Muutke küpsiste eelistusi

E-raamat: Algorithms and Architectures for Parallel Processing: 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part III

Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015.





The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.





 
Applications of Parallel and Distributed Computing
On Exploring a Virtual Agent Negotiation Inspired Approach for Route Guidance in Urban Traffic Networks
3(14)
Wenbin Hu
Liping Yan
Huan Wang
Bo Du
Optimization of Binomial Option Pricing on Intel MIC Heterogeneous System
17(13)
Weihao Liang
Hong An
Feng Li
Yichao Cheng
Stencil Computations on HPC-oriented ARMv8 64-Bit Multi-Core Processor
30(14)
Chunjiang Li
Yushan Dong
Kuan Li
A Particle Swarm Optimization Algorithm for Controller Placement Problem in Software Defined Network
44(11)
Chuangen Gao
Hua Wang
Fangjin Zhu
Linbo Zhai
Shanwen Yi
A Streaming Execution Method for Multi-services in Mobile Cloud Computing
55(13)
Lei Li
Yonghua Xiong
Shufan Guo
Keyuan Jiang
Yongbing Tang
Economy-Oriented Deadline Scheduling Policy for Render System Using IaaS Cloud
68(11)
Qian Li
Weiguo Wu
Zeyu Sun
Lei Wang
Jianhang Huang
Towards Detailed Tissue-Scale 3D Simulations of Electrical Activity and Calcium Handling in the Human Cardiac Ventricle
79(14)
Qiang Lan
Namit Gaur
Johannes Langguth
Xing Cai
Task Parallel Implementation of Matrix Multiplication on Multi-socket Multi-core Architectures
93(12)
Yizhuo Wang
Weixing Ji
Xu Chen
Sensen Hu
Refactoring for Separation of Concurrent Concerns
105(14)
Yang Zhang
Dongwen Zhang
Weixing Ji
Yizhuo Wang
Exploiting Scalable Parallelism for Remote Sensing Analysis Models by Data Transformation Graph
119(15)
Zhenchun Huang
Guoqing Li
Resource-Efficient Vibration Data Collection in Cyber-Physical Systems
134(14)
Md Zakirul Alam Bhuiyan
Guojun Wang
Jie Wu
Tian Wang
Xiangyong Liu
A New Approach for Vehicle Recognition and Tracking in Multi-camera Traffic System
148(14)
Wenbin Jiang
Zhiwei Lu
Hai Jin
Ye Chi
DFIS: A Scalable Distributed Fingerprint Identification System
162(14)
Yunxiang Zhao
Wanxin Zhang
Dongsheng Li
Zhen Huang
Energy Saving and Load Balancing for SDN Based on Multi-objective Particle Swarm Optimization
176(14)
Runshui Zhu
Hua Wang
Yanqing Gao
Shanwen Yi
Fangjin Zhu
Pre-stack Kirchhoff Time Migration on Hadoop and Spark
190(13)
Chen Yang
Jie Tang
Heng Gao
Gangshan Wu
A Cyber Physical System with GPU for CNC Applications
203(10)
Jen-Chieh Chang
Ting-Hsuan Chien
Rong-Guey Chang
NCPSO: A Solution of the Controller Placement Problem in Software Defined Networks
213(13)
Shuai Liu
Hua Wang
Shanwen Yi
Fangjin Zhu
Parallel Column Subset Selection of Kernel Matrix for Scaling up Support Vector Machines
226(14)
Jiangang Wu
Chang Feng
Peihuan Gao
Shizhong Liao
Real-Time Deconvolution with GPU and Spark for Big Imaging Data Analysis
240(11)
Lianyu Cao
Penghui Juan
Yinghua Zhang
Parallel Kirchhoff Pre-Stack Depth Migration on Large High Performance Clusters
251(16)
Chao Li
Yida Wang
Changhai Zhao
Haihua Yan
Jianlei Zhang
MrBayes for Phylogenetic Inference Using Protein Data on a GPU Cluster
267(14)
Shuai Pang
Rebecca J. Stones
Ming-Ming Ren
Gang Wang
Xiaoguang Liu
Paralleled Continuous Tabu Search Algorithm with Sine Maps and Staged Strategy for Solving CNOP
281(16)
Shijin Yuan
Yiwen Qian
Bin Mu
Service Dependability and Security in Distributed and Parallel Systems
VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs
297(14)
Chi Lin
Kun Liu
Bo Xu
Jing Deng
Chang Wu Yu
Guowei Wu
A Novel Search Engine-Based Method for Discovering Command and Control Server
311(12)
Xiaojun Guo
Guang Cheng
Wubin Pan
Truong Dinhtu
Yixin Liang
Leveraging Behavior Diversity to Detect Spammers in Online Social Networks
323(14)
Jian Cao
Qiang Fu
Qiang Li
Dong Guo
A Proactive Fault Tolerance Scheme for Large Scale Storage Systems
337(14)
Xinpu Ji
Yuxiang Ma
Rui Ma
Peng Li
Jingwei Ma
Gang Wang
Xiaoguang Liu
Zhongwei Li
When Software Defined Networks Meet Fault Tolerance: A Survey
351(18)
Jue Chen
Jinhang Chen
Fei Xu
Min Yin
Wei Zhang
A Novel Signature Generation Approach for Polymorphic Worms
369(14)
Jie Wang
Xiaoxian He
Scalable Access Policy for Attribute Based Encryption in Cloud Storage
383(20)
Jing Wang
Chuanhe Huang
Jinhai Wang
Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks
403(14)
Chi Lin
Guowei Wu
Xiaochen Lai
Tie Qiu
Deviation-Based Location Switching Protocol for Trajectory Privacy Protection
417(12)
Shaobo Zhang
Qin Liu
Guojun Wang
Exploring Efficient and Robust Virtual Machine Introspection Techniques
429(20)
Chonghua Wang
Xiaochun Yun
Zhiyu Hao
Lei Cui
Yandong Han
Qingxin Zou
CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks
449(14)
Teng Li
Jianfeng Ma
Cong Sun
NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks
463(12)
Entao Luo
Qin Liu
Guojun Wang
A New Data Replication Scheme for PVFS2
475(17)
Nianyuan Bao
Jie Tang
Xiaoyu Zhang
Gangshan Wu
Efficient Private Matching Scheme for Friend Information Exchange
492(12)
Fang Qi
Wenbo Wang
A Real-time Android Malware Detection System Based on Network Traffic Analysis
504(13)
Hongbo Han
Zhenxiang Chen
Qiben Yan
Lizhi Peng
Lei Zhang
Sky: Opinion Dynamics Based Consensus for P2P Network with Trust Relationships
517(15)
Houwu Chen
Jiwu Shu
Adopting Multi-mode Access Control for Secure Data Sharing in Cloud
532(15)
Chunhua Li
Ronglei Wei
Zebang Wu
Ke Zhou
Cheng Lei
Hao Jin
A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud
547(15)
Zheng Yan
Wenxiu Ding
Haiqi Zhu
HCBE: Achieving Fine-Grained Access Control in Cloud-Based PHR Systems
562(15)
Xuhui Liu
Qin Liu
Tao Peng
Jie Wu
Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications
577(20)
Lei Cui
Zhiyu Hao
Lun Li
Haiqiang Fei
Zhenquan Ding
Bo Li
Peng Liu
Fast and Scalable Regular Expressions Matching with Multi-Stride Index NFA
597(14)
Sheng Huo
Dafang Zhang
Yanbiao Li
A Robust and Efficient Detection Model of DDoS Attack for Cloud Services
611(14)
Jian Zhang
Ya-Wei Zhang
Jian-Biao He
Ou Jin
Secure Bisimulation for Interactive Systems
625(15)
Guanjun Liu
Changjun Jiang
Privacy Preserving for Network Coding in Smart Grid
640(15)
Shiming He
Weini Zeng
Kun Xie
Verifiable Dynamic Fuzzy Search Over Encrypted Data in Cloud Computing
655(12)
Xiaoyu Zhu
Qin Liu
Guojun Wang
A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data
667(15)
Hui Yin
Zheng Qin
Jixin Zhang
Lu Ou
Qin Liu
Yupeng Hu
Huigui Rong
PEM4RFID: Privacy Enhancement Model for RFID Systems
682(13)
Guangquan Xu
Yuanyuan Ren
Bin Liu
Gaoxu Zhang
Xiaohong Li
Zhiyong Feng
Improved WOW Adaptive Image Steganography Method
695(8)
Xin Liao
Guoyong Chen
Qi Li
Jun Liu
CloudS: A Multi-cloud Storage System with Multi-level Security
703(14)
Lu Shen
Shifang Feng
Jinjin Sun
Zhongwei Li
Gang Wang
Xiaoguang Liu
Crossing -- A Highly Available Quorum Protocol for Arbitrary Planar Topologies
717(12)
Robert Schadek
Oliver Theel
Note on Fast Bridge Fault Test Generation Based on Critical Area
729(12)
Masayuki Arai
Shingo Inuyama
Kazuhiko Iwasaki
Joint Redundancy and Inspection-Based Maintenance Optimization for Series-Parallel System
741(15)
Yuan Yao
Pan He
Zhihao Zheng
Chun Tan
Yue Yuan
Addressing NoC Reliability Through an Efficient Fibonacci-Based Crosstalk Avoidance Codec Design
756(15)
Zahra Shirmohummadi
Seyed Ghassem Miremadi
A Programming Framework for Implementing Fault-Tolerant Mechanism in IoT Applications
771(14)
Yung-Li Hu
Yuo-Yu Cho
Wei-Bing Su
David S.L. Wei
Yennun Huang
Jiann-Liang Chen
Ing-Yi Chen
Sy-Yen Kuo
An Agent-Based Framework for Simulating and Analysing Attacks on Cyber Physical Systems
785(14)
Sridhar Adepu
Adilya Mathur
Jagadeesh Gunda
Sasa Djokic
Author Index 799