Hybrid Quantum-Behaved Particle Swarm Optimization for Mobile-Edge Computation Offloading in Internet of Things
暂无分享,去创建一个
Xiaojiang Du | Yang Liu | Lianfen Huang | Zhibin Gao | Shijie Dai | Minghui Liwang | Xiaojiang Du | M. Liwang | Zhibin Gao | Lianfeng Huang | Yang Liu | Shijie Dai
[1] Jie Wu,et al. Defending Resource Depletion Attacks on Implantable Medical Devices , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[2] Abhishek Chandra,et al. Decentralized Edge Clouds , 2013, IEEE Internet Computing.
[3] Salekul Islam,et al. Giving users an edge: A flexible Cloud model and its application for multimedia , 2012, Future Gener. Comput. Syst..
[4] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[5] David P. Anderson,et al. SETI@home-massively distributed computing for SETI , 2001, Comput. Sci. Eng..
[6] Xiaojiang Du,et al. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.
[7] Mario Nemirovsky,et al. Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing , 2014, 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[8] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[9] Mohsen Guizani,et al. Secure and Efficient Time Synchronization in Heterogeneous Sensor Networks , 2008, IEEE Transactions on Vehicular Technology.
[10] Bang Nguyen,et al. The integrity challenge of the Internet-of-Things (IoT): on understanding its dark side , 2017 .
[11] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[12] Xiaojiang Du,et al. Adaptive cell relay routing protocol for mobile ad hoc networks , 2006, IEEE Transactions on Vehicular Technology.
[13] Teruo Higashino,et al. Edge-centric Computing: Vision and Challenges , 2015, CCRV.
[14] Xiaojiang Du,et al. Biometric-based two-level secure access control for Implantable Medical Devices during emergencies , 2011, 2011 Proceedings IEEE INFOCOM.
[15] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[16] Chase Qishi Wu,et al. Secure cell relay routing protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[17] Vijay S. Pande,et al. Folding@home: Lessons from eight years of volunteer distributed computing , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.
[18] David Lillethun,et al. Mobile fog: a programming model for large-scale applications on the internet of things , 2013, MCC '13.
[19] Jiang Zhu,et al. Fog Computing: A Platform for Internet of Things and Analytics , 2014, Big Data and Internet of Things.
[20] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[21] Xiaojiang Du,et al. Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.
[22] Antonio Pascual-Iserte,et al. Optimization of Radio and Computational Resources for Energy Efficiency in Latency-Constrained Application Offloading , 2014, IEEE Transactions on Vehicular Technology.
[23] Yuguang Fang,et al. Multiclass routing and medium access control for heterogeneous mobile ad hoc networks , 2006, IEEE Transactions on Vehicular Technology.