


default search action
11. GPC 2016: Xi'an, China
- Xinyi Huang, Yang Xiang, Kuan-Ching Li:

Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings. Lecture Notes in Computer Science 9663, Springer 2016, ISBN 978-3-319-39076-5
Green Computing
- Daxin Zhu

, Yingjie Wu, Xiaodong Wang:
An Efficient Dynamic Programming Algorithm for STR-IC-STR-EC-LCS Problem. 3-17 - Xiaodong Wang, Yingjie Wu, Daxin Zhu

:
A Polynomial Time Algorithm for a Generalized Longest Common Subsequence Problem. 18-29 - Yang Zhao, Jingfei Jiang, Pengbo Wu:

Improved Survey Propagation on Graphics Processing Units. 30-41 - Xinyan Zhang

, Zhipeng Tan, Meng Li, Yingfei Zheng, Wei Zhou:
ZooKeeper+: The Optimization of Election Algorithm in Complex Network Circumstance. 42-60
Cloud Computing
- Ge Yao, Yong Li, Linan Lei, Huaqun Wang, Changlu Lin:

An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage. 63-81 - Chao-Tung Yang

, Yin-Zhen Yan, Shuo-Tsung Chen, Ren-Hao Liu, Jean-Huei Ou, Kun-Liang Chen:
iGEMS: A Cloud Green Energy Management System in Data Center. 82-98 - Yuxing Tang, Lei Wang, Yu Deng, Xiaoqiang Ni, Qiang Dou:

The Macro-DSE for HPC Processing Unit: The Physical Constraints Perspective. 99-112 - Jinghua Li

, Xiaoyan Liu, Huixiang Zhang, Dejun Mu
:
A Scalable Cloud-Based Android App Repackaging Detection Framework. 113-125
Virtualisation
- Ying Liu:

Chameleon: Virtual Machine Migration Supporting Cascading Overload Management in Cloud. 129-145 - Tyng-Yeu Liang, Yu-Jie Lin:

Heterogeneous Computation Migration on LLVM. 146-162 - Xingyan Zhang:

A Flow Scheduling Algorithm Based on VM Migration in Data Center Networks. 163-179 - Venkataramanan Venkatesh, Amiya Nayak

:
Optimizing I/O Intensive Domain Handling in Xen Hypervisor for Consolidated Server Environments. 180-195 - Joshua Ho, Chien-Min Wang

:
User-Centric and Real-Time Activity Recognition Using Smart Glasses. 196-210
Network Security
- Zehui Xiong

, Bang Wang:
Minimizing Confident Information Coverage Breach in Rechargeable Wireless Sensor Networks with Uneven Recharging Rates. 213-228 - Qimin Sun, Jongho Moon, Younsung Choi

, Dongho Won:
An Improved Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment. 229-242 - Hui Sun, Jianhua Sun, Hao Chen:

Mining Frequent Attack Sequence in Web Logs. 243-260 - Xiaochao Wei, Chuan Zhao, Han Jiang, Qiuliang Xu, Hao Wang:

Practical Server-Aided k-out-of-n Oblivious Transfer Protocol. 261-277 - Xueyang Han, Qiuliang Xu, Fengbo Lin, Minghao Zhao:

Improved Power Analysis Attack Based on the Preprocessed Power Traces. 278-289 - Xiaojuan Chen, Yi Mu:

Preserving User Location Privacy for Location-Based Service. 290-300 - Zaid Ameen Abduljabbar

, Hai Jin, Ayad Ibrahim, Zaid Alaa Hussien
, Mohammed Abdulridha Hussain, Salah H. Abbdal, Deqing Zou:
Towards Secure Private Image Matching. 301-315

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














