Security-Aware Incentives Design for Mobile Device-to-Device Offloading
暂无分享,去创建一个
Jie Xu | Lixing Chen | J. Xu | Lixing Chen
[1] Lei Sun,et al. Exploring device-to-device communication for mobile cloud computing , 2014, 2014 IEEE International Conference on Communications (ICC).
[2] Mihaela van der Schaar,et al. Token System Design for Autonomic Wireless Relay Networks , 2013, IEEE Transactions on Communications.
[3] Min Chen,et al. On the computation offloading at ad hoc cloudlet: architecture and service modes , 2015, IEEE Communications Magazine.
[4] Kenji Doya,et al. Reinforcement Learning in Continuous Time and Space , 2000, Neural Computation.
[5] Song Guo,et al. Incentive mechanisms for device-to-device communications , 2015, IEEE Network.
[6] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[7] Dusit Niyato,et al. A Dynamic Offloading Algorithm for Mobile Computing , 2012, IEEE Transactions on Wireless Communications.
[8] Caijun Zhong,et al. Joint Spectrum and Power Allocation for D2D Communications Underlaying Cellular Networks , 2016, IEEE Transactions on Vehicular Technology.
[9] Mihaela van der Schaar,et al. To Relay or Not to Relay: Learning Device-to-Device Relaying Strategies in Cellular Networks , 2013, IEEE Transactions on Mobile Computing.
[10] Wenye Wang,et al. Can mobile cloudlets support mobile applications? , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[11] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[12] Dongman Lee,et al. A virtual cloud computing provider for mobile devices , 2010, MCS '10.
[13] Pan Hui,et al. Have you asked your neighbors? A Hidden Market approach for device-to-device offloading , 2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[14] Sanjay Shakkottai,et al. FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[15] Tapani Ristaniemi,et al. Collaborative Mobile Clouds: An Energy Efficient Paradigm for Content Sharing , 2018, IEEE Wireless Communications.
[16] Walid Saad,et al. Contract-Based Incentive Mechanisms for Device-to-Device Communications in Cellular Networks , 2015, IEEE Journal on Selected Areas in Communications.
[17] Jeffrey G. Andrews,et al. An Overview on 3GPP Device-to-Device Proximity Services , 2013, 1310.0116.
[18] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[19] G. Mailath,et al. Repeated Games and Reputations , 2006 .
[20] P. Van Mieghem,et al. Virus Spread in Networks , 2009, IEEE/ACM Transactions on Networking.
[21] Christos Faloutsos,et al. Epidemic spreading in real networks: an eigenvalue viewpoint , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..
[22] Eugene Marinelli,et al. Hyrax: Cloud Computing on Mobile Devices using MapReduce , 2009 .
[23] W. O. Kermack,et al. A contribution to the mathematical theory of epidemics , 1927 .
[24] Jörg Ott,et al. Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.
[25] Zhuo Lu,et al. How can botnets cause storms? Understanding the evolution and impact of mobile botnets , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[26] Khaled A. Harras,et al. Friend or Foe? Detecting and Isolating Malicious Nodes in Mobile Edge Computing Platforms , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).
[27] Tao Zhang,et al. Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.
[28] Ellen W. Zegura,et al. Serendipity: enabling remote computing among intermittently connected mobile devices , 2012, MobiHoc '12.
[29] Jeffrey O. Kephart,et al. Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[30] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[31] G. Mailath,et al. Repeated Games and Reputations: Long-Run Relationships , 2006 .
[32] Zhu Han,et al. Joint scheduling and resource allocation for device-to-device underlay communication , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[33] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.