Showing results 1 to 20 of 34
next >
Issue Date | Title | Author(s) |
2020-04-01 | A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems | Xu, X; Zhang, X; Khan, M; Dou, W; Xue, S; Yu, S |
2012-01-01 | A Collaborative QoS-Aware service evaluation method among multi-users for a shared service | Dou, W; Lv, C; Zhang, X; Chen, J |
2013-12-01 | Combining top-down and bottom-up: Scalable sub-tree anonymization over big data using mapreduce on cloud | Zhang, X; Liu, C; Nepal, S; Yang, C; Dou, W; Chen, J |
2013-01-01 | A confidence-based filtering method for DDoS attack defense in cloud environment | Dou, W; Chen, Q; Chen, J |
2011-01 | Connceptualization of a Context Aware Cloud Adaptation (CACA) Framework | Gill, AQ; Bunker, D; Chen, J; Dou, W; Liu, J; Yang, LT; Ma, J |
2021-12-01 | CoPace: Edge Computation Offloading and Caching for Self-Driving with Deep Reinforcement Learning | Tian, H; Xu, X; Qi, L; Zhang, X; Dou, W; Yu, S; Ni, Q |
2022-02-11 | Crowdsourcing-based multi-device communication cooperation for mobile high-quality video enhancement | Wu, X; Qi, L; Xu, X; Yu, S; Dou, W; Zhang, X |
2016-12-01 | DDoS attacks on data plane of software-defined network: are they possible? | Wu, X; Liu, M; Dou, W; Yu, S |
2018-07-27 | A Deadline-Aware Coflow Scheduling Approach for Big Data Applications | Tang, W; Wang, S; Li, D; Huang, T; Dou, W; Yu, S |
2021-04-01 | Edge Computing-Enabled Deep Learning for Real-time Video Optimization in IIoT | Dou, W; Zhao, X; Yin, X; Wang, H; Luo, Y; Qi, L |
2020-10-06 | Game theory for mobile location privacy | Wu, X; Ji, G; Dou, W; Yu, S; Qi, L |
2019-05-01 | A heuristic line piloting method to disclose malicious taxicab driver's privacy over GPS big data | Dou, W; Tang, W; Li, S; Yu, S; Raymond Choo, KK |
2018-01-01 | High Quality Participant Recruitment of Mobile Crowdsourcing over Big Data | Li, S; Zhang, J; Xie, D; Yu, S; Dou, W |
2011-09-29 | A history record-based service optimization method for QoS-aware service composition | Lin, W; Dou, W; Luo, X; Chen, J |
2017-01-01 | How to shutdown a cloud: A DDoS attack in a private infrastructure-as-a-service cloud | Liu, M; Dou, W; Yu, S |
2014-01-01 | A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud | Zhang, X; Liu, C; Nepal, S; Yang, C; Dou, W; Chen, J |
2013-12-01 | A MapReduce based approach of scalable multidimensional anonymization for big data privacy preservation on cloud | Zhang, X; Yang, C; Nepal, S; Liu, C; Dou, W; Chen, J |
2013-04-01 | A method for optimizing top-k composite services towards preference-aware service dominance | Zhang, S; Lin, W; Dou, W; Chen, J |
2017-10-01 | Mobile live video streaming optimization via crowdsourcing brokerage | Wu, T; Dou, W; Ni, Q; Yu, S; Chen, G |
2017-01-01 | Networking for Big Data: A Survey | Yu, S; Liu, M; Dou, W; Liu, X; Zhou, S |