![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Revisiting FAW attack in an imperfect PoW blockchain system
Malicious miners in a Proof-of-Work (PoW) blockchain can apply less computing power to perform fork-after-withholding (FAW) attack than that to selfish mining and other withholding attacks. Quantitative study ...
-
Chapter and Conference Paper
On the Impact Analysis of Emergency Vehicles Preemption on Signalized Intersections with Connected Vehicles
In recent years, vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) communication are the leading technologies in intelligent transportation systems. With V2I and V2V, new strategies are enabled to b...
-
Article
Performance analysis of heterogeneous cloud-edge services: A modeling approach
With the growing demand of data processing/storage from Internet of Things (IoT) users and the increasing maturity of Cloud-Edge technologies, it becomes more and more critical to develop an effective and effi...
-
Article
Performance Modeling of Linux Network System with Open vSwitch
Open vSwitch (OVS) is a popular virtual switch implementing OpenFlow, which often works in Linux system. The development of Cloud and Edge datacenters accelerates its popularity, especially with the emergence ...
-
Chapter and Conference Paper
An Adaptive Tuning Sparse Fast Fourier Transform
The Sparse Fast Fourier Transform (SFFT) is a novel algorithm for discrete Fourier transforms on signals with the sparsity in frequency domain. A reference implementation of the algorithm has been proven to be...