بحث بسيط
السجلات المعروضة 11 -- 13 من 13
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
5G wireless network technology will not only significantly increase bandwidth but also introduce new features such as mMTC and URLLC. However, high request latency will remain a challenging problem even with 5G due to the ...
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
(
Science in China Press
, 2020 , Article)
The anonymity mechanism of bitcoin is favored by the society, which promotes its usage and development. An adversary should not be able to discover the relation between bitcoin addresses and bitcoin users to ensure effective ...
PPLS: a privacy-preserving location-sharing scheme in mobile online social networks
(
Science in China Press
, 2020 , Article)
The recent proliferation of mobile devices has given rise to mobile online social networks (mOSNs), an emerging network paradigm that uses social networks as its main design element. As one of the most critical components ...