Author of the publication

A Profit Maximization Strategy of MEC Resource Provider in the Satellite-Terrestrial Double Edge Computing System.

, , , and . ICCT, page 906-912. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recognition effect of models based on different microscope objectives., , , , , , , , , and . ISAIMS, page 133-141. ACM, (2022)PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments., , , , , , and . Trans. Emerg. Telecommun. Technol., (May 2023)2D-DLPP Algorithm Based on SPD Manifold Tangent Space., , and . ICIC (4), volume 14089 of Lecture Notes in Computer Science, page 201-212. Springer, (2023)Happy Toilet: A Social Analytics Approach to the Study of Public Toilet Cleanliness., , , , , and . IEEE BigData, page 6024-6026. IEEE, (2019)A framework for stock selection via concept-oriented attention representation in hypergraph neural network., , , and . Knowl. Based Syst., (2024)A Novel and Efficient Anonymous Authentication Scheme Based on Extended Chebyshev Chaotic Maps for Smart Grid., , , and . WoWMoM, page 288-293. IEEE, (2022)Reduced-Order Observer Based-Fault Estimation for Markovian Jump Systems With Time-Varying Generally Uncertain Transition Rates., and . IEEE Trans. Circuits Syst. I Regul. Pap., 67-I (8): 2803-2815 (2020)A Profit Maximization Strategy of MEC Resource Provider in the Satellite-Terrestrial Double Edge Computing System., , , and . ICCT, page 906-912. IEEE, (2021)Throughput and Delay Analysis on Uncoded and Coded Wireless Broadcast with Hard Deadline Constraints., , and . INFOCOM, page 136-140. IEEE, (2010)Dynamic memory-based event-triggered security control for networked control systems subjected to false-injection-data attack., , and . Syst. Control. Lett., (2024)