Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing
Authors
Keywords
-
Journal
ACM Transactions on Internet Technology
Volume 21, Issue 3, Pages 1-33
Publisher
Association for Computing Machinery (ACM)
Online
2021-06-09
DOI
10.1145/3408291
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A Blockchain-empowered Crowdsourcing System for 5G-enabled Smart Cities
- (2021) Liang Tan et al. COMPUTER STANDARDS & INTERFACES
- Amplified locality‐sensitive hashing‐based recommender systems with privacy protection
- (2020) Xiaoxiao Chi et al. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
- An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks
- (2019) Xiaolong Xu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Time Series Association State Analysis Method for Attacks on the Smart Internet of Electric Vehicle Charging Network
- (2019) Qianmu Li et al. TRANSPORTATION RESEARCH RECORD
- An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles
- (2019) Xiaolong Xu et al. Future Generation Computer Systems-The International Journal of eScience
- A computation offloading method over big data for IoT-enabled cloud-edge computing
- (2019) Xiaolong Xu et al. Future Generation Computer Systems-The International Journal of eScience
- Scalability analysis of request scheduling in cloud computing
- (2019) Chao Xue et al. TSINGHUA SCIENCE AND TECHNOLOGY
- Mobile-edge computing framework with data compression for wireless network in energy internet
- (2019) Luning Liu et al. TSINGHUA SCIENCE AND TECHNOLOGY
- Optimized Unmanned Aerial Vehicles Deployment for Static and Mobile Targets’ Monitoring
- (2019) Fadi Al-Turjman et al. COMPUTER COMMUNICATIONS
- Intelligence in the Internet of Medical Things era: A systematic review of current and future trends
- (2019) Fadi Al-Turjman et al. COMPUTER COMMUNICATIONS
- Cognitive computing and wireless communications on the edge for healthcare service robots
- (2019) Shaohua Wan et al. COMPUTER COMMUNICATIONS
- Faster R-CNN for multi-class fruit detection using a robotic vision system
- (2019) Shaohua Wan et al. Computer Networks
- Intelligence and security in big 5G-oriented IoNT: An overview
- (2019) Fadi Al-Turjman Future Generation Computer Systems-The International Journal of eScience
- Joint Optimization of Offloading Utility and Privacy for Edge Computing Enabled IoT
- (2019) Xiaolong Xu et al. IEEE Internet of Things Journal
- Dynamic Mobile Crowdsourcing Selection for Electricity Load Forecasting
- (2018) Lianyong Qi et al. IEEE Access
- Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things
- (2018) Shaohua Wan et al. Future Generation Computer Systems-The International Journal of eScience
- A long video caption generation algorithm for big video data retrieval
- (2018) Songtao Ding et al. Future Generation Computer Systems-The International Journal of eScience
- A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data
- (2017) Lianyong Qi et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Inferring Implicit Rules by Learning Explicit and Hidden Item Dependency
- (2017) Shoujin Wang et al. IEEE Transactions on Systems Man Cybernetics-Systems
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started