UM

Browse/Search Results:  1-10 of 14 Help

Filters                    
Selected(0)Clear Items/Page:    Sort:
A service governance mechanism based on process mining for cloud-based applications Journal article
ENTERPRISE INFORMATION SYSTEMS, 2018,Volume: 12,Issue: 10,Page: 1239-1256
Authors:  Hongming Cai;  Lida Xu;  Boyi Xu;  Pengzhu Zhang;  Jingzhi Guo;  Yuran Zhang
Favorite | View/Download:16/0 | TC[WOS]:5 TC[Scopus]:0 | Submit date:2019/01/17
Service Governance  Process Mining  Cloud Computing  Business Process Insight  Semantic Scene Model  
Toward Secure Image Denoising: A Machine Learning Based Realization Conference paper
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, Calgary, CANADA, APR 15-20, 2018
Authors:  Zheng Y.;  Wang C.;  Zhou J.
Favorite | View/Download:16/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/12/22
Cloud Computing  Image Denoising  Machine Learning  Neural Network  Privacy  
Adaptive Incremental Genetic Algorithm for Task Scheduling in Cloud Environments Journal article
SYMMETRY-BASEL, 2018,Volume: 10,Issue: 5
Authors:  Duan, Kairong;  Fong, Simon;  Siu, Shirley W. I.;  Song, Wei;  Guan, Steven Sheng-Uei
Favorite | View/Download:18/0 | TC[WOS]:2 TC[Scopus]:0 | Submit date:2018/10/30
cloud computing  Infrastructure as a Service  genetic algorithm  task scheduling  
Load balancing oriented computation offloading in mobile cloudlet Conference paper
IEEE Vehicular Technology Conference, Toronto, CANADA, SEP 24-27, 2017
Authors:  Yao D.;  Gui L.;  Hou F.;  Sun F.;  Mo D.;  Shan H.
Favorite | View/Download:14/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/03/01
Robust GA Based Global Path Planning for IoP Oriented Mobil Robot Conference paper
2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION, Guangzhou, China, 8-12 Oct. 2018
Authors:  Ruidong Xi;  Zhixin Yang;  Lulu Tang;  Zhigang Wang
Favorite | View/Download:9/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/04/02
Learning Combinatorial Global and Local Features on 3D Point Clouds Conference paper
2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), Guangzhou, China, 8-12 Oct. 2018
Authors:  Luqing Luo;  Lulu Tang;  Zhi-Xin Yang
Favorite | View/Download:14/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/04/02
Noise-robust SLIC superpixel for natural images Conference paper
Proceedings - 2016 7th International Conference on Cloud Computing and Big Data, CCBD 2016, Macau, PEOPLES R CHINA, NOV 16-18, 2016
Authors:  Dong L.;  Zhou J.
Favorite | View/Download:9/0 | TC[WOS]:4 TC[Scopus]:0 | Submit date:2018/12/22
Noise  Robust  Slic  Superpixel  
Privacy-Preserving Image Denoising from External Cloud Databases Journal article
IEEE Transactions on Information Forensics and Security, 2017,Volume: 12,Issue: 6,Page: 1285-1298
Authors:  Zheng Y.;  Cui H.;  Wang C.;  Zhou J.
Favorite | View/Download:11/0 | TC[WOS]:13 TC[Scopus]:0 | Submit date:2018/12/22
Cloud Computing  External Database  Image Denoising  Privacy  Security  
Prometheus: online estimation of optimal memory demands for workers in in-memory distributed computation Conference paper
PROCEEDINGS OF THE 2017 SYMPOSIUM ON CLOUD COMPUTING (SOCC '17), Santa Clara, CA, SEP 24-27, 2017
Authors:  Guoyao Xu;  Cheng-Zhong Xu
Favorite | View/Download:13/0 | TC[WOS]:1 TC[Scopus]:0 | Submit date:2019/05/09
Memory Demands Estimation  Resource Efficiency  Performance  Spark  Yarn  
Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique Conference paper
2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015, Orlando, FL, DEC 13-16, 2015
Authors:  Li Y.;  Zhou J.;  Li Y.;  Au O.C.
Favorite | View/Download:5/0 | TC[WOS]:2 TC[Scopus]:0 | Submit date:2018/12/22
Ciphertext Expansion  Homomorphic Encryption  Linear Interpolation