Search - IFIP Open Digital Library Access content directly

Filter your results

63 results
Structure: Internal structure identifier : 302677
Image document

CCRP: Converging Credit-Based and Reactive Protocols in Datacenters

Yang Bai , Dinghuang Hu , Dezun Dong , Shan Huang , Xiangke Liao
17th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2020, Zhengzhou, China. pp.420-434, ⟨10.1007/978-3-030-79478-1_36⟩
Conference papers hal-03768736v1
Image document

A Novel Chaining Approach to Indirect Control Transfer Instructions

Wei Chen , Zhiying Wang , Qiang Dou , Yongwen Wang
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.309-320, ⟨10.1007/978-3-642-23300-5_24⟩
Conference papers hal-01590412v1
Image document

Reorder the Write Sequence by Virtual Write Buffer to Extend SSD’s Lifespan

Zhiguang Chen , Fang Liu , Yimo Du
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.263-276, ⟨10.1007/978-3-642-24403-2_21⟩
Conference papers hal-01593016v1
Image document

Optimizing Data Placement on Hierarchical Storage Architecture via Machine Learning

Peng Cheng , Yutong Lu , Yunfei Du , Zhiguang Chen , Yang Liu
16th IFIP International Conference on Network and Parallel Computing (NPC), Aug 2019, Hohhot, China. pp.289-302, ⟨10.1007/978-3-030-30709-7_23⟩
Conference papers hal-03770550v1
Image document

Obstacle Detection and Tracking Based on Multi-sensor Fusion

Shuyao Cui , Dianxi Shi , Chi Chen , Yaru Kang
10th International Conference on Intelligent Information Processing (IIP), Oct 2018, Nanning, China. pp.430-436, ⟨10.1007/978-3-030-00828-4_44⟩
Conference papers hal-02197780v1
Image document

A Scalable Inline Cluster Deduplication Framework for Big Data Protection

Yinjin Fu , Hong Jiang , Nong Xiao
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.354-373, ⟨10.1007/978-3-642-35170-9_18⟩
Conference papers hal-01555548v1
Image document

An UML-Based Meta-modeling Method of Building Architecture Product

Jiong Fu , Aimin Luo , Xueshan Luo
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.210-220, ⟨10.1007/978-3-642-55355-4_21⟩
Conference papers hal-01350926v1
Image document

Incomplete Multi-view Clustering

Hang Gao , Yuxing Peng , Songlei Jian
9th International Conference on Intelligent Information Processing (IIP), Nov 2016, Melbourne, VIC, Australia. pp.245-255, ⟨10.1007/978-3-319-48390-0_25⟩
Conference papers hal-01614996v1
Image document

An Agent-Based Autonomous Management Approach to Dynamic Services

Fu Hou , Xinjun Mao , Junwen Yin , Wei Wu
8th International Conference on Intelligent Information Processing (IIP), Oct 2014, Hangzhou, China. pp.122-132, ⟨10.1007/978-3-662-44980-6_14⟩
Conference papers hal-01383325v1
Image document

A Configurable Hardware Architecture for Runtime Application of Network Calculus

Xiao Hu , Zhonghai Lu
17th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2020, Zhengzhou, China. pp.203-216, ⟨10.1007/978-3-030-79478-1_18⟩
Conference papers hal-03768725v1
Image document

A Component Data-Focused Method to Build the Executable Model for a DoDAF Compliant Architecture

Li Huang , Guangqi Huang , Yaohong Zhang , Weizi Li , Xueshan Luo
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.221-230, ⟨10.1007/978-3-642-55355-4_22⟩
Conference papers hal-01350927v1
Image document

Rationality of Service Composition of Workflow Net in a Service Oriented Architecture

Guangqi Huang , Li Huang , Xiuxiu Chen , Lily Sun
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.155-165, ⟨10.1007/978-3-642-55355-4_16⟩
Conference papers hal-01350920v1
Image document

An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors

Wentao Jia , Rui Li , Chunyan Zhang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.337-342, ⟨10.1007/978-3-642-36818-9_37⟩
Conference papers hal-01480191v1
Image document

An Empirical View on Opportunistic Forwarding Relay Selection Using Contact Records

Jia Jianbin , Chen Yingwen , Xu Ming
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.256-263, ⟨10.1007/978-3-642-35606-3_30⟩
Conference papers hal-01551313v1
Image document

Efficient DVFS to Prevent Hard Faults for Many-Core Architectures

Zhiquan Lai , Baokang Zhao , Jinshu Su
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.674-679, ⟨10.1007/978-3-642-55032-4_69⟩
Conference papers hal-01397285v1
Image document

DSS: A Scalable and Efficient Stratified Sampling Algorithm for Large-Scale Datasets

Minne Li , Dongsheng Li , Siqi Shen , Zhaoning Zhang , Xicheng Lu
13th IFIP International Conference on Network and Parallel Computing (NPC), Oct 2016, Xi'an, China. pp.133-146, ⟨10.1007/978-3-319-47099-3_11⟩
Conference papers hal-01648006v1
Image document

Streaming Applications on Heterogeneous Platforms

Zhaokui Li , Jianbin Fang , Tao Tang , Xuhao Chen , Canqun Yang
13th IFIP International Conference on Network and Parallel Computing (NPC), Oct 2016, Xi'an, China. pp.116-129, ⟨10.1007/978-3-319-47099-3_10⟩
Conference papers hal-01647994v1
Image document

Accelerating the Requirement Space Exploration through Coarse-Grained Parallel Execution

Zhongwei Lin , Yiping Yao
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.59-70, ⟨10.1007/978-3-642-24403-2_5⟩
Conference papers hal-01593012v1
Image document

How to Break EAP-MD5

Fanbao Liu , Tao Xie
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.49-57, ⟨10.1007/978-3-642-30955-7_6⟩
Conference papers hal-01534313v1
Image document

Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution

Bo Liu , Baokang Zhao , Chunqing Wu , Wanrong Yu , Ilsun You
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.282-285, ⟨10.1007/978-3-319-24315-3_29⟩
Conference papers hal-01466229v1
Image document

Characterizing Inter-domain Rerouting after Japan Earthquake

Yujing Liu , Xiapu Luo , Rocky Chang , Jinshu Su
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.124-135, ⟨10.1007/978-3-642-30054-7_10⟩
Conference papers hal-01531953v1
Image document

Automated Vulnerability Detection in Embedded Devices

Danjun Liu , Yong Tang , Baosheng Wang , Wei Xie , Bo Yu
14th IFIP International Conference on Digital Forensics (DigitalForensics), Jan 2018, New Delhi, India. pp.313-329, ⟨10.1007/978-3-319-99277-8_17⟩
Conference papers hal-01988845v1
Image document

Accelerating Large-Scale Deep Convolutional Neural Networks on Multi-core Vector Accelerators

Zhong Liu , Sheng Ma , Cheng Li , Haiyan Chen
17th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2020, Zhengzhou, China. pp.68-79, ⟨10.1007/978-3-030-79478-1_6⟩
Conference papers hal-03768763v1
Image document

An Efficient Data Transmission Strategy for Edge-Computing-Based Opportunistic Social Networks

Jingwen Luo , Jia Wu , Yuzhou Wu
17th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2020, Zhengzhou, China. pp.323-335, ⟨10.1007/978-3-030-79478-1_28⟩
Conference papers hal-03768754v1
Image document

EaSync: A Transparent File Synchronization Service across Multiple Machines

Huajian Mao , Hang Zhang , Xianqiang Bao , Nong Xiao , Weisong Shi , et al.
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.289-296, ⟨10.1007/978-3-642-35606-3_34⟩
Conference papers hal-01551377v1
Image document

Go Mapping Theory and Factor Space Theory Part I: An Outline

He Ouyang
2nd International Conference on Intelligence Science (ICIS), Oct 2017, Shanghai, China. pp.37-41, ⟨10.1007/978-3-319-68121-4_4⟩
Conference papers hal-01820908v1
Image document

Evaluation of Topological Vulnerability of the Internet under Regional Failures

Wei Peng , Zimu Li , Jinshu Su , Muwei Dong
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.164-175, ⟨10.1007/978-3-642-23300-5_13⟩
Conference papers hal-01590391v1
Image document

A Structure P2P Based Web Services Registry with Access and Control

He Qian , Zhao Baokang , Long Yunjian , Su Jinshu , Ilsun You
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.286-297, ⟨10.1007/978-3-319-10975-6_23⟩
Conference papers hal-01404009v1
Image document

Optimizing OpenCL Implementation of Deep Convolutional Neural Network on FPGA

Yuran Qiao , Junzhong Shen , Dafei Huang , Qianming Yang , Mei Wen , et al.
14th IFIP International Conference on Network and Parallel Computing (NPC), Oct 2017, Hefei, China. pp.100-111, ⟨10.1007/978-3-319-68210-5_9⟩
Conference papers hal-01705448v1
Image document

A Semantic-Based Malware Detection System Design Based on Channels

Peige Ren , Xiaofeng Wang , Chunqing Wu , Baokang Zhao , Hao Sun
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.653-662, ⟨10.1007/978-3-642-55032-4_67⟩
Conference papers hal-01397283v1