Results 11 to 20 of about 740,059 (292)

Workload Orchestration in Multi-Access Edge Computing Using Belief Rule-Based Approach

open access: yesIEEE Access, 2023
Multi-access Edge Computing (MEC) is a standard network architecture for edge computing, which is proposed to handle enormous computation demands from emerging resource-intensive and latency-sensitive applications and services as well as accommodate ...
Mohammad Newaj Jamil   +3 more
doaj   +1 more source

SAMI: Service-Based Arbitrated Multi-Tier Infrastructure for Mobile Cloud Computing [PDF]

open access: yes, 2012
Mobile Cloud Computing (MCC) is the state-ofthe- art mobile computing technology aims to alleviate resource poverty of mobile devices. Recently, several approaches and techniques have been proposed to augment mobile devices by leveraging cloud computing.
Abolfazli, Saeid   +3 more
core   +2 more sources

Publishing Node Strength Distribution With Node Differential Privacy

open access: yesIEEE Access, 2020
The challenge of graph data publishing under node-differential privacy mainly comes from the high sensitivity of the query. Compared with edge-differential privacy that can only protect the relationship between people, node-differential privacy can ...
Ganghong Liu, Xuebin Ma, Wuyungerile Li
doaj   +1 more source

Key Management for Hierarchical Wireless Sensor Networks: A Robust Scheme [PDF]

open access: yesEAI Endorsed Transactions on Internet of Things, 2020
Secure data transmission within the wireless sensor networks (WSNs) is a critical issue as they are mostly deployed in the open areas. Moreover, the communication between the cluster head (CH) and the base station(BS) in a hierarchical
Anubrata Chanda   +2 more
doaj   +1 more source

Mobile Agents for Mobile Tourists: A User Evaluation of Gulliver's Genie [PDF]

open access: yes, 2005
How mobile computing applications and services may be best designed, implemented and deployed remains the subject of much research. One alternative approach to developing software for mobile users that is receiving increasing attention from the research ...
O'Grady, M., O'Hare, G.M.P., Sas, Corina
core   +1 more source

Offloading Optimization for Low-Latency Secure Mobile Edge Computing Systems [PDF]

open access: yes, 2020
This paper proposes a low-latency secure mobile edge computing (MEC) system where multiple users offload computing tasks to a base station in the presence of an eavesdropper.
Elkashlan, Maged   +7 more
core   +2 more sources

Credibility in Online Social Networks: A Survey

open access: yesIEEE Access, 2019
The importance of information credibility in society cannot be underestimated given that it is at the heart of all decision-making. Generally, more information is better; however, knowing the value of this information is essential for the decision-making
Majed Alrubaian   +5 more
doaj   +1 more source

Sustainable mobile computing [PDF]

open access: yesComputing, 2013
Mobile computing has the potential to enable a large class of applications, such as smart phone, mobile internet, mobile game and mobile multimedia, etc. However, as a high-tech, it is also a high-energy-consuming one. Sustainable mobile computing with the aiming of energy costs and CO2 emissions’ reducing, and environment protecting, has become a ...
Yuhang Yang, Maode Ma
openaire   +1 more source

RLAuth: A Risk-Based Authentication System Using Reinforcement Learning

open access: yesIEEE Access, 2023
Conventional authentication systems, that are used to protect most modern mobile applications, are faced with usability and security problems related to their static and one-shot nature.
Claudy Picard, Samuel Pierre
doaj   +1 more source

Mirroring Mobile Phone in the Clouds [PDF]

open access: yes, 2014
This paper presents a framework of Mirroring Mobile Phone in the Clouds (MMPC) to speed up data/computing intensive applications on a mobile phone by taking full advantage of the super computing power of the clouds.
Dimitrakos, Theo   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy