Search
Search Results
-
Density estimation-based method to determine sample size for random sample partition of big data
Random sample partition (RSP) is a newly developed big data representation and management model to deal with big data approximate computation...
-
A user requirements-oriented privacy policy self-adaption scheme in cloud computing
In an ever-changing environment, Software as a Service (SaaS) can rarely protect users’ privacy. Being able to manage and control the privacy is...
-
NfvInsight: A Framework for Automatically Deploying and Benchmarking VNF Chains
With the advent of virtualization techniques and software-defined networking (SDN), network function virtualization (NFV) shifts network functions...
-
A multipath routing algorithm for satellite networks based on service demand and traffic awareness
With the reduction in manufacturing and launch costs of low Earth orbit satellites and the advantages of large coverage and high data transmission...
-
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query
Secure k -Nearest Neighbor ( k -NN) query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing...
-
Dynamic Resource Management in MEC Powered by Edge Intelligence for Smart City Internet of Things
The Internet of Things (IoT) has become an infrastructure that makes smart cities possible. is both accurate and efficient. The intelligent...
-
Certificateless broadcast multi-signature for network coding
Network coding can save wireless network resources and is very fast in comparison with traditional routing. In real application scenarios, network...
-
Nonlinear Instabilities in TCP-RED
With the growing size and popularity of the Internet, congestion control has emerged as an important problem. Poor management of congestion can... -
Minimizing the cost of periodically replicated systems via model and quantitative analysis
Geographically replicating objects across multiple data centers improves the performance and reliability of cloud storage systems. Maintaining...
-
CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning
With the increasing value of digital cryptocurrency in recent years, the digital cryptocurrency mining industry is becoming prosperous. However, this...
-
Region-adaptive Concept Aggregation for Few-shot Visual Recognition
Few-shot learning (FSL) aims to learn novel concepts from very limited examples. However, most FSL methods suffer from the issue of lacking...
-
Joint Participant Selection and Learning Optimization for Federated Learning of Multiple Models in Edge Cloud
To overcome the limitations of long latency and privacy concerns from cloud computing, edge computing along with distributed machine learning such as...
-
A Market-based Framework for Resource Management in Cloud Federation
A federated cloud is a form of the inter-cloud environment in which cloud service providers cooperate for better scalability and service...
-
Enhancing Service Offloading for Dense Networks Based on Optimal Stop** Theory in Virtual Mobile Edge Computing
The present and next-generation networks of service offloading present exciting issues. The traditional network optimisation techniques still require...
-
Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges
Zero trust architecture (ZTA) is a paradigm shift in how we protect data, stay connected and access resources. ZTA is non-perimeter-based defence,...
-
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction
Distributed denial of service (DDoS) detection is still an open and challenging problem. In particular, sophisticated attacks, e.g., attacks that...
-
Approximation Designs for Energy Harvesting Relay Deployment in Wireless Sensor Networks
Energy harvesting technologies allow wireless devices to be recharged by the surrounding environment, providing wireless sensor networks (WSNs) with...
-
Accelerating DAG-Style Job Execution via Optimizing Resource Pipeline Scheduling
The volume of information that needs to be processed in big data clusters increases rapidly nowadays. It is critical to execute the data analysis in...
-
Federated learning-outcome prediction with multi-layer privacy protection
Learning-outcome prediction (LOP) is a longstanding and critical problem in educational routes. Many studies have contributed to develo** effective...
-
Combining graph neural network with deep reinforcement learning for resource allocation in computing force networks
Fueled by the explosive growth of ultra-low-latency and real-time applications with specific computing and network performance requirements, the...