Author of the publication

Cost Efficient Edge Intelligence Framework Using Docker Containers.

, , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 800-807. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CredFinder: A real-time tweets credibility assessing system., , , , and . ASONAM, page 1406-1409. IEEE Computer Society, (2016)Toward Efficient Packet Buffering and Congestion Control Approaches for Reliable Data Delivery in Mobile Ad Hoc Network., , and . IDCS, volume 8223 of Lecture Notes in Computer Science, page 65-77. Springer, (2013)Thermal-Aware Multiconstrained Intrabody QoS Routing for Wireless Body Area Networks., , , , and . Int. J. Distributed Sens. Networks, (2014)A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain., , , , , , , and . IEEE Netw., 35 (1): 204-210 (2021)A lightweight machine learning-based authentication framework for smart IoT devices., , , , , and . Inf. Sci., (2019)Task Offloading and Resource Allocation for Mobile Edge Computing by Deep Reinforcement Learning Based on SARSA., , , , and . IEEE Access, (2020)Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach., , , and . IEEE Access, (2020)TIMCC: On Data Freshness in Privacy-Preserving Incentive Mechanism Design for Continuous Crowdsensing Using Reverse Auction., , , , , and . IEEE Access, (2020)Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model., , , and . IEEE Trans. Ind. Informatics, 16 (9): 6154-6162 (2020)An efficient networking protocol for internet of things to handle multimedia big data., , and . Multim. Tools Appl., 78 (21): 30039-30056 (2019)