


default search action
14th CollaborateCom 2018: Shanghai, China
- Honghao Gao, Xinheng Wang, Yuyu Yin, Muddesar Iqbal:

Collaborative Computing: Networking, Applications and Worksharing - 14th EAI International Conference, CollaborateCom 2018, Shanghai, China, December 1-3, 2018, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 268, Springer 2019, ISBN 978-3-030-12980-4
Collaborative Computing
- Xin Zhang, Hong Xiang, Yuqi Song:

Meta-Path and Matrix Factorization Based Shilling Detection for Collaborate Filtering. 3-16 - Zhenyu Zhu, Liusheng Huang, Hongli Xu:

Collaborative Thompson Sampling. 17-32 - Qinglan Peng, Qiang He, Yunni Xia, Chunrong Wu, Shu Wang:

Collaborative Workflow Scheduling over MANET, a User Position Prediction-Based Approach. 33-52 - Mingchu Li, Xiaomei Sun, Xing Jin, Linlin Tian:

Worker Recommendation with High Acceptance Rates in Collaborative Crowdsourcing Systems. 53-74 - Ke Xu, Kai Han:

Cost-Aware Targeted Viral Marketing with Time Constraints in Social Networks. 75-91 - Shasha Li, Kai Han, Jiahao Zhang:

Exploring Influence Maximization in Location-Based Social Networks. 92-111 - Baixiang Xue

, Bo Wang, Yanshu Yu, Ruifang He, Yuexian Hou, Dawei Song:
Measuring Bidirectional Subjective Strength of Online Social Relationship by Synthetizing the Interactive Language Features and Social Balance (Short Paper). 112-123 - Qing Yang, Le Zhan, Li Han, Jingwei Zhang, Zhongqin Bi:

Recommending More Suitable Music Based on Users' Real Context. 124-137 - Chaoping Ding, Ting Wu, Tong Qiao, Ning Zheng, Ming Xu, Yiming Wu, Wenjing Xia:

A Location Spoofing Detection Method for Social Networks (Short Paper). 138-150 - Xueying Sun, Fu Xie:

The Three-Degree Calculation Model of Microblog Users' Influence (Short Paper). 151-160 - Bo Jiao, Yiping Bao, Jin Wang:

Identifying Local Clustering Structures of Evolving Social Networks Using Graph Spectra (Short Paper). 161-169 - Zhuoran Li, Guiling Wang, Jinlong Meng, Yao Xu:

The Parallel and Precision Adaptive Method of Marine Lane Extraction Based on QuadTree. 170-188 - Bing Tang, Linyao Kang, Yanmin Xia, Li Zhang:

GPU-accelerated Large-Scale Non-negative Matrix Factorization Using Spark. 189-201 - Yanqi Zhang, Bo Zhang, Xiaodong Yi:

Adaptive Data Sharing Algorithm for Aerial Swarm Coordination in Heterogeneous Network Environments (Short Paper). 202-210 - Yang Wu, Jian Xu, Liming Tu, Ming Luo, Zhi Chen, Ning Zheng:

Reverse Collective Spatial Keyword Querying (Short Paper). 211-221 - Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng:

Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper). 222-232
IoT Networks and Services
- Xiaolan Tang, Zhi Geng, Wenlong Chen:

Safety Message Propagation Using Vehicle-Infrastructure Cooperation in Urban Vehicular Networks. 235-251 - Lina Shan, Zikun Yang, Huan Zhang, Ruyi Shi, Li Kuang:

Predicting Duration of Traffic Accidents Based on Ensemble Learning. 252-266 - Bo He, Jingyu Wang, Qi Qi, Haifeng Sun:

A Single-Hop Selection Strategy of VNFs Based on Traffic Classification in NFV. 267-283 - Chen Zhao, Yongzheng Zhang, Tianning Zang, Zhizhou Liang, Yipeng Wang:

A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper). 284-294 - Zheng Zhang, Pei Hu:

Grid Clustering and Routing Protocol in Heterogeneous Wireless Sensor Networks (Short Paper). 295-309 - Fei Du, Xiuguo Bao, Yongzheng Zhang, Yu Wang:

GeoBLR: Dynamic IP Geolocation Method Based on Bayesian Linear Regression. 310-328 - Zhenyu Cheng

, Xunxun Chen
, Yongzheng Zhang, Shuhao Li, Jian Xu:
MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users. 329-345 - Bo Chen, Xi Li, Xuehai Zhou, Zongwei Zhu:

Delayed Wake-Up Mechanism Under Suspend Mode of Smartphone. 346-355 - Changjia Yang, Peng Li

, Tao Zhang, Yu Jin, Heng He, Lei Nie, Qin Liu
:
Mobile Data Sharing with Multiple User Collaboration in Mobile Crowdsensing (Short Paper). 356-365 - Weiyi Huang, Peng Li

, Tao Zhang, Yu Jin, Heng He, Lei Nie, Qin Liu
:
Exploiting Sociality for Collaborative Message Dissemination in VANETs. 366-385 - Jie Xu, Yong Zhang, Yongzheng Jia

, Chunxiao Xing
:
An Efficient Traffic Prediction Model Using Deep Spatial-Temporal Network. 386-399
Data, Information and Knowledge Processing
- Zixiang Wang, Zhoubin Liu, Xiaolu Yuan, Yueshen Xu

, Rui Li:
Assessing Data Anomaly Detection Algorithms in Power Internet of Things. 403-416 - Tiantian Fan, Junming Liu, Yeliang Qiu, Congfeng Jiang, Jilin Zhang, Wei Zhang, Jian Wan:

PARDA: A Dataset for Scholarly PDF Document Metadata Extraction Evaluation. 417-431 - Zaijian Wang, Chen Chen, Xinheng Wang

, Lingyun Yang, Pingping Tang:
New Cross-Domain QoE Guarantee Method Based on Isomorphism Flow. 432-447 - Guobing Zou, Yang Xiang, Pengwei Wang, Shengye Pang, Honghao Gao, Sen Niu, Yanglan Gan:

Extracting Business Execution Processes of API Services for Mashup Creation. 448-466 - Xin Zhang, Hong Xiang, Tao Xiang

:
An Efficient Quantum Circuits Optimizing Scheme Compared with QISKit (Short Paper). 467-476 - Peng Zhan, Yupeng Hu, Wei Luo, Yang Xu, Qi Zhang, Xueqing Li:

Feature-based Online Segmentation Algorithm for Streaming Time Series (Short Paper). 477-487 - Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li:

MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data. 488-503 - Tienan Zhang, Fangfang Liu

, Yan Shen, Honghao Gao, Jing Duan:
Learning from High-Degree Entities for Knowledge Graph Modeling. 504-517 - Liangfu Lu, Xiaoxu Ren

, Lianyong Qi, Chenming Cui, Yichen Jiao:
Target Gene Mining Algorithm Based on gSpan. 518-528 - Wang Zhang, Xu Bai, Chanjuan Chen, Zhaolin Chen:

Booter Blacklist Generation Based on Content Characteristics. 529-542 - Cun Ji

, Xiunan Zou, Yupeng Hu, Shijun Liu:
A 2D Transform Based Distance Function for Time Series Classification. 543-559 - Rina Wu, Bo Cui, Ru Li:

Research on Access Control of Smart Home in NDN (Short Paper). 560-570 - Huimin Zhang

, Yan Sun, Haiwei Sun, Xin Yuan:
The Realization of Face Recognition Algorithm Based on Compressed Sensing (Short Paper). 571-580 - Guangxin Zhang, Minzhen Wang, Xinheng Wang

, Liying Zhao, Jinyang Zhao:
An On-line Monitoring Method for Monitoring Earth Grounding Resistance Based on a Hybrid Genetic Algorithm (Short Paper). 581-591
Cloud Technology and Applications
- Zujie Ren, Na Yun, Youhuizi Li, Jian Wan, Yuan Wang, Lihua Yu, Xinxin Fan:

How Good is Query Optimizer in Spark? 595-609 - Wenmin Lin, Hao Jiang, Nailiang Zhao, Jilin Zhang:

An Optimized Multi-Paxos Protocol with Centralized Failover Mechanism for Cloud Storage Applications. 610-625 - Zhibin Wang, Yiping Wen, Yu Zhang, Jinjun Chen, Buqing Cao:

A Resource Usage Prediction-Based Energy-Aware Scheduling Algorithm for Instance-Intensive Cloud Workflows. 626-642 - Xiangping Zhang, Jianxun Liu, Buqing Cao, Qiaoxiang Xiao, Yiping Wen:

Web Service Discovery Based on Information Gain Theory and BiLSTM with Attention Mechanism. 643-658 - Guobing Zou, Shengye Pang, Pengwei Wang, Huaikou Miao, Sen Niu, Yanglan Gan, Bofeng Zhang:

Neighborhood-Based Uncertain QoS Prediction of Web Services via Matrix Factorization. 659-675 - Ruici Luo, Wei Ye, Jinan Sun, Xueyang Liu, Shikun Zhang:

Runtime Resource Management for Microservices-Based Applications: A Congestion Game Approach (Short Paper). 676-687 - Jing Liu, Zhen-Tian Liu, Yu-Qiang Zhao:

CPN Model Based Standard Feature Verification Method for REST Service Architecture. 688-707 - Yu Lei, Shanshan Liang, Shiping Chen

, Yaoyao Wen:
Crawled Data Analysis on Baidu API Website for Improving SaaS Platform (Short Paper). 708-716
Software Testing and Formal Verification
- Yukun Pan, Minghua Zhu, Jufeng Luo, Yunzhou Qiu:

A Hardware/Software Co-design Approach for Real-Time Binocular Stereo Vision Based on ZYNQ (Short Paper). 719-733 - Yu Wong, Hongwei Zeng, Huaikou Miao, Honghao Gao, Xiaoxian Yang:

The Cuckoo Search and Integer Linear Programming Based Approach to Time-Aware Test Case Prioritization Considering Execution Environment. 734-754 - Zhijie Xiao, Tao Li, Yuqiao Wang:

Using Hybrid Model for Android Malicious Application Detection Based on Population (Short Paper). 755-766

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














