Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Distributed Monitoring System for Microservices-Based IoT Middleware System

    Microservices based architecture is a promising middleware architecture of Internet of things for its advantages of agility and scalability. However, comparing to the native Service oriented Architecture (SOA)...

    Rui Kang, Zhenyu Zhou, Jiahua Liu, Zhongran Zhou in Cloud Computing and Security (2018)

  2. No Access

    Chapter and Conference Paper

    Multi-dimensional Regression for Colour Prediction in Pad Dyeing

    This paper aims to predict fabric colours by analyzing the relationship between multiple process parameters and colours of dyed fabrics in pad dyeing. The task is approached as a multi-dimensional regression ...

    Zhao Chen, Chengzhi Zhou, Yijun Zhou, Lingyun Zhu, Ting Lu in Cloud Computing and Security (2018)

  3. No Access

    Chapter and Conference Paper

    EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension

    In location based services, users can request interesting services around them at any time and anywhere through mobile devices. They need to send their locations to get the service, which may cause the disclos...

    Honghao Zhou, Tinghuai Ma, **g Jia, Yuan Tian in Cloud Computing and Security (2018)

  4. No Access

    Chapter and Conference Paper

    An Image Retrieval Technology Based on Morphology in Cloud Computing

    In recent years, with the rapid development of computer network technology, the number of various multimedia data, including image data information, has increased rapidly. How to efficiently retrieve these im...

    Gui Liu, Jianhua Yao, Zhonghai Zhou in Cloud Computing and Security (2018)

  5. No Access

    Chapter and Conference Paper

    Using Blockchain for Data Auditing in Cloud Storage

    Cloud storage is one of the most important service of cloud computing. Since cloud service providers can not be completely trusted, traditional auditing methods can’t guarantee the security of data sources. Th...

    Chunhua Li, Jiaqi Hu, Ke Zhou, Yuanzhang Wang, Hongyu Deng in Cloud Computing and Security (2018)

  6. No Access

    Chapter and Conference Paper

    A Control Approach Using Network Latency Interval to Preserve Real-Time Causality

    A Distributed Virtual Environment (DVE) is to simulate the real world and offer the fidelity with real-time constraint. However, existing causal order control methods could not function well due to the large a...

    Hangjun Zhou, Guang Sun, Shuyang Du, Feng Liu, Bo Yang in Cloud Computing and Security (2018)

  7. No Access

    Chapter and Conference Paper

    A Method of Small Sample Reliability Assessment Based on Bayesian Theory

    In this paper, for the problem of how to improve the accuracy of Bayesian small sample reliability evaluation, we improve the pre-test information preprocessing and Bayesian reliability evaluation. In the pre...

    Hongbin Wang, Nianbin Wang, Lianke Zhou, Zhenbei Gu in Cloud Computing and Security (2018)

  8. No Access

    Chapter and Conference Paper

    Influence Maximization Algorithm in Social Networks Based on Three Degrees of Influence Rule

    Influence maximization algorithms in social networks are aimed at mining the most influential TOP-K nodes in the current social network, through which we will get the fastest spreading speed of information an...

    Hongbin Wang, Guisheng Yin, Lianke Zhou, **aolong Chen in Cloud Computing and Security (2018)

  9. No Access

    Chapter and Conference Paper

    Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage

    With the rapid growth of cloud storage center, the cumulative volume of data reaches EB and even ZB from PB. As a result, both network size and the number of storage nodes continue to grow explosively, while t...

    Yongjun Ren, Lin Zhou, Yepeng Liu, **aorui Zhang in Cloud Computing and Security (2018)

  10. No Access

    Chapter and Conference Paper

    Research on Trust Management Model in Cloud Manufacturing

    For security and trust issues in cloud manufacturing systems, trust management issues in the trust system are analyzed. An effective trust management model was proposed and introduced in detail. The model cons...

    **aolan **e, **ao Zhou, Tianwei Yuan in Cloud Computing and Security (2018)

  11. No Access

    Chapter and Conference Paper

    Multi-situation Analytic Hierarchy Process Based on Bayesian for Mobile Service Recommendation

    Aiming at that the mobile service recommendation results are inaccurate when the preparatory recommendation schemes are similar, this paper proposes a multi-situation Analytic Hierarchy Process based on Bayes...

    Weihong Wang, Fuxiang Zhou, Yuhui Cao, Dawei Zhang in Cloud Computing and Security (2018)

  12. No Access

    Chapter and Conference Paper

    Multiple Schemes for Bike-Share Service Authentication Using QR Code and Visual Cryptography

    With the growing application of quick response (QR) code on bike-share service, there is the possibility of tampering and replacing the QR code. Thus the security of the personal information and the property a...

    Li Li, Jier Yu, Bing Wang, Qili Zhou, Shanqing Zhang in Cloud Computing and Security (2018)

  13. No Access

    Chapter and Conference Paper

    Fast Detection of Heavy Hitters in Software Defined Networking Using an Adaptive and Learning Method

    Heavy Hitters refer to the set of flows that represent a significantly large proportion of the link capacity or of the active traffic. Identifying Heavy Hitters is of particular importance in both network mana...

    Zhiliang Wang, Chang** Zhou, Yang Yu, **ngang Shi in Cloud Computing and Security (2018)

  14. No Access

    Chapter and Conference Paper

    Blocking Time-Based MPTCP Scheduler for Heterogeneous Networks

    In order to solve the problem of buffer congestion caused by multipath transmission, we present Blocking Time-based MPTCP (MPTCP-BT) in heterogeneous network. The proposed algorithm designs a new metric path b...

    Chen Ling, Wensheng Tang, **** Dong, Wenjun Yang in Cloud Computing and Security (2018)

  15. No Access

    Chapter and Conference Paper

    Long Short Term Memory Model for Analysis and Forecast of PM2.5

    Atmospheric PM2.5 is a pollutant that has a major impact on the atmospheric environment and human health. Based on LSTM, we construct two prediction models, Stack LSTM and Encoder-Decoder, and evaluate the pr...

    Leiming Yan, Min Zhou, Yaowen Wu, Luqi Yan in Cloud Computing and Security (2018)

  16. No Access

    Chapter and Conference Paper

    QS-Code: A Quasi-Systematic Erasure Code with Partial Security for Cloud Storage

    To address the reliability and privacy concerns in cloud storage systems, we present a quasi-systematic erasure code with partial security, referred to as QS-code. As a new family of maximum distance separable...

    Chong Wang, Ke Zhou, Ronglei Wei in Cloud Computing and Security (2018)

  17. No Access

    Chapter and Conference Paper

    On the Computational Complexity of Minimal Cumulative Cost Graph Pebbling

    We consider the computational complexity of finding a legal black pebbling of a DAG \(G=(V,E)\) with mini...

    Jeremiah Blocki, Samson Zhou in Financial Cryptography and Data Security (2018)

  18. No Access

    Book and Conference Proceedings

    Human Aspects of IT for the Aged Population. Aging, Design and User Experience

    Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part I

    Jia Zhou, Gavriel Salvendy in Lecture Notes in Computer Science (2017)

  19. No Access

    Book and Conference Proceedings

    Human Aspects of IT for the Aged Population. Applications, Services and Contexts

    Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part II

    Jia Zhou, Gavriel Salvendy in Lecture Notes in Computer Science (2017)

  20. Chapter and Conference Paper

    Analysis and Study on the Furniture Used by the Aging Population Based on the Quality of Sleep

    As China has already stepped into an aging society, it is of great importance to care more for the aging population. Compared with the speed of the aging of population, products designs for the elderly can’t ...

    Bin Jiang, Hui Niu, Di Zhou in Human Aspects of IT for the Aged Populatio… (2017)

previous disabled Page of 2