Efficient computation offloading for Internet of Vehicles in edge computing-assisted 5G networks (English)
- New search for: Wan, Shaohua
- Further information on Wan, Shaohua:
- https://orcid.org/0000-0001-7013-9081
- New search for: Li, Xiang
- New search for: Xue, Yuan
- New search for: Lin, Wenmin
- New search for: Xu, Xiaolong
- New search for: Wan, Shaohua
- Further information on Wan, Shaohua:
- https://orcid.org/0000-0001-7013-9081
- New search for: Li, Xiang
- New search for: Xue, Yuan
- New search for: Lin, Wenmin
- New search for: Xu, Xiaolong
In:
The Journal of Supercomputing
;
76
, 4
; 2518-2547
;
2019
-
ISSN:
- Article (Journal) / Print
-
Title:Efficient computation offloading for Internet of Vehicles in edge computing-assisted 5G networks
-
Contributors:Wan, Shaohua ( author ) / Li, Xiang ( author ) / Xue, Yuan ( author ) / Lin, Wenmin ( author ) / Xu, Xiaolong ( author )
-
Published in:The Journal of Supercomputing ; 76, 4 ; 2518-2547
-
Publisher:
- New search for: Springer US
- New search for: Springer
-
Place of publication:New york, NY
-
Publication date:2019
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 770/3155
- New search for: 54.20
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents – Volume 76, Issue 4
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 2239
-
Editor’s note| 2020
- 2240
-
Research on a distributed auto-negotiation model based on Stackelberg game theoryTian, Ran / Li, Shanwei / Yang, Guoying et al. | 2020
- 2252
-
Development of software reliability models using a hybrid approach and validation of the proposed models using big dataGovindasamy, P. / Dillibabu, R. et al. | 2020
- 2266
-
Empirical study on application of machine learning techniques for resource allocation in health care using KPISkylakha, S. / Sakthivel, P. / Arunselvan, K. S. et al. | 2020
- 2275
-
Performance analysis of data compression algorithms for heterogeneous architecture through parallel approachMahammad, Farooq Sunar / Viswanatham, V. Madhu et al. | 2020
- 2289
-
Comparative study of illumination-invariant foreground detectionKarthikeyan, P. R. / Sakthivel, P. / Karthik, T. S. et al. | 2020
- 2302
-
Internet-of-Things-aided energy management in smart grid environmentAmarnath, D. / Sujatha, S. et al. | 2020
- 2315
-
Rio: a personal storage system in multi-device and cloudWang, Feng / Wu, Yanjun / Huang, Feiyue et al. | 2020
- 2339
-
Modeling neutrosophic variables based on particle swarm optimization and information theory measures for forest firesGafar, Mona Gamal / Elhoseny, Mohamed / Gunasekaran, M. et al. | 2020
- 2357
-
Research on feature extraction and segmentation of rover wheel imprintLi, Nan / Gao, Hai-bo / Ding, Liang / Lv, Feng-tian / Bi, Zhong-yan / Wang, Yi-da et al. | 2020
- 2374
-
A new algorithm of stock data mining in Internet of Multimedia ThingsYang, Jinfei / Li, Jiajia / Liu, Shouqiang et al. | 2020
- 2390
-
A robust extreme learning machine framework for uncertain data classificationJing, Shibo / Yang, Liming et al. | 2020
- 2417
-
Research on the evolution of participants collaboration mechanism in PPP model based on computer simulation: based on the old community renovation projectGuo, Bin / Li, Jiamin et al. | 2020
- 2435
-
Early warning indexes determination of the crop injuries caused by waterlogging based on DHSVM modelMa, Yan / Xiong, Qinxue / Zhu, Jianqiang / Jiang, Shunyao et al. | 2020
- 2449
-
Measuring data-centre workflows complexity through process mining: the Google cluster caseFernández-Cerero, Damián / Varela-Vaca, Ángel Jesús / Fernández-Montes, Alejandro / Gómez-López, María Teresa / Alvárez-Bermejo, José Antonio et al. | 2020
- 2479
-
Binary cuckoo search metaheuristic-based supercomputing framework for human behavior analysis in smart homeKaur, Maninder / Kaur, Gurpreet / Sharma, Pradip Kumar / Jolfaei, Alireza / Singh, Dhananjay et al. | 2020
- 2503
-
Classification of the tree for aerial image using a deep convolution neural network and visual feature clusteringLin, Chuen Horng / Yu, Chia Ching / Wang, Ting You / Chen, Tsung Yi et al. | 2020
- 2518
-
Efficient computation offloading for Internet of Vehicles in edge computing-assisted 5G networksWan, Shaohua / Li, Xiang / Xue, Yuan / Lin, Wenmin / Xu, Xiaolong et al. | 2020
- 2548
-
A context-aware encryption protocol suite for edge computing-based IoT devicesDar, Zaineb / Ahmad, Adnan / Khan, Farrukh Aslam / Zeshan, Furkh / Iqbal, Razi / Sherazi, Hafiz Husnain Raza / Bashir, Ali Kashif et al. | 2020
- 2568
-
An ANFIS-based compatibility scorecard for IoT integration in websitesKumar, Akshi / Arora, Anshika et al. | 2020
- 2597
-
Mining image frequent patterns based on a frequent pattern list in image databasesChang, Ye-In / Shen, Jun-Hong / Li, Chia-En / Chen, Zih-Siang / Tu, Ming-Hsuan et al. | 2020
- 2622
-
Vulnerability assessment method for cyber-physical system considering node heterogeneityWang, Bo / Ma, Hengrui / Wang, Xunting / Deng, Guiping / Yang, Yan / Wan, Shaohua et al. | 2020
- 2643
-
Threats on the horizon: understanding security threats in the era of cyber-physical systemsWalker-Roberts, Steven / Hammoudeh, Mohammad / Aldabbas, Omar / Aydin, Mehmet / Dehghantanha, Ali et al. | 2020
- 2665
-
Securing smart vehicles from relay attacks using machine learningAhmad, Usman / Song, Hong / Bilal, Awais / Alazab, Mamoun / Jolfaei, Alireza et al. | 2020
- 2683
-
A generalized pixel value ordering data hiding with adaptive embedding capabilityLee, Chin-Feng / Shen, Jau-Ji / Agrawal, Somya / Tseng, Yu-Ju / Kao, Yu-Chi et al. | 2020
- 2715
-
Theoretical modeling for performance analysis of IEEE 1901 power-line communication networks in the multi-hop environmentHao, Sheng / Zhang, Hu-yin et al. | 2020
- 2748
-
HPDMS: high-performance data harvesting in wireless sensor networks with mobile sinksNajjar-Ghabel, Samad / Farzinvash, Leili / Razavi, Seyed Naser et al. | 2020
- 2777
-
A framework for IoT service selectionBaranwal, Gaurav / Singh, Manisha / Vidyarthi, Deo Prakash et al. | 2020
- 2815
-
Structured mesh-oriented framework design and optimization for a coarse-grained parallel CFD solver based on hybrid MPI/OpenMP programmingHe, Feng / Dong, Xiaoshe / Zou, Nianjun / Wu, Weiguo / Zhang, Xingjun et al. | 2020
- 2842
-
A matrix representation method for decoders using majority gate characteristics in quantum-dot cellular automataDeng, Feifei / Xie, Guangjun / Zhu, Renjun / Zhang, Yongqiang et al. | 2020
- 2860
-
Integration and exploitation of intra-routine malleability in BLISRodríguez-Sánchez, Rafael / Igual, Francisco D. / Quintana-Ortí, Enrique S. et al. | 2020
- 2876
-
Challenges of server consolidation in virtualized data centers and open research issues: a systematic literature reviewAbadi, Reza Mohamadi Bahram / Rahmani, Amir Masoud / Alizadeh, Sasan Hossein et al. | 2020
- 2928
-
Correction to: Challenges of server consolidation in virtualized data centers and open research issues: a systematic literature reviewAbadi, Reza Mohamadi Bahram / Rahmani, Amir Masoud / Alizadeh, Sasan Hossein et al. | 2020
- 2929
-
Exemplar-based data stream clustering toward Internet of ThingsJiang, Yizhang / Bi, Anqi / Xia, Kaijian / Xue, Jing / Qian, Pengjiang et al. | 2020
- 2958
-
A quantitative evaluation of unified memory in GPUsYu, Qi / Childers, Bruce / Huang, Libo / Qian, Cheng / Wang, Zhiying et al. | 2020
- 2986
-
An optimized time series combined forecasting method based on neural networksZhao, Kaiyi / Li, Li / Cai, Saihua / Sun, Ruizhi et al. | 2020
- 3013
-
A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developmentsVarri, Umasankararao / Pasupuleti, Syamkumar / Kadambari, K. V. et al. | 2020
- 3043
-
A novel warp scheduling scheme considering long-latency operations for high-performance GPUsDo, Cong Thuan / Choi, Hong Jun / Chung, Sung Woo / Kim, Cheol Hong et al. | 2020
- 3063
-
Intelligent robust control for cyber-physical systems of rotary gantry type under denial of service attackSayad Haghighi, Mohammad / Farivar, Faezeh / Jolfaei, Alireza / Tadayon, Mohammad Hesam et al. | 2020
- 3086
-
Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIPNikooghadam, Mahdi / Amintoosi, Haleh et al. | 2020
- 3105
-
MBitCuts: optimal bit-level cutting in geometric space packet classificationAbbasi, Mahdi / Vesaghati Fazel, Saeideh / Rafiee, Milad et al. | 2020
- 3129
-
A memory scheduling strategy for eliminating memory access interference in heterogeneous systemFang, Juan / Wang, Mengxuan / Wei, Zelin et al. | 2020
- 3155
-
Correction to: Efficient noise injection for exposing hidden data racesYu, Misun / Ma, Yu-Seung / Bae, Doo-Hwan et al. | 2020