CSpace

浏览/检索结果: 共369条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Suppressing the Interference Within a Datacenter: Theorems, Metric and Strategy 期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2024, 卷号: 35, 期号: 5, 页码: 732-750
作者:  Liu, Yuhang;  Deng, Xin;  Zhou, Jiapeng;  Chen, Mingyu;  Bao, Yungang
收藏  |  浏览/下载:8/0  |  提交时间:2024/05/20
Interference  Tail  Quality of service  Entropy  Throughput  Cloud computing  Resource management  Datacenter  high-throughput  performance uncertainty  quality of services (QoS)  resource contention  
Collaboration of Heterogeneous Edge Computing Paradigms: How to Fill the Gap Between Theory and Practice 期刊论文
IEEE WIRELESS COMMUNICATIONS, 2024, 卷号: 31, 期号: 1, 页码: 110-117
作者:  Cai, Qing;  Zhou, Yiqing;  Liu, Ling;  Qi, Yanli;  Pan, Zhengang;  Zhang, Haoyue
收藏  |  浏览/下载:6/0  |  提交时间:2024/05/20
Cloud computing  Delays  Collaboration  Edge computing  Uplink  Energy consumption  Task analysis  
ACPR: Adaptive Classification Predictive Repair Method for Different Fault Scenarios 期刊论文
IEEE ACCESS, 2024, 卷号: 12, 页码: 4631-4641
作者:  Song, Ying;  Zheng, Peisen;  Tian, Yingai;  Wang, Bo
收藏  |  浏览/下载:8/0  |  提交时间:2024/05/20
Distributed storage system  data recovery  erasure coding  
VSA-SD: A Service Discovery Method Based on Vector Symbol Architecture for Low-Cost IoT System Development 期刊论文
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 卷号: 12, 期号: 1, 页码: 145-158
作者:  Chen, Haiming;  Wang, Lei;  Qin, Wei;  Zhou, Xinyan;  Cui, Li
收藏  |  浏览/下载:7/0  |  提交时间:2024/05/20
Internet of Things  Cloud computing  Delays  Computer architecture  Task analysis  Peer-to-peer computing  Scalability  Internet of things (IoT)  service discovery  vector symbol architecture  
Information Superbahn: Towards a Planet-Scale, Low-Entropy and High-Goodput Computing Utility 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2023, 卷号: 38, 期号: 1, 页码: 103-114
作者:  Xu, Zhi-Wei;  Li, Zhen-Ying;  Yu, Zi-Shu;  Li, Feng-Zhi
收藏  |  浏览/下载:13/0  |  提交时间:2023/12/04
cloud computing  computing utility  utilization  low-entropy system  high-goodput computing  
Deadline and Reliability Aware Multiserver Configuration Optimization for Maximizing Profit 期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2022, 卷号: 33, 期号: 12, 页码: 3772-3786
作者:  Wang, Tian;  Zhou, Junlong;  Li, Liying;  Zhang, Gongxuan;  Li, Keqin;  Hu, Xiaobo Sharon
收藏  |  浏览/下载:37/0  |  提交时间:2022/12/07
Cloud computing  Servers  Reliability  Business  Computer architecture  Real-time systems  Processor scheduling  Cloud service  deadline miss rate  multiserver configuration  profit maximization  soft error reliability  
Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles 期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 卷号: 71, 期号: 11, 页码: 12250-12263
作者:  Shen, Meng;  Lu, Hao;  Wang, Fei;  Liu, Huisen;  Zhu, Liehuang
收藏  |  浏览/下载:17/0  |  提交时间:2023/07/12
Blockchain  identity authentication  Internet-of-Vehicles  
Multiserver configuration for cloud service profit maximization in the presence of soft errors based on grouped grey wolf optimizer 期刊论文
JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 卷号: 127, 页码: 12
作者:  Cong, Peijin;  Hou, Xiangpeng;  Zou, Minhui;  Dong, Jiangshan;  Chen, Mingsong;  Zhou, Junlong
收藏  |  浏览/下载:24/0  |  提交时间:2022/12/07
Cloud computing  Multiserver configuration  Deadline miss rate  Soft error reliability  Profit  
LIAS: A Lightweight Incentive Authentication Scheme for Forensic Services in IoV 期刊论文
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2022, 页码: 16
作者:  Zhang, Mingyue;  Zhou, Junlong;  Cong, Peijin;  Zhang, Gongxuan;  Zhuo, Cheng;  Hu, Shiyan
收藏  |  浏览/下载:23/0  |  提交时间:2022/12/07
Forensics  Authentication  Security  Privacy  Computer architecture  Cameras  Message authentication  Anonymous authentication  forensic service  lightweight  incentive  Internet of Vehicles  security  
A differentially private indoor localization scheme with fusion of WiFi and bluetooth fingerprints in edge computing 期刊论文
NEURAL COMPUTING & APPLICATIONS, 2022, 页码: 22
作者:  Zhang, Xuejun;  He, Fucun;  Chen, Qian;  Jiang, Xinlong;  Bao, Junda;  Ren, Tongwei;  Du, Xiaogang
收藏  |  浏览/下载:23/0  |  提交时间:2022/12/07
Location privacy  Edge computing  Differential privacy  Fusion semi-supervised extreme learning machine  Indoor localization