Author of the publication

An Online Robust Resource Allocation Algorithm for Mobile Edge Computing.

, , , and . IEEE Wirel. Commun. Lett., 13 (7): 2013-2017 (July 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks., , , and . Future Gener. Comput. Syst., (2017)SSL-STR: Semi-Supervised Learning for Sparse Trust Recommendation., , , , and . GLOBECOM, page 1-6. IEEE, (2019)Anonymous three-factor authenticated key agreement for wireless sensor networks., , , and . Wireless Networks, 25 (4): 1461-1475 (2019)Data Interpolating over RFID Data Streams for Missed Readings., , , and . WAIM Workshops, volume 7901 of Lecture Notes in Computer Science, page 257-265. Springer, (2013)Inferring Patterns for Taint-Style Vulnerabilities With Security Patches., , , and . IEEE Access, (2019)A Holistic Client Selection Scheme in Federated Mobile CrowdSensing Based on Reverse Auction., , , , and . CSCWD, page 1305-1310. IEEE, (2022)GDTM: Gaussian Differential Trust Mechanism for Optimal Recommender System., , , , , , and . ICA3PP (6), volume 14492 of Lecture Notes in Computer Science, page 78-92. Springer, (2023)PEM4RFID: Privacy Enhancement Model for RFID Systems., , , , , and . ICA3PP (3), volume 9530 of Lecture Notes in Computer Science, page 682-694. Springer, (2015)A Knowledge-Based Multiplayer Collaborative Routing in Opportunistic Networks., , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 16-21. IEEE, (2019)A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr Signature., , and . NaNA, page 279-285. IEEE Computer Society, (2017)