-
2
-
-
85029514408
-
Data offloading in 5g-enabled soft-ware-defined vehicular networks: A stackelberg game-based approach
-
July
-
G. S. Aujla et al, "Data Offloading in 5G-Enabled Soft-ware-Defined Vehicular Networks: A Stackelberg Game-Based Approach, " IEEE Commun. Mag., vol. 55, no. 7, July 2017.
-
(2017)
IEEE Commun. Mag.
, vol.55
, Issue.7
-
-
Aujla, G.S.1
-
4
-
-
84947794275
-
Energy-efficient resource assignment and power allocation in heterogeneous cloud radio access networks
-
Nov.
-
M. Peng et al, "Energy-Efficient Resource Assignment and Power Allocation in Heterogeneous Cloud Radio Access Networks, " IEEE Trans. Vehic. Tech., vol. 64, no. 11, Nov. 2015, pp. 5275-87.
-
(2015)
IEEE Trans. Vehic. Tech.
, vol.64
, Issue.11
, pp. 5275-5287
-
-
Peng, M.1
-
5
-
-
84976486881
-
Cloud-trust-a security assessment model for infrastructure as a service (iaas) clouds
-
D. Gonzales et al, "Cloud-trust-A Security Assessment Model for Infrastructure as a Service (Iaas) Clouds, " IEEE Trans. Cloud Computing, vol. PP, no. 99, 2015, pp. 1-1.
-
(2015)
IEEE Trans. Cloud Computing
, vol.PP
, Issue.99
, pp. 1
-
-
Gonzales, D.1
-
8
-
-
84929323807
-
Credit-based runtime placement of virtual machines on a single numa system for qos of data access performance
-
June
-
C. Kim and K. H. Park, "Credit-Based Runtime Placement of Virtual Machines on a Single Numa System for QoS of Data Access Performance, " IEEE Trans. Computers, vol. 64, no. 6, June 2015, pp. 1633-46.
-
(2015)
IEEE Trans. Computers
, vol.64
, Issue.6
, pp. 1633-1646
-
-
Kim, C.1
Park, K.H.2
-
9
-
-
84979609826
-
Fog-computing based radio access networks: Issues and challenges
-
July
-
M. Peng et al, "Fog-Computing Based Radio Access Networks: Issues and Challenges, " IEEE Network, vol. 30, no. 4, July 2016, pp. 46-53.
-
(2016)
IEEE Network
, vol.30
, Issue.4
, pp. 46-53
-
-
Peng, M.1
-
10
-
-
85016254273
-
Privacy protection and intrusion avoidance for cloudletbased medical data sharing
-
M. Chen et al, "Privacy Protection and Intrusion Avoidance for Cloudletbased Medical Data Sharing, " IEEE Trans. Cloud Computing, vol. PP, no. 99, 2016, pp. 1-1.
-
(2016)
IEEE Trans. Cloud Computing
, vol.PP
, Issue.99
, pp. 1
-
-
Chen, M.1
-
11
-
-
84966662927
-
Assessment of the suitability of fog computing in the context of internet of things
-
S. Sarkar, S. Chatterjee, and S. Misra, "Assessment of the Suitability of Fog Computing in the Context of Internet of Things, " IEEE Trans. Cloud Computing, vol. PP, no. 99, 201, pp. 1-15.
-
IEEE Trans. Cloud Computing
, vol.201 PP
, Issue.99
, pp. 1-15
-
-
Sarkar, S.1
Chatterjee, S.2
Misra, S.3
-
12
-
-
84886723209
-
A survey on security issues and solutions at diferent layers of cloud computing
-
C. Modi et al, "A Survey on Security Issues and Solutions at Diferent Layers of Cloud Computing, " J. Supercomputing, vol. 63, no. 2, 2013, pp. 561-92.
-
(2013)
J. Supercomputing
, vol.63
, Issue.2
, pp. 561-592
-
-
Modi, C.1
-
13
-
-
84939506714
-
Cloudlet mesh for securing mobile clouds from intrusions and network attacks
-
Mar. 2015
-
Y. Shi, S. Abhilash, and K. Hwang, "Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks, " 2015 3rd IEEE Int'l. Conf. Mobile Cloud Computing, Services, and Engineering, Mar. 2015, pp. 109-18.
-
2015 3rd IEEE int'L. Conf. Mobile Cloud Computing, Services, and Engineering
, pp. 109-118
-
-
Shi, Y.1
Abhilash, S.2
Hwang, K.3
-
14
-
-
84979088428
-
Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures
-
Sept.
-
D. He et al, "Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures, " IEEE Trans. Info. Forensics and Security, vol. 11, no. 9, Sept. 2016, pp. 2052-64.
-
(2016)
IEEE Trans. Info. Forensics and Security
, vol.11
, Issue.9
, pp. 2052-2064
-
-
He, D.1
-
15
-
-
79961218736
-
Notice of violation of ieee publication principles peformance analysis of data encryption algo-rithms
-
Apr.
-
O. P. Verma et al, "Notice of Violation of IEEE Publication Principles Peformance Analysis of Data Encryption Algo-rithms, " 2011 3rd Int'l. Conf. Electronics Computer Technology, vol. 5, Apr. 2011, pp. 399-403.
-
(2011)
2011 3rd int'L. Conf. Electronics Computer Technology
, vol.5
, pp. 399-403
-
-
Verma, O.P.1
|