Author of the publication

Joint Chain-Based Service Provisioning and Request Scheduling for Blockchain-Powered Edge Computing.

, , , , , , and . IEEE Internet Things J., 8 (4): 2135-2149 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multicast routing with uncertain sources in software-defined network., , , and . IWQoS, page 1-6. IEEE, (2016)Efficient Data Placement and Retrieval Services in Edge Computing., , , , , and . ICDCS, page 1029-1039. IEEE, (2019)Cutting Long-Tail Latency of Routing Response in Software Defined Networks., , , , and . IEEE J. Sel. Areas Commun., 36 (3): 384-396 (2018)Efficient Multicast Routing on BCube-Based Data Centers., , , , and . KSII Trans. Internet Inf. Syst., 8 (12): 4343-4355 (2014)Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center Networks., , , , , and . IEEE Trans. Parallel Distributed Syst., 26 (4): 997-1009 (2015)Athena: A Fault-Tolerant, Efficient and Applicable Routing Mechanism for Data Centers., , , and . ICA3PP (1), volume 8630 of Lecture Notes in Computer Science, page 549-562. Springer, (2014)Leverage similarity and locality to enhance fingerprint prefetching of data deduplication., , and . ICPADS, page 142-149. IEEE Computer Society, (2014)DiffDec: Structure-Aware Scaffold Decoration with an End-to-End Diffusion Model., , , and . J. Chem. Inf. Model., 64 (7): 2554-2564 (2024)Tiger Tally: A secure IoT data management approach based on redactable blockchain., , , , , and . Comput. Networks, (2024)Source selection problem in multi-source multi-destination multicasting., , , , and . Comput. Networks, (2017)