Zobrazeno 1 - 10
of 333
pro vyhledávání: '"Jinshu Su"'
Publikováno v:
IET Communications, Vol 16, Iss 17, Pp 2002-2018 (2022)
Abstract Edge computing is expected to be a promising paradigm to provide low‐latency services. Tasks from resource‐limited users can be offloaded to edge servers for efficient execution within a limit time. This innovative technique has attracte
Externí odkaz:
https://doaj.org/article/170b629a3b6b444eb669aac013df5181
Publikováno v:
IEEE Access, Vol 8, Pp 182065-182077 (2020)
The proliferation of handheld devices has led to an explosive growth of mobile traffic volumes on the Internet. Identifying mobile apps from network traffic has become a crucial task for mobile network management and security. Traditionally, the desi
Externí odkaz:
https://doaj.org/article/94fd07f0f5c348f79b8084cf30d6a946
Publikováno v:
Symmetry, Vol 12, Iss 1, p 103 (2020)
With the fast development of the Internet of Things (IoT) technology, normal people and organizations can produce massive data every day. Due to a lack of data mining expertise and computation resources, most of them choose to use data mining service
Externí odkaz:
https://doaj.org/article/ea5de4e019e54ef19bfafcb5cd630095
Publikováno v:
PLoS ONE, Vol 13, Iss 10, p e0206068 (2018)
BACKGROUND:Regular expression matching (REM) is widely employed as the major tool for deep packet inspection (DPI) applications. For automatic processing, the regular expression patterns need to be converted to a deterministic finite automata (DFA).
Externí odkaz:
https://doaj.org/article/8d59d6eb45db48df900823122142411e
Publikováno v:
EURO Journal on Computational Optimization, Vol 2, Iss 1, Pp 1-15 (2014)
In wireless networks, the notion of compatible set refers to a set of radio links that can be simultaneously active with a tolerable interference. Finding a compatible set with maximum weighted revenue from the parallel transmissions is an important
Externí odkaz:
https://doaj.org/article/dcc62528eed9485388b5aa60d571e9d7
Autor:
Binfeng Wang, Jinshu Su
Publikováno v:
Symmetry, Vol 10, Iss 12, p 713 (2018)
Efficient network monitoring is an important basis work for network management. Generally, many management applications require accurate and timely statistics about network states at different aggregation levels at low cost, such as malicious traffic
Externí odkaz:
https://doaj.org/article/09d110cd039e4e81890640ea0040d201
Publikováno v:
Applied Sciences, Vol 8, Iss 10, p 1718 (2018)
Android has become the most popular mobile platform, and a hot target for malware developers. At the same time, researchers have come up with numerous ways to deal with malware. Among them, machine learning based methods are quite effective in Androi
Externí odkaz:
https://doaj.org/article/8b7a64eb1619406d82467b0709dfb9a5
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 9 (2013)
With the advancement of wireless communication technologies, mobile phones, PDAs, and car embedded devices are equipped with sensors, such as sound and image. People can apply these devices to form a new sensing network called people-centric sensing
Externí odkaz:
https://doaj.org/article/4ea875f0f0dc4ae5a61644aa172e7242
Publikováno v:
IEEE Transactions on Cloud Computing. :1-17
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering. :1-17