-
1
-
-
77951039985
-
Cloud computing for mobile users: Can ofioad-ing computation save energy?
-
Apr.
-
K. Kumar and Y.-H. Lu, "Cloud computing for mobile users: Can ofioad-ing computation save energy?" IEEE Trans. Comput., vol. 43, no. 4, pp. 51-56, Apr. 2010.
-
(2010)
IEEE Trans. Comput.
, vol.43
, Issue.4
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.-H.2
-
2
-
-
47049112077
-
Design ofWARP: A wireless open-access research platform
-
Sep.
-
P. Murphy, A. Sabharwal, B. Aazhang, "Design ofWARP: A wireless open-access research platform," in Proc. 14th Eur. Signal Process. Conf., Sep. 2006, pp. 1-5.
-
(2006)
Proc. 14th Eur. Signal Process. Conf
, pp. 1-5
-
-
Murphy, P.1
Sabharwal, A.2
Aazhang, B.3
-
3
-
-
79951614632
-
Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO chan-nels
-
Oct.
-
A. Mukherjee and A. L. Swindlehurst, "Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO chan-nels," in Proc. IEEE Military Commun. Conf., Oct. 2010, pp. 1695-1700.
-
(2010)
Proc IEEE Military Commun. Conf.
, pp. 1695-1700
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
4
-
-
84954235490
-
Dynamic defense strategy against advanced persistent threat with insiders
-
Apr.
-
P. Hu, H. Li, H. Fu, D. Cansever, P. Mohapatra, "Dynamic defense strategy against advanced persistent threat with insiders," in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), Apr. 2015, pp. 747-755.
-
(2015)
Proc IEEE Int. Conf. Comput. Commun. (INFOCOM)
, pp. 747-755
-
-
Hu, P.1
Li, H.2
Fu, H.3
Cansever, D.4
Mohapatra, P.5
-
5
-
-
84856471625
-
Secure and eficient handover authentication based on bilinear pairing functions
-
Jan.
-
D. He, C. Chen, S. Chan, J. Bu, "Secure and eficient handover authentication based on bilinear pairing functions," IEEE Trans. Wireless Commun., vol. 11, no. 1, pp. 48-53, Jan. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.1
, pp. 48-53
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
6
-
-
84947461262
-
Ofioading in mobile cloudlet systems with intermittent connectivity
-
Dec.
-
Y. Zhang, D. Niyato, P.Wang, "Ofioading in mobile cloudlet systems with intermittent connectivity," IEEE Trans. Mobile Comput., vol. 14, no. 12, pp. 2516-2529, Dec. 2015.
-
(2015)
IEEE Trans. Mobile Comput.
, vol.14
, Issue.12
, pp. 2516-2529
-
-
Zhang, Y.1
Niyato, D.2
Wang, P.3
-
7
-
-
84880914068
-
A nested two stage game-based opti-mization framework in mobile cloud computing system
-
Mar.
-
Y. Wang, X. Lin, M. Pedram, "A nested two stage game-based opti-mization framework in mobile cloud computing system," in Proc. IEEE Int. Symp. Service Oriented Syst. Eng., Mar. 2013, pp. 494-502.
-
(2013)
Proc IEEE Int. Symp. Service Oriented Syst. Eng.
, pp. 494-502
-
-
Wang, Y.1
Lin, X.2
Pedram, M.3
-
8
-
-
84991625536
-
Computation ofioading to save energy on handheld devices: A partition scheme
-
Oct.
-
Z. Li, C. Wang, R. Xu, "Computation ofioading to save energy on handheld devices: A partition scheme," in Proc. ACM Int. Conf. Compil., Archit., Synth. Embedded Syst., Oct. 2001, pp. 238-246.
-
(2001)
Proc. ACM Int. Conf. Compil., Archit., Synth. Embedded Syst
, pp. 238-246
-
-
Li, Z.1
Wang, C.2
Xu, R.3
-
9
-
-
84925130442
-
Decentralized computation ofioading game for mobile cloud computing
-
Apr.
-
X. Chen, "Decentralized computation ofioading game for mobile cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 4, pp. 974-983, Apr. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.4
, pp. 974-983
-
-
Chen, X.1
-
10
-
-
35248878770
-
Mobile jamming attack and its countermea-sure in wireless sensor networks
-
May
-
H. Sun, S. Hsu, C. Chen, "Mobile jamming attack and its countermea-sure in wireless sensor networks," in Proc. IEEE Int. Conf. Adv. Inf. Netw. Appl. Workshops, May 2007, pp. 457-462.
-
(2007)
Proc IEEE Int. Conf. Adv. Inf. Netw. Appl. Workshops
, pp. 457-462
-
-
Sun, H.1
Hsu, S.2
Chen, C.3
-
11
-
-
84904125409
-
A semi-Markovian decision process based control method for ofioading tasks from mobile devices to the cloud
-
Dec.
-
S. Chen, Y. Wang, M. Pedram, "A semi-Markovian decision process based control method for ofioading tasks from mobile devices to the cloud," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2013, pp. 2885-2890.
-
(2013)
Proc IEEE Global Commun. Conf. (GLOBECOM)
, pp. 2885-2890
-
-
Chen, S.1
Wang, Y.2
Pedram, M.3
-
12
-
-
84978760285
-
Analysis of the energy-response time trade-off for delayed mobile cloud ofioading
-
Sep.
-
H.Wu, Y. Sun, K.Wolter, "Analysis of the energy-response time trade-off for delayed mobile cloud ofioading," ACM SIGMETRICS Perform. Eval. Rev., vol. 43, pp. 33-35, Sep. 2015.
-
(2015)
ACM SIGMETRICS Perform. Eval. Rev.
, vol.43
, pp. 33-35
-
-
Wu, H.1
Sun, Y.2
Wolter, K.3
-
13
-
-
84964993879
-
Analysis of the energy-response time tradeoff for mobile cloud ofioading using combined metrics
-
Sep.
-
H. Wu, W. Knottenbelt, K. Wolter, "Analysis of the energy-response time tradeoff for mobile cloud ofioading using combined metrics," in Proc. IEEE 27th Int. Teletrafic Congr. (ITC), Sep. 2015, pp. 134-142.
-
(2015)
Proc IEEE 27th Int. Teletrafic Congr. (ITC)
, pp. 134-142
-
-
Wu, H.1
Knottenbelt, W.2
Wolter, K.3
-
14
-
-
84938723202
-
A distributed ADMM approach for mobile data ofioading in software de-ned network
-
Mar.
-
L. Liu, X. Chen, M. Bennis, G. Xue, Z. Han, "A distributed ADMM approach for mobile data ofioading in software de-ned network," in Proc. IEEEWireless Commun. Netw. Conf. (WCNC), Mar. 2015, pp. 1748-1752.
-
(2015)
Proc. IEEEWireless Commun. Netw. Conf. (WCNC)
, pp. 1748-1752
-
-
Liu, L.1
Chen, X.2
Bennis, M.3
Xue, G.4
Han, Z.5
-
15
-
-
84944733602
-
Security and performance tradeoff analysis of mobile ofioading systems under timing attacks
-
Madrid, Spain: Springer, Aug.
-
T. Meng, K. Wolter, Q. Wang, "Security and performance tradeoff analysis of mobile ofioading systems under timing attacks," in Computer Performance Engineering, vol. 9272. Madrid, Spain: Springer, Aug. 2015, pp. 32-46.
-
(2015)
Computer Performance Engineering
, vol.9272
, pp. 32-46
-
-
Meng, T.1
Wolter, K.2
Wang, Q.3
-
16
-
-
81255210704
-
SSP-MCloud: A study on security service protocol for smartphone centric mobile cloud computing
-
Gwangju, South Korea: Springer, Nov.
-
J. S. Park, K. J. Yi, J. H. Park, "SSP-MCloud: A study on security service protocol for smartphone centric mobile cloud computing," in IT Convergence and Services, vol. 107. Gwangju, South Korea: Springer, Nov. 2011, pp. 165-172.
-
(2011)
IT Convergence and Services
, vol.107
, pp. 165-172
-
-
Park, J.S.1
Yi, K.J.2
Park, J.H.3
-
17
-
-
84897584002
-
Jamming games in the MIMO wiretap channel with an active eavesdropper
-
Jan.
-
A. Mukherjee and A. L. Swindlehurst, "Jamming games in the MIMO wiretap channel with an active eavesdropper," IEEE Trans. Signal Process., vol. 61, no. 1, pp. 82-91, Jan. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.1
, pp. 82-91
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
18
-
-
84963623717
-
A game theoretic analysis of secret and reliable communication with active and passive adversarial modes
-
Mar.
-
A. Garnaev, M. Baykal-Gursoy, H. V. Poor, "A game theoretic analysis of secret and reliable communication with active and passive adversarial modes," IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2155-2163, Mar. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.3
, pp. 2155-2163
-
-
Garnaev, A.1
Baykal-Gursoy, M.2
Poor, H.V.3
-
19
-
-
84943272411
-
Mobile cloud ofioading for mal-ware detections with learning
-
Apr.
-
Y. Li, J. Liu, Q. Li, L. Xiao, "Mobile cloud ofioading for mal-ware detections with learning," in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), BigSecurity Workshop, Apr. 2015, pp. 197-201.
-
(2015)
Proc IEEE Int. Conf. Comput. Commun. (INFOCOM), BigSecurity Workshop
, pp. 197-201
-
-
Li, Y.1
Liu, J.2
Li, Q.3
Xiao, L.4
-
20
-
-
84988836366
-
Mobile ofioad-ing game against smart attacks
-
San Francisco, CA, USA, Apr.
-
L. Xiao, C. Xie, T. Chen, H. Dai, H. V. Poor, "Mobile ofioad-ing game against smart attacks," in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), BigSecurity Workshop, San Francisco, CA, USA, Apr. 2016, pp. 249-254.
-
(2016)
Proc IEEE Int. Conf. Comput. Commun. (INFOCOM), BigSecurity Workshop
, pp. 249-254
-
-
Xiao, L.1
Xie, C.2
Chen, T.3
Dai, H.4
Poor, H.V.5
-
21
-
-
73049092718
-
Channel-based spoo-ng detection in frequency-selective Rayleigh channels
-
Dec.
-
L. Xiao, L. J. Greenstein, N. B. Mandayam, W. Trappe, "Channel-based spoo-ng detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Commun., vol. 8, no. 12, pp. 5948-5956, Dec. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.12
, pp. 5948-5956
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
22
-
-
40949147745
-
A comprehensive survey of multiagent reinforcement learning
-
Mar.
-
L. Busoniu, R. Babuska, B. De Schutter, "A comprehensive survey of multiagent reinforcement learning," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 38, no. 2, pp. 156-172, Mar. 2008.
-
(2008)
IEEE Trans. Syst., Man, Cybern. C, Appl. Rev.
, vol.38
, Issue.2
, pp. 156-172
-
-
Busoniu, L.1
Babuska, R.2
De Schutter, B.3
|