(Note: the search results are based on claimed items)

Browse/Search Results: 1-10 of 18

Filters

    
Selected(0)Clear Items/Page:    Sort:
SecEG: A Secure and Efficient Strategy against DDoS Attacks in Mobile Edge Computing Journal article
ACM Transactions on Sensor Networks,2024, volume: 20, issue: 3
Authors:  Huang, Haiyang;  Meng, Tianhui;  Guo, Jianxiong;  Wei, Xuekai;  Jia, Weijia
Favorite  |  View/Download:5/0  |  Submit date:2024/06/13
AucSwap: A Vickrey auction modeled decentralized cross-blockchain asset transfer protocol Journal article
Journal of Systems Architecture,2021, volume: 117
Authors:  Liu, Weiwei;  Wu, Huaming;  Meng, Tianhui;  Wang, Rui;  Wang, Yang
Favorite  |  View/Download:2/0  |  Submit date:2025/02/20
On Consortium Blockchain Consistency: A Queueing Network Model Approach Journal article
IEEE Transactions on Parallel and Distributed Systems,2021, volume: 32, issue: 6, pages: 1369-1382
Authors:  Meng, Tianhui;  Zhao, Yubin;  Wolter, Katinka;  Xu, Cheng Zhong
Favorite  |  View/Download:2/0  |  Submit date:2025/02/20
CoOMO: Cost-efficient computation outsourcing with multi-site offloading for mobile-edge services Conference paper
Proceedings - 2020 16th International Conference on Mobility, Sensing and Networking, MSN 2020, Sensing and Networking, DEC 17-19, 2020
Authors:  Meng, Tianhui;  Wu, Huaming;  Shang, Zhihao;  Zhao, Yubin;  Xu, Cheng Zhong
Favorite  |  View/Download:2/0  |  Submit date:2025/02/20
RS-pCloud: A Peer-to-Peer Based Edge-Cloud System for Fast Remote Sensing Image Processing Conference paper
Proceedings - 2020 IEEE 13th International Conference on Edge Computing, EDGE 2020, ELECTR NETWORK, OCT 18-24, 2020
Authors:  Sun, Tongzheng;  Xiong, Jingpan;  Wang, Yang;  Meng, Tianhui;  Chen, Xi
Favorite  |  View/Download:2/0  |  Submit date:2025/02/20
NLC: An Efficient Caching Algorithm Based on Non-critical Path Least Counts for In-Memory Computing Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Honolulu, 18 September 2020-20 September 2020
Authors:  Lv, Jingya;  Wang, Yang;  Meng, Tianhui;  Xu, Cheng zhong
Favorite  |  View/Download:2/0  |  Submit date:2025/02/20
Performance Evaluation on Blockchain Systems: A Case Study on Ethereum, Fabric, Sawtooth and Fisco-Bcos Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Honolulu, 18 September 2020-20 September 2020
Authors:  Wang, Rui;  Ye, Kejiang;  Meng, Tianhui;  Xu, Cheng Zhong
Favorite  |  View/Download:2/0  |  Submit date:2025/02/20
A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks Journal article
Pervasive and Mobile Computing,2018, volume: 45, pages: 4-18
Authors:  Meng, Tianhui;  Wolter, Katinka;  Wu, Huaming;  Wang, Qiushi
Favorite  |  View/Download:2/0  |  Submit date:2025/02/20
An empirical performance and security evaluation of android container solutions Conference paper
2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, 19 June 2017-20 June 2017
Authors:  Meng, Tianhui;  Shang, Zhihao;  Wolter, Katinka
Favorite  |  View/Download:2/0  |  Submit date:2025/02/20
Hyperstar2: Easy distribution fitting of correlated data Conference paper
ICPE 2017 - Proceedings of the 2017 ACM/SPEC International Conference on Performance Engineering, L'Aquila, 22 April 2017-26 April 2017
Authors:  Shang, Zhihao;  Meng, Tianhui;  Wolter, Katinka
Favorite  |  View/Download:3/0  |  Submit date:2025/02/20