. 1455-1459 [doi]
- 5G Core Network Framework Based on Artificial IntelligenceShiyu Zhou, Xiqing Liu, Dengsheng Fu, Xinzhou Cheng, Bin Fu, Zhenqiao Zhao. 1460-1464 [doi]
- Research on Photoelectric Effect for Artificial Satellite CommunicationSitong Zhang. 1465-1469 [doi]
- Green Light Optimal Speed Advisory Systems Under Multi-modal Traffic Environments for Reducing Fuel ConsumptionGang Lu, Yuming Ge, Miaoqiong Wang, Jian Wang 0003, Da Wei, Chen Kang, Rundong Yu. 1470-1474 [doi]
- Application of Iteration Function System for Ceramic Tile DesignZhiming Chen. 1475-1480 [doi]
- Geographical distance and news diffusion associating with the sentiment of tweets: Case Study on London Bridge Attack 2017Phoey-Lee Teh, Jin Quan Low, Yain-Whar Si. 1481-1486 [doi]
- Design Application of Smart Kitchen for Aging Based on Interactive Behavior AnalysisYang Wang, Yuechen Ning. 1487-1494 [doi]
- Study On Coupled Social Network Public Opinion Communication Based On Improved SEIRChangbin Jiang, Yaoyuan Zhang, Hu Wang, Yawen Zhou, Yueqi Zou. 1495-1500 [doi]
- ITDT: An Iterative Decision Tree-based Approach for Telecom Customer ClassificationJiaxing Shang, Ziwei Jin, Yong Feng 0002, Ran Wei, Baohua Qiang, Wu Xie. 1501-1506 [doi]
- Stock Trend Prediction using Historical Data and Financial Online NewsYuemei Xu, Weihang Lin, Yiran Hu. 1507-1512 [doi]
- Towards Co-Evolution of Random-Walk-Based Embedding and Label Propagation for Node ClassificationRuixuan Zhao, Shenghang Liu, Wei Rao, Hao Xu, Chongning Na, Ruoyu Li. 1513-1520 [doi]