UM

Browse/Search Results:  1-8 of 8 Help

Selected(0)Clear Items/Page:    Sort:
A dynamic resource overbooking mechanism in fog computing Conference paper
Proceedings - 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2018
Authors:  Zhang F.;  Tang Z.;  Chen M.;  Zhou X.;  Jia W.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/11
Data stream mining with swarm decision table in fog computing environment Conference paper
ACM International Conference Proceeding Series
Authors:  Li J.;  Fong S.;  Li T.;  Song W.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
Chemical gas sensors  Data analytics  Data mining  Fog computing  Internet of Things  SDT  
Survey on trust evaluation mechanism in sensor-cloud 传感云中的信任评价机制研究进展 Journal article
Tongxin Xuebao/Journal on Communications, 2018,Volume: 39,Issue: 6,Page: 37-51
Authors:  Wang T.;  Zhang G.;  Cai S.;  Jia W.;  Wang G.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/11
Fog computing  Internal attack  Sensor-cloud  Trust evaluation mechanism  
Data stream mining in fog computing environment with feature selection using ensemble of swarm search algorithms Conference paper
2018 Conference on Information Communications Technology and Society, ICTAS 2018 - Proceedings
Authors:  Ma B.B.;  Fong S.;  Millham R.
Favorite  |  View/Download:0/0  |  Submit date:2019/02/13
Data Analytics  Data mining  Fog computing  Gas Sensor  Internet of Things  
Carbon Oxides Gases for Occupancy Counting and Emergency Control in Fog Environment Journal article
SYMMETRY-BASEL, 2018,Volume: 10,Issue: 3
Authors:  Duan, Kairong;  Fong, Simon;  Zhuang, Yan;  Song, Wei
Favorite  |  View/Download:12/0  |  Submit date:2018/10/30
Fog Computing  Wireless Sensor Network  data analytics  Internet of Things  
Big data mining algorithms for fog computing Conference paper
ACM International Conference Proceeding Series
Authors:  Fong S.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/13
Computer network security  Security threats  SME  
Fog-based evaluation approach for trustworthy communication in sensor-cloud system Journal article
IEEE Communications Letters, 2017,Volume: 21,Issue: 11,Page: 2532-2535
Authors:  Wang T.;  Li Y.;  Chen Y.;  Tian H.;  Cai Y.;  Jia W.;  Wang B.
Favorite  |  View/Download:0/0  |  Submit date:2019/02/11
least squares  multiple linear regression  security  Sensor-cloud system  trust  
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications Journal article
IEEE INTERNET OF THINGS JOURNAL, 2017,Volume: 4,Issue: 5,Page: 1125-1142
Authors:  Lin, Jie;  Yu, Wei;  Zhang, Nan;  Yang, Xinyu;  Zhang, Hanlin;  Zhao, Wei
Favorite  |  View/Download:16/0  |  Submit date:2018/10/30
Applications  enabling technologies  fog/edge computing  Internet of Things (IoT)  security and privacy