Low-latency orchestration for workflow-oriented service function chain in edge computing
暂无分享,去创建一个
Victor I. Chang | Gang Sun | Yao Li | Dan Liao | Yayu Li | Gang Sun | Victor Chang | D. Liao | Yayu Li | Yao Li
[1] Qingsheng Zhu,et al. Deadline-Constrained Cost Optimization Approaches for Workflow Scheduling in Clouds , 2017, IEEE Transactions on Parallel and Distributed Systems.
[2] Laura Galluccio,et al. A Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks , 2017, IEEE Journal on Selected Areas in Communications.
[3] Prasanta K. Jana,et al. A novel cost-efficient approach for deadline-constrained workflow scheduling by dynamic provisioning of resources , 2018, Future Gener. Comput. Syst..
[4] Mostafa Ammar,et al. An Approach for Service Function Chain Routing and Virtual Function Network Instance Migration in Network Function Virtualization Architectures , 2017, IEEE/ACM Transactions on Networking.
[5] Lei Guo,et al. Virtual Network Embedding for Collaborative Edge Computing in Optical-Wireless Networks , 2017, Journal of Lightwave Technology.
[6] Siu-Ming Yiu,et al. Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..
[7] Michelle M. Zhu,et al. Transport-Support Workflow Composition and Optimization for Big Data Movement in High-Performance Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.
[8] Raouf Boutaba,et al. Service Function Chaining Simplified , 2016, ArXiv.
[9] Feng Xia,et al. Big Scholarly Data: A Survey , 2017, IEEE Transactions on Big Data.
[10] Jong-Moon Chung,et al. Clustered NFV Service Chaining Optimization in Mobile Edge Clouds , 2017, IEEE Communications Letters.
[11] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[12] Xiaoping Li,et al. Elastic Resource Provisioning for Cloud Workflow Applications , 2017, IEEE Transactions on Automation Science and Engineering.
[13] George K. Karagiannidis,et al. Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[14] Weihua Zhuang,et al. Software Defined Networking Enabled Wireless Network Virtualization: Challenges and Solutions , 2017, IEEE Network.
[15] Nerea Toledo,et al. Toward an SDN-enabled NFV architecture , 2015, IEEE Communications Magazine.
[16] Rubén Ruiz,et al. A delay-based dynamic scheduling algorithm for bag-of-task workflows with stochastic task execution times in clouds , 2017, Future Gener. Comput. Syst..
[17] Francesco Musumeci,et al. Protection strategies for virtual network functions placement and service chains provisioning , 2017, Networks.
[18] Meina Song,et al. Dynamic Scheduling of Workflow for Makespan and Robustness Improvement in the IaaS Cloud , 2017, IEICE Trans. Inf. Syst..
[19] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.
[20] Deep Medhi,et al. Optimally Selecting Standby Virtual Routers for Node Failures in a Virtual Network Environment , 2017, IEEE Transactions on Network and Service Management.
[21] Jin Li,et al. New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.
[22] Hao Chen,et al. Performance analysis and optimization for workflow authorization , 2017, Future Gener. Comput. Syst..
[23] Jin Li,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.
[24] Thanasis Loukopoulos,et al. Data Replication and Virtual Machine Migrations to Mitigate Network Overhead in Edge Computing Systems , 2017, IEEE Transactions on Sustainable Computing.
[25] Hamed Ahmadi,et al. Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization , 2017, IEEE Communications Surveys & Tutorials.
[26] Wei Quan,et al. Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing , 2017, Mob. Inf. Syst..
[27] Xiaofeng Chen,et al. Secure Distributed Deduplication Systems with Improved Reliability , 2015, IEEE Trans. Computers.
[28] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[29] Elisa Bertino,et al. A Collaborative DDoS Defence Framework Using Network Function Virtualization , 2017, IEEE Transactions on Information Forensics and Security.
[30] Juan Felipe Botero,et al. Scalable and coordinated allocation of service function chains , 2017, Comput. Commun..
[31] Jin Li,et al. Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..
[32] Juan Felipe Botero,et al. Resource Allocation in NFV: A Comprehensive Survey , 2016, IEEE Transactions on Network and Service Management.
[33] Jin Li,et al. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..
[34] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[35] Jose Oscar Fajardo,et al. A Robust Optimization Based Energy-Aware Virtual Network Function Placement Proposal for Small Cell 5G Networks with Mobile Edge Computing Capabilities , 2017, Mob. Inf. Syst..
[36] David Dietrich,et al. Multi-Provider Service Chain Embedding With Nestor , 2017, IEEE Transactions on Network and Service Management.
[37] Hsiao-Hwa Chen,et al. Energy-Efficiency Versus Delay Tradeoff in Wireless Networks Virtualization , 2018, IEEE Transactions on Vehicular Technology.
[38] Ying Zhang,et al. Improve Service Chaining Performance with Optimized Middlebox Placement , 2017, IEEE Transactions on Services Computing.
[39] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[40] Sergey V. Kovalchuk,et al. Execution Time Estimation for Workflow Scheduling , 2014, 2014 9th Workshop on Workflows in Support of Large-Scale Science.
[41] Fatos Xhafa,et al. L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing , 2015, Knowl. Based Syst..
[42] Zhu Han,et al. Parallel and Distributed Resource Allocation With Minimum Traffic Disruption for Network Virtualization , 2017, IEEE Transactions on Communications.
[43] Xiaohui Liu,et al. Evolutionary Multi-Objective Workflow Scheduling in Cloud , 2016, IEEE Transactions on Parallel and Distributed Systems.
[44] Dongqing Xie,et al. Secure Auditing and Deduplicating Data in Cloud , 2016, IEEE Transactions on Computers.
[45] Jinsong Wu,et al. Service Chaining for Hybrid Network Function , 2019, IEEE Transactions on Cloud Computing.
[46] Yang Wang,et al. Network Virtualization in Spectrum Sliced Elastic Optical Path Networks , 2017, Journal of Lightwave Technology.
[47] Weiwei Lin,et al. An Ensemble Random Forest Algorithm for Insurance Big Data Analysis , 2017, IEEE Access.
[48] Fatos Xhafa,et al. Secure deduplication storage systems supporting keyword search , 2015, J. Comput. Syst. Sci..