<<

2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC 2017)

Guangzhou,

12-15 December 2017

Pages 1-721

IEEE Catalog Number: CFP17IUC-POD ISBN: 978-1-5386-3791-3

1/2

Copyright © 2017 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved

Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.

For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved.

*** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version.

IEEE Catalog Number: CFP17IUC-POD ISBN (Print-On-Demand): 978-1-5386-3791-3 ISBN (Online): 978-1-5386-3790-6

Additional Copies of This Publication Are Available From:

Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com

2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications ISPA/IUCC 2017

Table of Contents

Welcome Message from the ISPA 2017 General Chairs xxYiLL Welcome Message from the ISPA 2017 Program Chairs xxLx Welcome Message from the IUCC 2017 General Chairs xxx Welcome Message from the IUCC 2017 Program Chairs xxxi ISPA 2017 Organizing and Program Committees xxxii IUCC 2017 Organizing and Program Committees xxxYiLL

15th International Symposium on Parallel and Distributed Processing with Applications (ISPA 2017)

Track 1: Systems and Architectures

Regular Papers

Toward Complex Search for Encrypted Cloud Data via Blind Index Storage 1 Yupeng Hu ( University), Wenjia Li (New York Institute of Technology), Mengyi Ma (), Na Cao (Hunan University), Yonghe Liu (University of Texas-Arlington), Zheng Qin (Hunan University), and Jia Wang ( of Defense Technology) Cooperative Game Approach for Energy-Aware Load Balancing in Clouds 9 Bo Yang (Hunan University), Zhiyong Li (Key Laboratory for Embedded and Network Computing of Hunan Province), and Shilong Jiang (PKU-HKUST -HongKong Institution) A Lightweight Privacy Aware Friend Locator in Mobile Social Networks 17 Tao Peng ( University), Qin Liu (Hunan University), Guojun Wang (), and Jianer Chen (Guangzhou University)

v A Routing Scheme for Software-Defined Satellite Network 24 Linlin Zhang (NorthEastern University), Xingwei Wang (NorthEastern University), Min Huang (NorthEastern University), and Shuang Xu (NorthEastern University) An Efficient Scheduling Algorithm for Energy Consumption Constrained Parallel Applications on Heterogeneous Distributed Systems 32 Jinlin Song (Hunan University), Guoqi Xie (Hunan University), Renfa Li (Hunan University), and Xiaoming Chen (Hunan University) Popularity and Cost Aware Energy-Balanced Strategy for Named Data Wireless Ad-Hoc Networks 40 Kai Lei (), Mingye Bao (Peking University), Yi Wang (Southern University of Science and Technology), and Dong Lin (Network Technology Lab) An Efficient Hardware Prefetcher Exploiting the Prefetch Potential of Long-Stride Access Pattern on Virtual Address 48 Teng Tian (University of Science and Technology of China), Tianqi Wang (University of Science and Technology of China), and Xi Jin (University of Science and Technology of China) Persisting Memcached with VM Memory Snapshot 58 Dingding Li (South China Normal University), Xiaojia Tian (South China Normal University), Sihua Huang (South China Normal University), Hai Liu (South China Normal University), Yong Tang (South China Normal University), and Deze Zeng (China University of Geosciences) Online Algorithm for Secure Task Offloading in Dynamic Networks 66 Yuchong Luo ( University of Technology), Jigang Wu (Guangdong University of Technology), Zikai Zhang (Guangdong University of Technology), Wenjun Shi ( Polytechnic University), and Yuqing Miu ( University of Electronic Technology) An Adaptive Priority-Based Heuristic Approach for Scheduling DAG Applications with Uncertainties 72 Wei Zheng (), Xinbo Zhang (Xiamen University), Lu Tang (Chinese University of Hongkong), Dongzhan Zhang (Xiamen Unversity), and Jinjun Chen (Swinburne University of Technology) Optimization of Virtual Resources Provisioning for Cloud Applications to Cope with Traffic Burst 80 Lei Yang (Hunan University), Ying Feng (Hunan University), and Kenli Li (Hunan University) An Immune-Based Optimization Algorithm of Multi-Tenant Resource Allocation for Geo-Distributed Data Centers 88 Yazhen Song (), Jun Peng (Central South University), Weirong Liu (Central South University), Xiaoyong Zhang (Central South University), Xin Gu (Central South University), and Wentao Yu (Central South University of Forestry and Technology) Packet Classification Using Community Detection 94 Guo Li (Hunan University), Dafang Zhang (Hunan University), and Yanbiao Li (Hunan University) Cssp: The Consortium Blockchain Model for Improving the Trustworthiness of Network Software Services 101 Lei Zhou (Central South University), Guojun Wang (Guangzhou University), Tongshuai Cui (Central South University), and Xiaofei Xing (Guangzhou University)

vi QoS-Oriented Capacity Provisioning in Storage Clusters by Modeling Workload Patterns 108 Cheng Hu () and Yuhui Deng (Chinese Academy of Sciences) Target Coverage-Aware Clustering for Directional Sensor Networks 116 Selina Sharmin (University of Dhaka), Fernaz Narin Nur (University of Dhaka), Md. Abdur Razzaque (University of Dhaka), and Md. Mustafizur Rahman (University of Dhaka) Quality-Aware Directional MAC Protocol for Multi-Channel Wireless Sensor Networks 121 Fernaz Narin Nur (University of Dhaka), Selina Sharmin (University of Dhaka), Md. Abdur Razzaque (University of Dhaka), and Md. Shariful Islam (University of Dhaka) On the Vulnerabilities of Landmark-Based Data Location Approaches: Threats, Solutions, and Challenges 127 Malik Irain (IRIT), Jacques Jorda (IRIT), and Zoubir Mammeri (IRIT) BINARY: A Bandwidth Variation Pattern-Aware Rate Adaptation for HTTP Adaptive Streaming over 4G Cellular Network 135 Haipeng Du (Xi'an Jiaotong University), Qinghua Zheng (Xi'an Jiaotong University), Weizhan Zhang (Xi'an Jiaotong University), and Xiang Gao (Xi'an Jiaotong University) Laius: An 8-Bit Fixed-Point CNN Hardware Inference Engine 143 Zhisheng Li (National University of Defense Technology), Lei Wang (National University of Defense Technology), Shasha Guo (National University of Defense Technology), Yu Deng (National University of Defense Technology), Qiang Dou (National University of Defense Technology), Haifang Zhou (National University of Defense Technology), and Wenyuan Lu (Xi'an Satellite Monitoring and Control Center) A Channel-Aware Expected Energy Consumption Minimization Strategy in Wireless Networks 151 Gaocai Wang (Guangzi University), Nao Wang (Guangzi University), Tianxiao Xie ( University), and Fangsu Wang () A Routing Strategy with Energy Optimization Based on Community in Mobile Social Networks 159 Gaocai Wang (Guangzi University), Ying Peng (Guangxi University), Nao Wang (Guangzi University), and Taoshen Li (Guangzi University) QoS Promotion for Energy-Efficient Datacenters by Regulating Overloaded Workloads 167 Cheng Hu (Jinan University) and Yuhui Deng (Jinan University & Chinese Academy of Sciences) A Rate-Based Multipath-Aware Congestion Control Mechanism in Named Data Networking 174 Shangru Zhong (Peking University), Yongbin Liu (Peking University), Junmao Li (Peking University), and Kai Lei (Peking University) Detecting Influential Nodes Incrementally and Evolutionarily in Online Social Networks 182 Jingjing Wang (Hunan University), Wenjun Jiang (Hunan University), Kenli Li (Hunan University), and Keqin Li (State University of New York) A Privacy-Aware Conceptual Framework for Coordination 190 Haroon Elahi (Guangzhou University), Guojun Wang (Guangzhou University), and Wei Zhang (Guangzhou University)

vii MCS-B: An Energy Efficient Storage System for Astronomical Observation Data Based on Logical Block Replacement Strategy 198 Chao Sun (), Shanjiang Tang (Tianjin University), Zichao Yuan (Tianjin University), Ce Yu (Tianjin University), Jian Xiao (Tianjin University), Jizhou Sun (Tianjin University), and Shuibing He () Power Consumption Optimization for Deadline-Constrained Workflows in Cloud Data Center 206 Chi Zhang (Dalian University of Technology), YuXin Wang (Dalian University of Technology), Zhen Feng (State Key Laboratory of High-end Server & Storage Technology), and He Guo (Dalian University of Technology) A Quantified Forwarding Strategy in NDN by Integrating Ant Colony Optimization into MADM 214 Ye Zhang (Peking University), Jiawei Wang (Peking University), Lirui Gong (Peking University), Jie Yuan (Peking University), and Kai Lei (Peking University) Electro: Toward QoS-Aware Power Management for Latency-Critical Applications 221 Yanchao Lu ( Jiao Tong University), Quan Chen (Shanghai Jiao Tong University), Yao Shen (Shanghai Jiao Tong University), and Minyi Guo (Shanghai Jiao Tong University) An Approach of Spatial Usage Optimization for NVM-Based Storage System 229 Zheng Zhang (Huazhong University of Science and Technology), Dan Feng (Huazhong University of Science and Technology), Zhipeng Tan (Huazhong University of Science and Technology), Jianxi Chen (Huazhong University of Science and Technology), Wei Zhou (Huazhong University of Science and Technology), Jianquan Zhang (Huazhong University of Science and Technology), and Laurence T Yang (St. Francis Xavier University) Fast Communication-Aware Virtual Machine Dynamic Consolidation for Cloud Data Center 237 Guangyi Cao (Wuhan University of Technology), Changshu Zhang (Rocket Software), and Wei Liu (Wuhan University of Technology) Energy Optimization for Task Offloading Based on Auction Mechanism in Ad Hoc Mobile Cloud 245 Lan Li (Central South University), Jun Peng (Central South University), Weirong Liu (Central South University), Fu Jiang (Central South University), and Shuo Li (Changsha University of Science and Technology) EEC-Dedup: Efficient Erasure-Coded Deduplicated Backup Storage Systems 251 Wenxiang Chen (Huazhong University of Science and Technology), Yuchong Hu (Huazhong University of Science and Technology), Siyang Yin (Huazhong University of Science and Technology), and Wen Xia (Sangfor Technologies Co.) Performance Analysis of Full-Duplex D2D Communications in Multi-Tier Heterogeneous Wireless Networks 259 Shaoqi Xia ( University of Aeronautics and Astronautics), Bing Chen ( of Aeronautics and Astronautics), Kun Zhu (Nanjing University of Aeronautics and Astronautics), Xiangping Zhai (Nanjing University of Aeronautics and Astronautics), and Shimin Gong (Shenzhen Institutes of Advanced Technology)

viii Optimal Cache Management and Routing for Secure Content Delivery in Information-Centric Networks with Network Coding 267 Weiwei Ding (Soochow University), Jin Wang (Soochow University), Kejie Lu (University of Puerto Rico at Mayaguez), Ruimin Zhao (Soochow University), Xiumin Wang (South China University of Technology), and Yanqin Zhu (Soochow University) OTR: A Fine-Grained Dynamic Power Scaling Pipeline Based on Trace 275 Sijiang Fan (National University of Defense Technology), Jiawei Fei (National University of Defense Technology), Ximing He (National University of Defense Technology), Li Shen (National University of Defense Technology), and Zhiying Wang (National University of Defense Technology) An Adjustable Model in Data Collection Scenario for WSN 282 Dongchao Ma (North China University of Technology), Cancan Zhang (North China University of Technology), Xingguo Sun (North China University of Technology), and Li Ma (North China University of Technology) Edge Cloud Capacity Allocation for Low Delay Computing on Mobile Devices 290 Can Wang (State Key Laboratory for Novel Software Technology), Sheng Zhang (State Key Laboratory for Novel Software Technology), Huyin Zhang (Wuhan University), Zhuzhong Qian (State Key Laboratory for Novel Software Technolog), and Sanglu Lu (State Key Laboratory for Novel Software Technology) EGS: An Effective Global I/O Scheduler to Improve the Load Balancing of SSD-Based RAID-5 Arrays 298 Yanjun Lu (Shanghai Jiao Tong University), Chentao Wu (Shanghai Jiao Tong University), and Jie Li (Shanghai Jiao Tong University) An Efficient Framework for Target Search with Cooperative UAVs in a FANET 306 Xianfeng Li (Peking University) and Jie Chen (Peking University) iSpot: Achieving Predictable Performance for Big Data Analytics with Cloud Transient Servers 314 Fei Xu (East China Normal University), Huan Jiang (East China Normal University), Haoyue Zheng (East China Normal University), and Wujie Shao (East China Normal University) Further Exploit the Potential of I/O Forwarding by Employing File Striping 322 Jie Yu (National University of Defense Technology), Guangming Liu (National University of Defense Technology & National Supercomputer Centre in Tianjin), Wenrui Dong (National University of Defense Technology), Xiaoyong Li (Academy of Ocean Science and Engineering), Yusheng Liu (National University of Defense Technology), Bin Xu (National Supercomputer Centre in Tianjin), Yuqi Li (National Supercomputer Centre in Tianjin), and Qingzhen Ma (National Supercomputer Centre in Tianjin) HOTIS: A Hot Data Identification Scheme to Optimize Garbage Collection of SSDs 331 Junqing Gu (Shanghai Jiao Tong University), Chentao Wu (Shanghai Jiao Tong University), and Jie Li (Shanghai Jiao Tong University)

ix Pattern-Aware Reliable Virtual Network Function Chain Deployment 335 Xin Zhang (State Key Laboratory for Novel Software Technology), Zhuzhong Qian (State Key Laboratory for Novel Software Technology), Sheng Zhang (State Key Laboratory for Novel Software Technology), and Sanglu Lu (State Key Laboratory for Novel Software Technology) LBFM: Multi-Dimensional Membership Index for Block-Level Data Skipping 343 Yong Wang (Institute of Information Engineering), Xiaochun Yun (CNCERT/CC), Xi Wang (Institute of Information Engineering), Shupeng Wang (Institute of Information Engineering), and Yongshang Wu (Nanjing University) HDSVM: A High Efficiency Distributed SVM Framework over Data Stream 352 Yan Hou (National Laboratory for Parallel and Distributed Processing), Yijie Wang (National Laboratory for Parallel and Distributed Processing), Xingkong Ma (National Laboratory for Parallel and Distributed Processing), and Li Cheng (National Laboratory for Parallel and Distributed Processing) Multi-Path Routing for Energy Efficient Mobile Offloading in Software Defined Networks 360 Haixiang Hou (Services Computing Technology and System Lab), Hai Jin (Services Computing Technology and System Lab), Xiaofei Liao (Services Computing Technology and System Lab), and Deze Zeng (China University of Geosciences) A New Architecture for Anonymous Use of Services in Distributed Computing Networks 368 Yuxiang Ma (Computer Network Information Center), Yulei Wu (University of Exeter), Jingguo Ge (Institute of Information Engineering), and Jun Li (Computer Network Information Center) Deployment Mechanism Design for Cost-Effective Data Uploading in Delay-Tolerant Crowdsensing 375 Chao Song (University of Electronic Science and Technology of China), Jiqing Gu (University of Electronic Science and Technology of China), and Ming Liu (University of Electronic Science and Technology of China) An Efficient Racetrack Memory-Based Processing-in-Memory Architecture for Convolutional Neural Networks 383 Bicheng Liu (Shanghai Key Laboratory of Trustworthy Computing), Shouzhen Gu (Shanghai Key Laboratory of Trustworthy Computing), Mingsong Chen (Shanghai Key Laboratory of Trustworthy Computing), Wang Kang (Fert Institute), Jingtong Hu (University of Pittsburgh), Qingfeng Zhuge (Shanghai Key Laboratory of Trustworthy Computing), and Edwin H.-M. Sha ( University)

Short Papers

OPTZ: a Hardware Isolation Architecture of Multi-Tasks Based on TrustZone Support 391 Hongjun Dai ( University) and Kang Chen () A High-Performance Accelerator for Floating-Point Matrix Multiplication 396 Xun Jia (State Key Laboratory of Mathematical Engineering and Advanced Computing), Guiming Wu (State Key Laboratory of Mathematical Engineering and Advanced Computing), and Xianghui Xie (State Key Laboratory of Mathematical Engineering and Advanced Computing)

x A Modular Abstract Framework for Devising Optimized RSMs Based on Load Distribution 403 Yingyi Yang (Guangdong Power Grid Corporation), Ming Nie (Guangdong Power Grid Corporation), and Ke Wang (Guangdong Power Grid Corporation) Blockchain-Based Security Architecture for Distributed Cloud Storage 408 Jiaxing Li (Guangdong University of Technology), Zhusong Liu (Guangdong University of Technology), Long Chen (Guangdong University of Technology), Chen (Guangdong University of Technology), and Jigang Wu (Guangdong University of Technology) An Energy Efficient Virtual Machine Placement Algorithm Based on Graph Partitioning in Cloud Data Center 412 Wenbin Yao (Beijing University of Posts and Telecommunications), Zhen Guo (Beijing University of Posts and Telecommunications), and Dongbin Wang (Beijing University of Posts and Telecommunications) Efficient Decentralized Attribute-Based Encryption with Outsourced Computation for Mobile Cloud Computing 417 Jiaye Shao (Soochow University), Yanqin Zhu (Soochow University), and Qijin Ji (Soochow University) Joint Optimization of Spectrum Sensing and Energy Harvesting for Cognitive Radio Network 423 Fu Jiang (Central South University), Wenni Yi (Central South University), Shuo Li (Changsha University of Science and Technology), Baolin Zhu (Central South University), and Wentao Yu (Central South University of Forestry and Technology) Secure Beamforming Design with Bidirectional Secondary Transmissions in Wireless-Powered Cognitive Radio Networks 428 Kun Tang (Central South University), Ronghua Shi (Central South University), and Entao Luo (Central South University) TDAG: A Tunable Distributed Data Processing Model for Data Stream 433 Jintao Tang (Institute of Advanced Computing Technology), Xuelian Lin (Institute of Advanced Computing Technology), Yang Shen (Institute of Advanced Computing Technology), and Tianyu Wo (Institute of Advanced Computing Technology) Fine-Grained Data Committing for Persistent Memory 438 Tianyue Lu (Institute of Computing Technology), Yuhang Liu (Institute of Computing Technology), and Mingyu Chen (Institute of Computing Technology) The Improved Earliest Deadline First with Virtual Deadlines Mixed-Criticality Scheduling Algorithm 444 Xuejing Zhao (), Yehua Wei (Hunan Normal University), and Wenjia Li (New York Institute of Technology) Assessment of Reduction of Quality Attacks on Mobile IP Networks 449 Gang Yu (), Tao Li (Nankai University), Jinmao Wei (Nankai University), and Chunbo Liu (Civil Aviation University of China)

xi Rethinking Energy-Efficiency of Heterogeneous Computing for CNN-Based Mobile Applications 454 Zhen Wang (University of Science and Technology of China), Xi Li (University of Science and Technology of China), Chao Wang (University of Science and Technology of China), Zhinan Cheng (University of Science and Technology of China), Jiachen Song (University of Science and Technology of China), and Xuehai Zhou (University of Science and Technology of China) Author Influence Spreading Prediction Based on Co-Citation Interest Similarity 459 Ning Chang (Central South University), Fang Huang (Central South University), Yuchen Zhang (Central South University), Xiangqian Wang (Central South University), and Wencong Wan (Central South University) Dynamic Detection of Academic Team Communities Based on Temporal Coauthor Network 464 Wencong Wan (Central South University), Fang Huang (Central South University), Xiangqian Wang (Central South University), Yuchen Zhang (Central South University), and Chengyuan Zhang (Central South University) SmartVM: A Multi-Layer Microservice-Based Platform for Deploying SaaS 470 Xi Zheng (Shenzhen Key Lab of Computational Intelligence), Jiaojiao Jiang (Swinburne University of Technology), Yuqun Zhang (Shenzhen Key Lab of Computational Intelligence), Yao Deng (Deakin University), Min Fu (Macquarie University & CSIRO), Tianlei Zheng (University of Melbourne), and Xiao Liu (Deakin University) A Novel Optimization Technique for Mastering Energy Consumption in Cloud Data Center 475 Omar Ben Maaouia (LATICE), Hazem Fkaier (LATICE), Mohamed Jemni (LATICE), and Christophe Cerin (LIPN/UMR 7030 CNRS/Université Paris 13) A Fog-Based Hierarchical Trust Mechanism for Sensor-Cloud Underlying Structure 481 Guangxue Zhang (Huaqiao University), Tian Wang (Huaqiao University), Md. Zakirul Alam Bhuiyan (Fordham University), and Guojun Wang (Guangzhou University)

Posters

A Workload-Specific Memory Capacity Configuration Approach for In-Memory Data Analytic Platforms 486 Yi Liang (Beijing University of Technology), Shilu Chang (Beijing University of Technology), and Chao Su (Beijing University of Technology) Energy-Efficient Cache Management for NVM-Based IoT Systems 491 Yuanchao Xu (Capital Normal University & Institute of Computing Technology), Lu Yang (Capital Normal University), Zeyi Hou (Capital Normal University), Qirun Huo (Capital Normal University), and Keni Qiu (Capital Normal University) Rio: Fast B+-Tree Based on Remote Accessible Non-Volatile Memory 494 Songping Yu (National University of Defense Technology), Nong Xiao (National University of Defense Technology), Mingzhu Deng (National University of Defense Technology), Yuxuan Xing (National University of Defense Technology), Fang Liu (National University of Defense Technology), and Wei Chen (National University of Defense Technology)

xii

Track 2: Technologies and Tools

Regular Papers

Pattern Learning Based Parallel Ant Colony Optimization 497 Xiaotian Jin (Wuhan University of Technology), Wenbo Zheng (Xi'an Jiaotong University), Shaocong Mo (Wuhan University of Technology), Yili Qu (Sun Yat-Sen University), Xin Jin (Huazhong University of Science and Technology), Jiangwei Zhou (Huazhong University of Science and Technology), Pengfei Duan (Wuhan University of Technology), and Tao Zheng (School of Foreign Languages) Secure Cloud Computing: Communication Protocol for Multithreaded Fully Homomorphic Encryption for Remote Data Processing 503 Alexander Oppermann (Physikalisch-Technische Bundesanstalt), Federico Grasso_Toro (Physikalisch-Technische Bundesanstalt), Artem Yurchenko (Physikalisch-Technische Bundesanstalt), and Jean-Pierre Seifert (Technische Universität Berlin) An Efficient Parallelization Approach for Large-Scale Sparse Non-Negative Matrix Factorization Using Kullback-Leibler Divergence on Multi-GPU 511 Hao Li (Hunan University), Kenli Li (Hunan University), Jiwu Peng (Hunan University), Junyan Hu (Hunan University), and Keqin Li (Hunan University) Fault-Driven Reconfiguration Algorithm for Processor Arrays 519 Yalan Wu (Guangdong University of Technology), Jigang Wu (Guangdong University of Technology), Yuqing Miu (Guilin University of Electronic Technology), and Thambipillai Srikanthan (Nanyang Technological University) Preemption-Aware Kernel Scheduling for GPUs 525 Sihuizi Jin (Shanghai Jiao Tong University), Zhenning Wang (Shanghai Jiao Tong University), Quan Chen (Shanghai Jiao Tong University), and Minyi Guo (Shanghai Jiao Tong University) An Optimization and Auto-Tuning Method for Scale-Free Graph Algorithms on SIMD Architectures 533 Jie Lin (National University of Defense Technology), Yusong Tan (National University of Defense Technology), Qingbo Wu (National University of Defense Technology), Xiaoling Li (National University of Defense Technology), Jie Yu (National University of Defense Technology), and Qi Zhang (National University of Defense Technology) Dynamic Load Balancing and Channel Strategy for Apache Flume Collecting Real-Time Data Stream 542 Buqing Shu (Shanghai Jiao Tong University), Haopeng Chen (Shanghai Jiao Tong University), and Meng Sun (Shanghai Jiao Tong University) RWADMM: Routing and Wavelength Assignment for Distribution-Based Multiple Multicasts in ONoC 550 Wen Yang (University of Otago), Yawen Chen (University of Otago), Zhiyi Huang (University of Otago), and Haibo Zhang (University of Otago)

xiii Topology-Aware VM Placement for Network Optimization in Cloud Data Centers 558 Zhen Lian (Nanjing University of Aeronautics and Astronautics), Xin Li (Nanjing University of Aeronautics and Astronautics), and Xiaolin Qin (Nanjing University of Aeronautics and Astronautics) High Speed Network Super Points Detection Based on Sliding Time Window by GPU 566 Jie Xu (), Wei Ding (Southeast University), Jian Gong (Southeast University), Xiaoyan Hu (Southeast University), and Jie Liu (Southeast University) Building a Game Benchmark for Cooperative CPU-GPU with Pseudo User-Interaction 574 Zhen Wang (University of Science and Technology of China), Zhinan Cheng (University of Science and Technology of China), Xi Li (University of Science and Technology of China), Chao Wang (University of Science and Technology of China), Xianglan Chen (University of Science and Technology of China), and Xuehai Zhou (University of Science and Technology of China) Exploiting Aperiodic Server to Improve Aperiodic Responsiveness for LET-Based Real-Time Systems 582 Bo Wan (University of Science and Technology of China), Xi Li (University of Science and Technology of China), Haizhao Luo (University of Science and Technology of China), Beilei Sun (University of Science and Technology of China), Chao Wang (University of Science and Technology of China), Xianglan Chen (University of Science and Technology of China), and Xuehai Zhou (University of Science and Technology of China) Distributed Anomaly Detection Algorithm for Spatio-Temporal Trajectories of Vehicles 590 Liping Lu (Wuhan University of Technology), Hao Cheng (Wuhan University of Technology), Shengwu Xiong (Wuhan University of Technology), Pengfei Duan (Wuhan University of Technology), and Yuan Xiao (Wuhan University of Technology) A Dataflow-Based Runtime Support on a 100P Actual System 599 Zhichao Su (University of Science and Technology of China), Junshi Chen (University of Science and Technology of China), Han Lin (University of Science and Technology of China), Hong An (University of Science and Technology of China), Wenting Han (University of Science and Technology of China), Yang Yu (University of Science and Technology of China), Chenzhi Liao (University of Science and Technology of China), and Yong Chen (Texas Tech University) A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy 607 Fang Qi (Central South University), Ke Li (Central South University), and Zhe Tang (Central South University) Implementation and Optimization of the Accelerator Based on FPGA Hardware for LSTM Network 614 Yiwei Zhang (University of Science and Technology of China), Chao Wang (University of Science and Technology of China), Lei Gong (University of Science and Technology of China), Yuntao Lu (University of Science and Technology of China), Fan Sun (University of Science and Technology of China), Chongchong Xu (University of Science and Technology of China), Xi Li (University of Science and Technology of China), and Xuehai Zhou (University of Science and Technology of China)

xiv A High-Performance Accelerator for Large-Scale Convolutional Neural Networks 622 Fan Sun (University of Science and Technology of China), Chao Wang (University of Science and Technology of China), Lei Gong (University of Science and Technology of China), Chongchong Xu (University of Science and Technology of China), Yiwei Zhang (University of Science and Technology of China), Yuntao Lu (University of Science and Technology of China), Xi Li (University of Science and Technology of China), and Xuehai Zhou (University of Science and Technology of China) A Speculative Parallel Intrusion Prevention System Based on Apache Spark 630 Zhoukai Wang (Xi’an Jiaotong University), Yinliang Zhao (Xi’an Jiaotong University), Zhaorong Wang (Xi’an Jiaotong University), and Yuxiang Li (Xi’an Jiaotong University) BAHS: A Bandwidth-Aware Heterogeneous Scheduling Approach for SDN-Based Cluster Systems 638 Jingyun Shen (Shanghai Jiao Tong University), Zheng Luo (Shanghai Jiao Tong University), Chentao Wu (Shanghai Jiao Tong University), and Jie Li (Shanghai Jiao Tong University) Parallel Computing in DNNs Using CPU and MIC 646 Sijiang Fan (National University of Defense Technology), Shiqing Zhang (National University of Defense Technology), Ximing He (National University of Defense Technology), Jiawei Fei (National University of Defense Technology), Li Shen (National University of Defense Technology), and Zhiying Wang (National University of Defense Technology) Distributed Fine-Grained Secure Control of Smart Actuators in Internet of Things 653 Djamel Eddine Kouicem (Sorbonne Universités), Bouabdallah Abdelmadjid (Sorbonne Universités), and Lakhlef Hicham (Sorbonne Universités) Clustering Boundary Cutting for Packet Classification Based on Distribution Density 661 Xia-an Bi (Hunan Normal University), Yanwen Zhou (Hunan Normal University), and Jianping Yu (Hunan Normal University) An Effective Reliability Goal Assurance Method Using Geometric Mean for Distributed Automotive Functions on Heterogeneous Architectures 667 Na Yuan (Hunan University), Guoqi Xie (Hunan University), Renfa Li (Hunan University), and Xiaoming Chen (Hunan University) Classification Framework for the Parallel Hash Join with a Performance Analysis on the GPU 675 Kinga Anna Wozniak (University of Vienna) and Erich Schikuta (University of Vienna) Load Balancing for Minimizing Deadline Misses and Total Runtime for Connected Car Systems in Fog Computing 683 Yu-An Chen (University of Southern California), John Paul Walters (Information Sciences Institute), and Stephen P. Crago (Information Sciences Institute) ABP Scheduler: Speeding Up Service Spread in Docker Swarm 691 Ye Wu (Shanghai Jiao Tong University) and Haopeng Chen (Shanghai Jiao Tong University) Parallel Skyline Computation for Partially Ordered Domains 699 Bo Yin (Changsha University of Science and Technology) and Ke Gu (Changsha University of Science and Technology)

xv Tickwerk: Design of a LET-Based SoC for Temporal Programming 707 Haizhao Luo (University of Science and Technology of China), Xi Li (University of Science and Technology of China), Bo Wan (University of Science and Technology of China), Guixing Wu (University of Science and Technology of China), Xianglan Chen (University of Science and Technology of China), and Chao Wang (University of Science and Technology of China) Automatically Semantic Annotation of Network Document Based on Domain Knowledge Graph 715 Yuezhong Wu (Hunan University of Technology), Zhihong Wang (East China University of Science and Technology), Shuhong Chen (Guangzhou University), Guojun Wang (Guangzhou University), and Changyun Li (Intelligent Information Perception and Processing Technology Hunan Province Key Laboratory) Introduction of Improved Repairing Locality into Secret Sharing Schemes with Perfect Security 722 Yue Fu (Peking University), Shuhao Sun (Peking University), Dagang Li (Peking University), and Peng Liu (Hangzhou Dianzi University) An Adaptive Filtration Based Defense Framework against Ddos 729 Jian Zhang Zhang (Central South University), Xiaxia Zhou Zhou (Central South University), Wei Zhang Zhang (Central South University), Qidi Liang Liang (Central South University), and Fengtao Xiang Xiang (University of Defense Technology) Virtual Machine Migration Scheme Based on Score Matrix in Data Centers 737 Luxiu Yin (Hunan University), Juan Luo (Hunan University), Song Zhang (Hunan University), and Zhangwei Yang (Pingxiang University) Automated Performance Modeling Based on Runtime Feature Detection and Machine Learning 744 Jingwei Sun (University of Science and Technology of China), Shiyan Zhan (University of Science and Technology of China), Guangzhong Sun (University of Science and Technology of China), and Yong Chen (Texas Tech University) An Adaptive Android Security Extension against Privilege Escalation Attacks 752 Yang Xu (Central South University), Guojun Wang (Guangzhou University), Ju Ren (Central South University), and Yaoxue Zhang (Central South University) Efficient and Customizable Top-k Query on Named Data Networking 761 Zhuhua Liao (Hunan University of Science and Technology), Zengde Teng (Hunan University of Science and Technology), Jian Zhang (Hunan University of Science and Technology), Yizhi Liu (Hunan University of Science and Technology), and Jianxun Liu (Hunan University of Science and Technology) Parallel Symbolic Observation Graph 770 Hiba Ouni (Faculty of Sciences of Tunis), Kais Klai (University of Paris 13), Chiheb Ameur Abid (Faculty of Sciences of Tunis), and Belhassen Zouari (Mediatron Lab) A Flexible Communication Mechanism for Pipeline Parallelism 778 Junchang Wang (Nanjing University of Posts and Telecommunications), Yangfeng Tian (Nanjing University of Posts and Telecommunications), Tao Li (Nanjing University of Posts and Telecommunications), and Xiong Fu (Nanjing University of Posts and Telecommunications)

xvi ECCount: Efficient and Consistent Counter for High-Speed Network Devices 786 Junchang Wang (Nanjing University of Posts and Telecommunications), Wen He (Nanjing University of Posts and Telecommunications), Ningning Zhou (Nanjing University of Posts and Telecommunications), Tao Li (Nanjing University of Posts and Telecommunications), and Xiong Fu (Nanjing University of Posts and Telecommunications) Efficient Task Assignment and Scheduling on MPSOC with STT-RAM Based Hybrid SPMs Considering Data Allocation 794 Weiwei Feng (Shanghai Key Laboratory of Trustworthy Computing), Shouzhen Gu (Shanghai Key Laboratory of Trustworthy Computing), Yanqin Yang (China East China Normal University), Qingfeng Zhuge (China East China Normal University), and Edwin H.-M. Sha (China )

Short Papers

Markov Fluid Queue Model for Rechargeable Sensor Nodes with Abnormal Death 801 Ping Zhong (Central South University), Yiwen Zhang (Central South University), Jianliang Gao (Central South University), Yiming Zhang (National University of Defense Technology), and Jize Yan (University of Southampton) Scheduling and Resource Management Allocation System Combined with an Economic Model 807 Tarek Menouer (LIPN Laboratory) and Christophe Cérin (LIPN Laboratory) A Novel N-Retry Transactional Memory Model for Multi-Thread Programming 814 Kun Lu (), Changhao Yan (Fudan University), Hai Zhou (Northwestern University), Dian Zhou (University of Texas at Dallas), and Xuan Zeng (Fudan University) A Safe and Reliable Anti-Lock Wheel Control with Enhanced Forgotten Factor for Brake Operation of Heavy Train 822 Shuai Zhang (Central South University), Zhiwu Huang (Central South University), Yingze Yang (Central South University), Kai Gao (Changsha University of Science and Technology), and Cong Zhu (Central South University) Research on CPN Model Reduction Focus on Parallel Tested Behaviors 827 Tao Sun ( University), Wei Zhang (Inner Mongolia University), Xin Guo (Inner Mongolia University), and Xiaoyun Wan (Inner Mongolia University) Job Scheduling Optimization of High Performance Computing in Biological Gene Sequencing Based on Workload Analysis 834 Xiaofei Wu (Guangdong Key Laboratory of Communication and Computer Network), Shoubin Dong (Guangdong Key Laboratory of Communication and Computer Network), Liyun Zuo (Guangdong Key Laboratory of Communication and Computer Network), and Yizhen Sun (Guangdong Key Laboratory of Communication and Computer Network) FPGA-Accelerated for Constrained High Dispersal Network 840 Yanliang Chen (East China Normal University), Minghua Zhu (East China Normal University), Bo Xiao (East China Normal University), and Dan Meng (East China Normal University)

xvii Energy Efficient Resource Management and Task Scheduling for IoT Services in Edge Computing Paradigm 846 Songyuan Li (Beijing University of Posts and Telecommunications) and Jiwei Huang (Beijing University of Posts and Telecommunications) Delay Compensated Asynchronous Adam Algorithm for Deep Neural Networks 852 Naiyang Guan (National University of Defence Technology), Lei Shan (National University of Defence Technology), Canqun Yang (National University of Defence Technology), Weixia Xu (National University of Defence Technology), and Minxuan Zhang (National University of Defence Technology) Implementing and Evaluating OpenCL on an ARMv8 Multi-Core CPU 860 Jianbin Fang (Software Institute), Peng Zhang (Software Institute), Tao Tang (Software Institute), Chun Huang (Software Institute), and Canqun Yang (Software Institute) A Greedy-Genetic Local-Search Heuristic for the Traveling Salesman Problem 868 Mohammad Harun Rashid (Pace University) and Miguel A. Mosteiro (Pace University) Study on Energy Consumption Optimization Strategy for Data Transmission in Wireless Networks 873 Gaocai Wang (Guangxi University), Nao Wang (Guangxi University), Tianxiao Xie ( Guangxi University), and Hongjia Wu (Guangxi University) A Channel Allocation Scheme for Priority-Based Services in High-Speed Railway Wireless Communication Networks 880 Han Li (Central South University), Xiaoyong Zhang (Central South University), Jun Peng (Central South University), Fu Jiang (Central South University), Xin Gu (Central South University), and Shuo Li (Changsha University of Science and Technology) A Dynamic Placement Policy of Virtual Machine Based on MOGA in Cloud Environment 885 Mohan Zhang (Beijing Key Laboratory of Network Technology), Honglin Ren (Beijing Key Laboratory of Network Technology), and Chunhe Xia (Beijing Key Laboratory of Network Technology) A Predictable Servant-Based Execution Model for Safety-Critical Systems 892 Bo Wan (University of Science and Technology of China), Xi Li (University of Science and Technology of China), Bo Zhang (University of Science and Technology of China), Kaiqi Zhou (University of Science and Technology of China), Haizhao Luo (University of Science and Technology of China), Chao Wang (University of Science and Technology of China), Xianglan Chen (University of Science and Technology of China), and Xuehai Zhou (University of Science and Technology of China) MAPP: A Modular Arithmetic Algorithm for Privacy Preserving in IoT 897 Mehdi Gheisari (Guangzhou University), Guojun Wang (Guangzhou University), Md Zakirul Alam Bhuiyan (Fordham University), and Wei Zhang (Guangzhou University) A Cooperative Replica Placement Strategy for MP2P-CDN 904 Tang Yayuan (Central South University), Guo Kehua (Central South University), Liang Zhonghe (Central South University), and Liu Dengchao (Central South University)

xviii CODE: Incorporating Correlation and Dependency for Task Scheduling in Data Center 909 Jinkun Geng () Power Control Based Broadcast Packet Retransmission Collision Reduction Method in a Wireless Self-Organization Network 914 Yupeng Wang (Shenyang Aerospace University), Zelong Yu (Shenyang Aerospace University), Yufeng Li (Shenyang Aerospace University), and Xin Su ()

Posters

Improving Scheduling Efficiency of Hadoop YARN Using AFSA Algorithm 919 Tang Jie (Nanjing University), Gao Junlei (Nanjing University), and Wu Gangshan (Nanjing University) An Evaluation Methodology of Cloud Service Quality Based on Queuing Model 925 Gengzhe Yan (Harbin Institute of Technology), Fanchao Meng (Harbin Institute of Technology), and Dianhui Chu (Harbin Institute of Technology) Heterogeneous Parallel and Distributed Optimization of K-Means Algorithm on Sunway Supercomputer 931 Rong Tan (Cornell University), Jiawei Chen (Washington University in St. Louis), and Yiwen Zhang (Carnegie Mellon University) An Approach of Anomaly Diagnosis with Logs for Distributed Services in Communication Network Information System 938 Kang Sun (State Key Laboratory of Networking and Switching Technology), Luoming Meng (State Key Laboratory of Networking and Switching Technology), Shaoyong Guo (State Key Laboratory of Networking and Switching Technology), Siya Xu (State Key Laboratory of Networking and Switching Technology), Ying Wang (Guangdong Power Grid Co.), and Weijian Li (Guangdong Power Grid Co.)

Track 3: Applications

Regular Papers

Flow Migrations in Software Defined Networks: Consistency, Feasibility, and Optimality 941 Yang Chen (Temple University), Huanyang Zheng (Temple University), and Jie Wu (Temple University) Parallel Huffman Decoding: Presenting a Fast and Scalable Algorithm for Increasingly Multicore Devices 949 Beau Johnston (Australian National University) and Eric McCreath (Australian National University) Using Deep Neural Networks to Simulate Human Body 959 Yinglong Dai (Central South University), Guojun Wang (Guangzhou University), Sihong Chen (First Hospital of Hunan University of Chinese Medicine), Dongqing Xie (Guangzhou University), and Shuhong Chen (Guangzhou University)

xix WiCount: A Deep Learning Approach for Crowd Counting Using WiFi Signals 967 Shangqing Liu (Nanjing University of Aeronautics and Astronautics), Yanchao Zhao (Nanjing University of Aeronautics and Astronautics), and Bing Chen (Nanjing University of Aeronautics and Astronautics) Second Degree Social Connections - Research on Friend-Matching Privacy Preserving Model in Mobile Social Networks 975 Entao Luo (Hunan University of Science and Engineering), Guojun Wang (Guangzhou University), Shuhong Chen (Guangzhou University), Xiangdong Yin (Hunan University of Science and Engineering), and Wen Li (Hunan University of Science and Engineering) Detecting Anomalies from End-to-End Internet Performance Measurements (PingER) Using Cluster Based Local Outlier Factor 982 Saqib Ali (Guangzhou University), Guojun Wang (Guangzhou University), Roger L. Cottrell (SLAC National Accelerator Laboratory), and Tayyba Anwar (University of Agriculture Faisalabad) General Algorithm for Fault-Tolerant Virtual Machine Assignments 990 Jigang Wu (Guangdong University of Technology), Zinan He (Guangdong University of Technology), Yaoguo Zhang (Guangdong University of Technology), Renfei Gao (Guangdong University of Technology), and Siew Kei Lam (Nanyang Technological University) Hidden Markov Model Based Spot Price Prediction for Cloud Computing 996 Duan Liu (Nanjing University of Science and Technology), Zhicheng Cai (Nanjing University of Science and Technology), and Xiaoping Li (Southeast University) A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services 1004 Shaobo Zhang (Hunan University of Science and Technology), Guojun Wang (Guangzhou University), Qin Liu (Hunan University), Xi Wen (Central South University), and Junguo Liao (Hunan University of Science and Technology) Achieving Flow-Oriented Reliable Services in Cloud Computing 1011 Yunhao Mu (Hunan University), Qin Liu (Hunan University), Junhai Zhou (Hunan University), Kang Xie (Key Lab of Information Network Security), and Guojun Wang (Guangzhou University) A Density-Based Clustering Approach for Optimal Energy Replenishment in WRSNs 1018 Xin Gu (Central South University), Jun Peng (Central South University), Xiaoyong Zhang (Central South University), Kaiyang Liu (Central South University), and Yijun Cheng (Central South University) Detection of Vehicle Steering Based on Smartphone 1024 Zhiping Qi (), Zhenchao Ouyang (Beihang University), Jianwei Niu (Beihang University), and Yu Li (Beihang University)

xx Refactoring the Molecular Docking Simulation for Heterogeneous, Manycore Processors Systems 1031 Junshi Chen (University of Science and Technology of China), Han Lin (University of Science and Technology of China), Weihao Liang (University of Science and Technology of China), Yang Yu (University of Science and Technology of China), Wenting Han (University of Science and Technology of China), Hong An (University of Science and Technology of China), Yong Chen (Texas Tech University), and Xin Liu (National Research Center of Parallel Computer Engineering and Technology) Device-Free and Robust User Identification in Smart Environment Using WiFi Signal 1039 Ruiyu Zheng (Nanjing University of Aeronautics and Astronautics), Yanchao Zhao (Nanjing University of Aeronautics and Astronautics), and Bing Chen (Nanjing University of Aeronautics and Astronautics) Understanding Users' Coupon Usage Behaviors in E-Commerce Environments 1047 Jiawei He (Hunan University) and Wenjun Jiang (Hunan University) Phishing Emails Detection Using CS-SVM 1054 Weina Niu (University of Electronic Science and Technology of China), Xiaosong Zhang (University of Electronic Science and Technology of China), Guowu Yang (University of Electronic Science and Technology of China), Zhiyuan Ma (University of Electronic Science and Technology of China), and Zhongliu Zhuo (University of Electronic Science and Technology of China) A Reliable Scheduling Algorithm for Render Cluster System 1060 Qian Li (Xi’an Jiaotong University), Weiguo Wu (Xi’an Jiaotong University), Dun Yuan (Tianjin Jinhang Computing Technology Research Institute), Lei Jia (Tianjin Jinhang Computing Technology Research Institute), and Lei Wang (Xi’an Jiaotong University) Wi-Fi Signal Coverage Distance Estimation in Collapsed Structures 1066 Muhammad Faizan Khan (Guangzhou University), Guojun Wang (Guangzhou University), Md Zakirul Alam Bhuiyan (Fordham University), and Xu Li (Guangzhou University) Flexible Light Curves Generation System for Astronomical Catalogs 1074 Kun Li (Tianjin University), Ce Yu (Tianjin University), Shanjiang Tang (Tianjin University), Chao Sun (Tianjin University), Qing Zhao (Tianjin University of Science & Technology), Siyuan Huang (Tianjin University), and Qinlong Kang (Tianjin University) Segmentation of Calcification and Brain Hemorrhage with Midline Detection 1082 Arif Muhammad (Guangzhou University) and Wang Guojun (Software Guangzhou University) When and What Music Will You Listen To? Fine-Grained Time-Aware Music Recommendation 1091 Mengxian Li (Hunan University), Wenjun Jiang (Hunan University), and Kenli Li (Hunan University) Congestion Prediction of Urban Traffic Employing SRBDP 1099 Pengcheng Jiang (Shandong University), Lei Liu (Shandong University), Lizhen Cui (Shandong University), Hui Li (Shandong University), and Yuliang Shi (Shandong University)

xxi A cGANs-Based Scene Reconstruction Model Using Lidar Point Cloud 1107 Zhenchao Ouyang (State Key Laboratory of Virtual Reality Technology and Systems), Yu Liu (State Key Laboratory of Software Development Environment), Changjie Zhang (State Key Laboratory of Software Development Environment), and Jianwei Niu (State Key Laboratory of Virtual Reality Technology and Systems) Data-Driven QoE Analysis on Video Streaming in Mobile Networks 1115 Qingyong Wang (Macau University of Science and Technology), Hong-Ning Dai (Macau University of Science and Technology), Hao Wang (Norwegian University of Science and Technology), and Di Wu (Sun Yat-sen University) Point-of-Interest Recommendations: Capturing the Geographical Influence from Local Trajectories 1122 Yangkai Shi (Hunan University) and Wenjun Jiang (Hunan University) Unleash the Power for Tensor: A Hybrid Malware Detection System Using Ensemble Classifiers 1130 Jieqiong Hou (East China Normal University), Minhui Xue (East China Normal University), and Haifeng Qian (East China Normal University) Joint Resource Optimization of Shared Electric Bicycles in Smart Cities 1138 Peng Liu (Hangzhou Dianzi University), Yue Ding (Hangzhou Dianzi University), Tingting Fu (Hangzhou Dianzi University), and Dagang Li (Shenzhen Graduate School) CuSNMF: A Sparse Non-Negative Matrix Factorization Approach for Large-Scale Collaborative Filtering Recommender Systems on Multi-GPU 1144 Hao Li (Hunan University), Kenli Li (Hunan University), Jiwu Peng (Hunan University), and Keqin Li (Hunan University) Projective Hard Thresholding Pursuit for Nonnegative Sparse Recovery 1152 Xiaoya Zhang (National University of Defense Technology), Hao Jiang (National University of Defense Technology), Tao Sun (University of California Los Angeles), Lizhi Cheng (National University of Defense Technology), Chun Huang (National University of Defense Technology), and Canqun Yang (Science and Technology on Parallel and Distributed Processing Laboratory) Live Migration Planning of Virtual Machines in Hybrid SDN 1160 Yao Qin (Shandong University), Hua Wang (Shandong University), and Fangjin Zhu (Shandong University)

Short Papers

Towards Efficient Incremental Representation for Short Texts in Social Media 1167 Zhilin Zhang (Inner Mongolia University of Technology), Zhiwei Xu (Inner Mongolia University of Technology), Xuying Meng (University of Chinese Academy of Sciences), Mengjie Guo (Inner Mongolia University of Technology), and Limin Liu (Inner Mongolia University of Technology) Attribute-Based Encryption with Personalized Search 1172 Qiang Zhang (Central South University), Guojun Wang (Guangzhou University), Qin Liu (Hunan University), and Tao Peng (Guangzhou University)

xxii Data-Driven Influence Learning in Social Networks 1179 Feng Wang (Central South University), Wenjun Jiang (Hunan University), Guojun Wang (Guangzhou University), and Dongqing Xie (Guangzhou University) Accelerating the Parallelization of Lattice Boltzmann Method by Exploiting the Temporal Locality 1186 Song Liu (Xi'an Jiaotong University), Nianjun Zou (Xi'an Jiaotong University), Yuanzhen Cui (Xi'an Jiaotong University), and Weiguo Wu (Xi'an Jiaotong University) A Smartphone-Based Online Pedestrian Positioning Approach for Both Structured and Open Indoor Spaces 1194 Wenping Yu (Nankai University), Yuwei Xu (Nankai University), Jianzhong Zhang (Nankai University), Chao Ma (Nankai University), and Jingdong Xu (Nankai University) A Novel Parallel Image Encryption Scheme Using Chaos 1199 Chong Fu (Northeastern University), Gao-yuan Zhang (Northeastern University), Mai Zhu (Northeastern University), Li-ying Cong (Northeastern University), and Wei-min Lei (Northeastern University) SW-AES: Accelerating AES Algorithm on the Sunway TaihuLight 1204 Liandeng Li (Tsinghua University), Jiarui Fang (Tsinghua University), Jinlei Jiang (Tsinghua University), Lin Gan (Tsinghua University), Weijie Zheng (Tsinghua University), Haohuan Fu (Ministry of Education Key Laboratory for Earth System Modeling), and Guangwen Yang (Tsinghua University) A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization 1212 Zhiwei Zhang (State Key Laboratory of Integrated Service Networks), Xiaofeng Chen (State Key Laboratory of Integrated Service Networks), Jin Li (School of Computer Science), Jianfeng Ma (State Key Laboratory of Integrated Service Networks), and Yang Xiang (State Key Laboratory of Integrated Service Networks) Mining Trip Attractive Areas Using Large-Scale Taxi Trajectory Data 1217 Linjiang Zheng (Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education), Dong Xia (Chongqing University), Xin Zhao (Chongqing University), and Weining Liu (Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education) The Risk Assessment of Breast Tumors Based on Text Data of Ultrasound Reports 1223 Qiao Pan (), Lan Xiang (Donghua University), Chunru Yu (Donghua University), Yuanyuan Zhang (Donghua University), Dehua Chen (Donghua University), and Gaonian Gao (Triman Information and Technology Co.) A Scalable Framework of Testbed for SDN Simulation with Multiple Controllers 1228 Xu Chen (University of Electronic Science and Technology of China), Chao Song (University of Electronic Science and Technology of China), Yongqiang Qi (University of Electronic Science and Technology of China), Xili Dai (University of Electronic Science and Technology of China), and Ming Liu (University of Electronic Science and Technology of China)

xxiii A Novel Approach of Constructing Chinese Handwriting Mobile System and Data Service for Elementary Education Domain 1233 Ye Lu (Nankai University), Qingcheng Li (Nankai University), Tao Li (Nankai University), and Jiaxin Liu (Nankai University) On-Demand Processing for Remote Sensing Big Data Analysis 1241 Zhenchun Huang (Tsinghua University), Anrun Zhong (Tsinghua University), and Guoqing Li (Institute of Remote Sensing and Digital Earth) A Three-Level Parallel Algorithm for MrBayes 3.2 1246 Mingjie Zhao (Nankai-Baidu Joint Laboratory), Qiang Ren (Nankai-Baidu Joint Laboratory), Yilin Wang (Nankai-Baidu Joint Laboratory), Ruikang Deng (Nankai-Baidu Joint Laboratory), Mingming Ren (Nankai-Baidu Joint Laboratory), Gang Wang (Nankai-Baidu Joint Laboratory), and Xiaoguang Liu (Nankai-Baidu Joint Laboratory) A Recommendation of Pension Service Based on Trusted Network 1251 Xinxin Dong (Harbin Institute of Technology), Chunshan Li (Harbin Institute of Technology), and Dianhui Chu (Harbin Institute of Technology) Protein Quantitative Based on Simulated Annealing Algorithm 1256 Jun Tang (East China Normal University) and Yanqin Yang (East China Normal University)

Posters

A Trajectory Prediction Method with Sparsity Data 1261 Hengfei Fan (Beijing University of Posts and Telecommunications) and Wenbin Yao (Beijing University of Posts and Telecommunications) A Shortest-Response-Time Assured Microservices Selection Framework 1266 XiaoDong Liu (Institute of Computing Technology), SongHao Jiang (Institute of Computing Technology), XiaoFang Zhao (Institute of Computing Technology Beijing), and Yan Jin (Institute of Computing Technology Beijing) Streaming Graph Partitioning for Large Graphs with Limited Memory 1269 Qi Li (Chongqing University), Jiang Zhong (Chongqing University), Linjiang Zheng (Key Laboratory of Dependable Service Computing in Cyber Physical Society), and Xue Li (University of Queensland) RDDSACC: A Reliable Data Distribution Solution Assisted by Cloud Computing 1272 Wei Zhang (National Supercomputer Center in Jinan), Xinchang Zhang (National Supercomputer Center in Jinan), Huiling Shi (National Supercomputer Center in Jinan), and Longquan Zhou (Shandong University of Science and Technology) Semi-Supervised Learning Based Fake Review Detection 1278 Huaxun Deng (Northeastern University), Linfeng Zhao (Northeastern University), Ning Luo (Northeastern University), Yuan Liu (Northeastern University), Guibing Guo (Northeastern University), Xingwei Wang (Northeastern University), Zhenhua Tan (Northeastern University), Shuang Wang (Northeastern University), and Fucai Zhou (Northeastern University)

xxiv

16th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2017)

Regular Papers

EBD-MLE: Enabling Block Dynamics under BL-MLE for Ubiquitous Data 1281 Ke Huang (University of Electronic Science and Technology of China), Xiaosong Zhang (University of Electronic Science and Technology of China), Xiaofen Wang (University of Electronic Science and Technology of China), Xiaojiang Du (Temple University), and Ruonan Zhang (Northwestern Polytechnical University) Mitigation of a Broadcast Storm Problem in a Vehicular Ad Hoc Network (VANETs) 1289 Etienne Alain Feukeu (Vaal University of Technology) and T. Zuva (Vaal University of Technology) Visible Nearest Neighbor Search for Objects Moving on Consecutive Trajectories 1296 Xinyuan Luo ( University), Ke Chen (), Guifeng Pang (Zhejiang University), Lidan Shou (Zhejiang University), and Gang Chen (Zhejiang University) Malware Analysis and Detection in Enterprise Systems 1304 Tebogo Mokoena (Vaal University of Technology) and Tranos Zuva (Vaal University of Technology) A Service Scheduling Policy for Improving Playback Quality of Mesh-Based P2P VoD Systems 1311 Guowei Huang (Shenzhen Institute of Information Technology), Lingjing Kong (Shenzhen Institute of Information Technology), Keke Wu (Shenzhen Institute of Information Technology), and Zhi Chen (Tianjin Polytechnic University) Internet Performance Analysis of South Asian Countries Using End-to-End Internet Performance Measurements 1319 Saqib Ali (Guangzhou University), Guojun Wang (Guangzhou University), Roger L. Cottrell (SLAC National Accelerator Laboratory), and Sara Masood (University of Agriculture Faisalabad) Contactless Measurement of Pose in the Earth Frame Using a Mobile Phone 1327 Wang Zhen (Zhejiang University) and Liang Xiubo (Zhejiang University) Reinforcement Learning Control for Water-Efficient Agricultural Irrigation 1334 Lijia Sun (Texas A&M University), Yanxiang Yang (Texas A&M University), Jiang Hu (Texas A&M University), Dana Porter (Texas A&M AgriLife Research), Thomas Marek (Texas A&M AgriLife Research), and Charles Hillyer (Texas A&M AgriLife Research) A Reliable Soil Moisture Sensing Methodology for Agricultural Irrigation 1342 Yanxiang Yang (Texas A&M University, College Station), Lijia Sun (Texas A&M University, College Station), Jiang Hu (Texas A&M University, College Station), Dana Porter (Texas A&M University, College Station), Thomas Marek (Texas A&M AgriLife Research), and Charles Hillyer (Texas A&M University, College Station)

xxv The PSO-SVM-Based Method of the Recognition of Plant Leaves 1350 Liu Wei ( Medical University), Zhifang Li (Hainan Medical University), Jialun Lin (Hainan Medical University), and Danning Liang (Hainan Medical University) SenseLE: Exploiting Spatial Locality in Decentralized Sensing Environments 1356 Nicolae Vladimir Bozdog (Vrije Universiteit Amsterdam), Marc X. Makkes (Vrije Universiteit Amsterdam), Alexandru Uta (Vrije Universiteit Amsterdam), Roshan Bharath Das (Vrije Universiteit Amsterdam), Aart Van Halteren (Vrije Universiteit Amsterdam), and Henri Bal (Vrije Universiteit Amsterdam) Performance Evaluation for WiFi DCF Networks from Theory to Testbed 1364 Ze Chen (Huazhong University of Science and Technology), Ding Fu (Huazhong University of Science and Technology), Yayu Gao (Huazhong University of Science and Technology), and Xiaojun Hei (Huazhong University of Science and Technology) A Service-Reliability-Based Resource Mapping Method in Smart Grid Virtual Networks 1372 Li-Qian Sun (State Key Laboratory of Networking and Switching Technology), Xing-Yu Chen (State Key Laboratory of Networking and Switching Technology), Feng Qi (State Key Laboratory of Networking and Switching Technology), Shao-Yong Guo (State Key Laboratory of Networking and Switching Technology), and Si-Ya Xu (State Key Laboratory of Networking and Switching Technology) Estimating Gradient Direction of Atmospheric Pressure Using Pressure Sensor Array 1379 Kensaku Kawauchi (National University of Singapore) and Jun Rekimoto (University of Tokyo & Sony Computer Science Laboratory) Insecurity of Cheng et al.'s Efficient Revocation in Ciphertext-Policy Attribute-Based Encryption Based Cryptographic Cloud Storage 1387 Changji Wang (Guangdong University of Foreign Studies), Jiayuan Wu (Sun Yat-Sen University), Yuan Yuan (Guangdong University of Foreign Studies), and Jing Liu ( University) PCA-Aware Anomaly Correction for Traffic Matrix in an IP Backbone Network 1394 Zhida Tang (Huazhong University of Science and Technology), Mengling Yu (Huazhong University of Science and Technology), Wei Liu (Huazhong University of Science and Technology), Liang Ou (Guangdong Research Institute of China Telecom), and Jun Wu (The 722 Research Insititute of CSIC) Comparison between CAN and CAN FD: A Quantified Approach 1399 Yong Xie (Xiamen University of Technology), Pengcheng Huang (Xiamen University of Technology), Wei Liang (Xiamen University of Technology), and Yifan He (Eindhoven University of Technology) OFL: A Language for Cloud Orchestration 1404 Flora Amato (University of Naples Federico II), Aniello Castiglione (University of Salerno), Nicola Mazzocca (University of Campania), Francesco Moscato (University of Campania "Luigi Vanvitelli"), and Vincenzo Moscato (University of Naples Federico II)

xxvi Implementation of an Integrated Ambient Intelligence System 1410 Dat Do (Texas A&M University-Corpus Christi), Scott A. King (Texas A&M University-Corpus Christi), Alaa Sheta (Texas A&M University-Corpus Christi), and Jiaqi Hu (Texas A&M University-Corpus Christi)

Short Papers

Feature Selection and Intrusion Detection in Cloud Environment Based on Machine Learning Algorithms 1417 Amir Javadpour (Guangzhou University), Sanaz Kazemi Abharian (Sharif University of Technology), and Guojun Wang (Guangzhou University) Graph-Based Quantum Parallel Teleportation in Quantum Wireless Multi-Hop Networks 1422 Huamei Qi (Central South University), Tailong Xiao (Central South University), and Ying Guo (Central South University) Who Should Be My Co-Author? Recommender System to Suggest a List of Collaborators 1427 Karim Alinani (Central South University), Guojun Wang (Guangzhou University), Annadil Alinani (Central South University), and Dua Hussain Narejo (Central South University) Quantification of Alzheimer’s Disease Brain Tissue Volume by an Enhanced Possibilistic Clustering Technique Based on Bias-Corrected Fuzzy Initialization 1434 Lilia Lazli (University of Quebec-Montreal) and Boukadoum Mounir (University of Quebec-Montreal) SLIP: A Cost-Effective Infrastructure for a Smart Environment 1439 Vinnay V. Pinnaka (Texas A&M University-Corpus Christi), Scott A. King (Texas A&M University-Corpus Christi), and Ajay A. Katangur (Texas A&M University-Corpus Christi) Enabling Community Health Care with Microservices 1444 Richard Hill (University of Huddersfield), Dharmendra Shadija (Sheffield Hallam University), and Mo Rezai (Sheffield Hallam University)

Author Index

xxvii