Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Liru Geng"'
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. :1-15
Publikováno v:
2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys).
Publikováno v:
IEEE Communications Letters. 25:2683-2687
Recently, the task offloading and resource allocation (TORA) issues in mobile edge computing system have attracted much attention. However, the impact of different movement speeds on TORA problem and customized services for different service requirem
Publikováno v:
Wireless Communications and Mobile Computing, Vol 2021 (2021)
Mobile edge computing (MEC) has been envisaged as one of the most promising technologies in the fifth generation (5G) mobile networks. It allows mobile devices to offload their computation-demanding and latency-critical tasks to the resource-rich MEC
Publikováno v:
2022 IEEE/ACM 30th International Symposium on Quality of Service (IWQoS).
Publikováno v:
IEEE Communications Letters. 25:508-512
With the rapid growth of social network traffic, the design of an efficient caching strategy is crucial in the social content-centric network (SocialCCN). In order to design a more comprehensive popularity prediction caching strategy, in this letter,
Autor:
Jiang Fang, Haitao Liu, Jiyan Sun, Ting Li, Yinlong Liu, Zhaorui Guo, Shangyuan Zhuang, Liru Geng
Publikováno v:
2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys).
Publikováno v:
WCNC
In remote regions (e.g., mountain and desert), cellular networks are usually sparsely deployed or unavailable. With the appearance of new applications (e.g., industrial automation and environment monitoring) in remote regions, resource-constrained te
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e4ec07150b1c61e09540301153ac5518
Publikováno v:
ISCC
Advanced Persistent Threat (APT) is a stealthy, continuous and sophisticated method of network attacks, which can cause serious privacy leakage and millions of dollars losses. In this paper, we introduce a new game-theoretic framework of the interact
Publikováno v:
ISCC
With the rapid growth of multimedia content in the social content-centric network (SocialCCN), in-network caching and caching strategy are becoming more and more important for efficient content delivery, but it also brings huge challenges to the cach