-
1
-
-
84963757817
-
Mobile edge computing-A key technology towards 5G
-
Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young. Mobile edge computing-A key technology towards 5G. ETSI White Paper, 11, 2015.
-
(2015)
ETSI White Paper
, vol.11
-
-
Hu, Y.C.1
Patel, M.2
Sabella, D.3
Sprecher, N.4
Young, V.5
-
2
-
-
85184373237
-
A survey on mobile edge computing. in
-
A. Ahmed and E. Ahmed. A survey on mobile edge computing. In IEEE ISCO, 2016.
-
(2016)
IEEE ISCO
-
-
Ahmed, A.1
Ahmed, E.2
-
3
-
-
85028938263
-
-
Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief. Mobile edge computing: Survey and research outlook. arXiv preprint arXiv:1701.01090, 2017.
-
(2017)
Mobile Edge Computing: Survey and Research Outlook
-
-
Mao, Y.1
You, C.2
Zhang, J.3
Huang, K.4
Letaief, K.B.5
-
4
-
-
85009814691
-
Dynamic computation offloading for mobile-edge computing with energy harvesting devices
-
Y. Mao, J. Zhang, and K. B. Letaief. Dynamic computation offloading for mobile-edge computing with energy harvesting devices. IEEE JSAC, 34(12):3590-3605, 2016.
-
(2016)
IEEE JSAC
, vol.34
, Issue.12
, pp. 3590-3605
-
-
Mao, Y.1
Zhang, J.2
Letaief, K.B.3
-
5
-
-
84985893628
-
Delay-optimal computation task scheduling for mobile-edge computing systems. in
-
J. Liu, Y. Mao, J. Zhang, and K. B. Letaief. Delay-optimal computation task scheduling for mobile-edge computing systems. In IEEE ISIT, 2016.
-
(2016)
IEEE ISIT
-
-
Liu, J.1
Mao, Y.2
Zhang, J.3
Letaief, K.B.4
-
6
-
-
85015380112
-
Online learning for offloading and autoscaling in renewable-powered mobile edge computing. in
-
J. Xu and S. Ren. Online learning for offloading and autoscaling in renewable-powered mobile edge computing. In IEEE GLOBECOM, 2016.
-
(2016)
IEEE GLOBECOM
-
-
Xu, J.1
Ren, S.2
-
7
-
-
85015372405
-
Multiuser resource allocation for mobile-edge computation offloading. in
-
C. You and K. Huang. Multiuser resource allocation for mobile-edge computation offloading. In IEEE GLOBECOM, 2016.
-
(2016)
IEEE GLOBECOM
-
-
You, C.1
Huang, K.2
-
8
-
-
85015384872
-
Efficient multi-user computation offloading for mobile-edge cloud computing
-
X. Chen, L. Jiao, W. Li, and X. Fu. Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Transactions on Networking, 24(5):2795-2808, 2016.
-
(2016)
IEEE/ACM Transactions on Networking
, vol.24
, Issue.5
, pp. 2795-2808
-
-
Chen, X.1
Jiao, L.2
Li, W.3
Fu, X.4
-
9
-
-
85029659094
-
Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges
-
R. Roman, J. Lopez, and M. Mambo. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Elsevier Future Generation Computer Systems, 2016.
-
(2016)
Elsevier Future Generation Computer Systems
-
-
Roman, R.1
Lopez, J.2
Mambo, M.3
-
10
-
-
84943612463
-
Security and privacy issues of fog computing: A survey
-
Springer
-
S. Yi, Z. Qin, and Q. Li. Security and privacy issues of fog computing: A survey. In International Conference on Wireless Algorithms, Systems, and Applications, pages 685-695. Springer, 2015.
-
(2015)
International Conference on Wireless Algorithms, Systems, and Applications
, pp. 685-695
-
-
Yi, S.1
Qin, Z.2
Li, Q.3
-
11
-
-
81455148130
-
Fast reinforcement learning for energy-efficient wireless communication
-
N. Mastronarde and M. Van der Schaar. Fast reinforcement learning for energy-efficient wireless communication. IEEE Transactions on Signal Processing, 59(12):6262-6266, 2011.
-
(2011)
IEEE Transactions on Signal Processing
, vol.59
, Issue.12
, pp. 6262-6266
-
-
Mastronarde, N.1
Van Der Schaar, M.2
-
13
-
-
85009817152
-
D2D fogging: An energy-efficient and incentive-aware task offloading framework via network-assisted D2D collaboration
-
L. Pu, X. Chen, J. Xu, and X. Fu. D2D fogging: An energy-efficient and incentive-aware task offloading framework via network-assisted D2D collaboration. IEEE JSAC, 34(12):3887-3901, 2016.
-
(2016)
IEEE JSAC
, vol.34
, Issue.12
, pp. 3887-3901
-
-
Pu, L.1
Chen, X.2
Xu, J.3
Fu, X.4
-
14
-
-
84879515461
-
Who do you sync you are?: Smartphone fingerprinting via application behaviour. in
-
T. Stöber, M. Frank, J. Schmitt, and I. Martinovic. Who do you sync you are?: Smartphone fingerprinting via application behaviour. In ACM WiSec, 2013.
-
(2013)
ACM WiSec
-
-
Stöber, T.1
Frank, M.2
Schmitt, J.3
Martinovic, I.4
-
15
-
-
84928136695
-
Can't you hear me knocking: Identification of user actions on android apps via traffic analysis. in
-
M. Conti, L. V. Mancini, R. Spolaor, and N. V. Verde. Can't you hear me knocking: Identification of user actions on android apps via traffic analysis. In ACM CODASPY, 2015.
-
(2015)
ACM CODASPY
-
-
Conti, M.1
Mancini, L.V.2
Spolaor, R.3
Verde, N.V.4
-
17
-
-
13244278201
-
An actor-critic algorithm for constrained Markov decision processes
-
V. S. Borkar. An actor-critic algorithm for constrained Markov decision processes. Systems & control letters, 54(3):207-213, 2005.
-
(2005)
Systems & Control Letters
, vol.54
, Issue.3
, pp. 207-213
-
-
Borkar, V.S.1
-
18
-
-
85015451847
-
Power-delay tradeoff in multi-user mobile-edge computing systems. in
-
Y. Mao, J. Zhang, S. H. Song, and K. B. Letaief. Power-delay tradeoff in multi-user mobile-edge computing systems. In IEEE GLOBECOM, 2016.
-
(2016)
IEEE GLOBECOM
-
-
Mao, Y.1
Zhang, J.2
Song, S.H.3
Letaief, K.B.4
-
19
-
-
85184381198
-
Energy efficiency of mobile clients in cloud computing. in
-
A. P. Miettinen and J. K. Nurminen. Energy efficiency of mobile clients in cloud computing. In ACM USENIX, 2010.
-
(2010)
ACM USENIX
-
-
Miettinen, A.P.1
Nurminen, J.K.2
-
20
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
W. Du and M. J. Atallah. Secure multi-party computation problems and their applications: A review and open problems. In ACM Workshop on New Security Paradigms, 2001.
-
(2001)
ACM Workshop on New Security Paradigms
-
-
Du, W.1
Atallah, M.J.2
-
21
-
-
67650655439
-
Differential privacy: A survey of results
-
C. Dwork. Differential privacy: A survey of results. In TAMC, 2008.
-
(2008)
TAMC
-
-
Dwork, C.1
-
23
-
-
85184362481
-
Location privacy leaking from spectrum utilization information in database-driven cognitive radio network. in
-
Z. Gao, H. Zhu, Y. Liu, M. Li, and Z. Cao. Location privacy leaking from spectrum utilization information in database-driven cognitive radio network. In ACM CCS, 2012.
-
(2012)
ACM CCS
-
-
Gao, Z.1
Zhu, H.2
Liu, Y.3
Li, M.4
Cao, Z.5
-
24
-
-
84881316459
-
Providing source location privacy in wireless sensor networks: A survey
-
M. Conti, J. Willemsen, and B. Crispo. Providing source location privacy in wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 15(3):1238-1280, 2013.
-
(2013)
IEEE Communications Surveys & Tutorials
, vol.15
, Issue.3
, pp. 1238-1280
-
-
Conti, M.1
Willemsen, J.2
Crispo, B.3
-
25
-
-
84866628169
-
Trajectory privacy in location-based services and data publication
-
C. Y. Chow and M. F. Mokbel. Trajectory privacy in location-based services and data publication. ACM SIGKDD Explorations Newsletter, 13(1):19-29, 2011.
-
(2011)
ACM SIGKDD Explorations Newsletter
, vol.13
, Issue.1
, pp. 19-29
-
-
Chow, C.Y.1
Mokbel, M.F.2
|