Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Tianyi Xing"'
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 9 (2013)
Mobile cloud computing (MCC) enables mobile devices to outsource their computing, storage and other tasks onto the cloud to achieve more capacities and higher performance. One of the most critical research issues is how the cloud can efficiently hand
Externí odkaz:
https://doaj.org/article/2ca9192de2044696986051b55d4a7ebd
Autor:
Tianyi Xing, Dale Ballucci
Publikováno v:
Policing and Society. 33:414-428
Publikováno v:
ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
Publikováno v:
2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM).
Autor:
Haiming Yan, Yu Lv, Tianyi Xing, Shijing Zhang, Xianglan Xu, Junwei Xu, Xiuzhong Fang, Xiang Wang
Publikováno v:
Fuel. 339:127387
Publikováno v:
IEEE Internet of Things Journal. 5:2259-2262
Cognitive Internet of Things (IoT) is the use of cognitive computing technologies, which is derived from cognitive science and artificial intelligence, in combination with data generated by connected devices and the actions those devices can perform.
Autor:
Akira Wada, Shingo Ata, Xuan Liu, Chun-Jen Chung, Tianyi Xing, Deep Medhi, Yasuhiro Sato, Dijiang Huang, Parikshit Juluri
Publikováno v:
Computer Networks. 63:128-146
A flexible, scalable, and robust framework that enables fine-grained flow control under fixed or dynamic policies while addressing trustworthiness as a built-in network level functionality is a desirable goal of the future Internet. Furthermore, the
Publikováno v:
IEEE Network. 27:6-11
Mobile devices are rapidly becoming the major service participants nowadays. However, traditional client-server based mobile service models are not able to meet the increasing demands from mobile users in terms of services diversity, user experience,
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 10:198-211
Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further larg
Publikováno v:
DSN Workshops
In the current enterprise data enter networking environment, a major hurdle in the development of network security is the lack of an orchestrated and resilient defensive mechanism that uses well-established quantifiable metrics, models, and evaluatio