-
Chapter and Conference Paper
A Formal Model to Prove Instantiation Termination for E-matching-Based Axiomatisations
SMT-based program analysis and verification often involve reasoning about program features that have been specified using quantifiers; incorporating quantifiers into SMT-based reasoning is, however, known to b...
-
Article
Open AccessAccess control scheme based on blockchain and attribute-based searchable encryption in cloud environment
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to ach...
-
Article
Open AccessFSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings
With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Buildi...
-
Article
Open AccessMemory sharing for handling memory overload on physical machines in cloud data centers
Over-committing computing resources is a widely adopted strategy for increased cluster utilization in Infrastructure as a Service (IaaS) cloud data centers. A potential consequence of over-committing computing...
-
Article
Open AccessCollaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-clouds
Cloud computing has emerged as a promising paradigm for meeting the growing resource demands of Internet of Things (IoT) devices. Meanwhile, with the popularity of mobile aerial base stations, Unmanned Aerial ...
-
Article
Open AccessClustering Algorithm of Density Difference Optimized by Mixed Teaching and Learning
Density peak clustering (DPC) algorithm is to find clustering centers by calculating the local density and distance of data points based on the distance between data points and the cutoff distance (dc) set manual...