Outlier detection: Methods, models, and classification
A Boukerche, L Zheng, O Alfandi - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Over the past decade, we have witnessed an enormous amount of research effort dedicated
to the design of efficient outlier detection techniques while taking into consideration …
to the design of efficient outlier detection techniques while taking into consideration …
Towards crowdsourcing internet of things (crowd-iot): Architectures, security and applications
KLM Ang, JKP Seng, E Ngharamike - Future Internet, 2022 - mdpi.com
Crowdsourcing can play an important role in the Internet of Things (IoT) applications for
information sensing and gathering where the participants are equipped with geolocated …
information sensing and gathering where the participants are equipped with geolocated …
CrowdBC: A blockchain-based decentralized framework for crowdsourcing
Crowdsourcing systems which utilize the human intelligence to solve complex tasks have
gained considerable interest and adoption in recent years. However, the majority of existing …
gained considerable interest and adoption in recent years. However, the majority of existing …
A survey of opportunistic offloading
This paper surveys the literature of opportunistic offloading. Opportunistic offloading refers to
offloading traffic originally transmitted through the cellular network to opportunistic network …
offloading traffic originally transmitted through the cellular network to opportunistic network …
Designing a tourism business model on block chain platform
H Aghaei, N Naderibeni, A Karimi - Tourism Management Perspectives, 2021 - Elsevier
Today, blockchain is given attention in tourism, and research has begun about it. This study
aimed to present a business model on blockchain platform. Blockchain is a shared …
aimed to present a business model on blockchain platform. Blockchain is a shared …
Dependent task placement and scheduling with function configuration in edge computing
In Mobile Edge Computing (MEC), each edge server can be configured with only a small
number of functions due to the limited capacity of various resources. Meanwhile, mobile …
number of functions due to the limited capacity of various resources. Meanwhile, mobile …
A low redundancy data collection scheme to maximize lifetime using matrix completion technique
Sensor nodes equipped with various sensory devices can sense a wide range of information
regarding human or things, thereby providing a foundation for Internet of Thing (IoT). Fast …
regarding human or things, thereby providing a foundation for Internet of Thing (IoT). Fast …
TCNS: Node selection with privacy protection in crowdsensing based on twice consensuses of blockchain
J An, H Yang, X Gui, W Zhang, R Gui… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the rapid growth of smart terminals in recent years, crowdsensing which utilizes the
human intelligence to solve complicated problems have gained considerable interest and …
human intelligence to solve complicated problems have gained considerable interest and …
Optimal online data dissemination for resource constrained mobile opportunistic networks
Delivery delay and communication costs are two conflicting design issues for mobile
opportunistic networks with nonreplenishable energy resources. In this paper, we study the …
opportunistic networks with nonreplenishable energy resources. In this paper, we study the …
Data: Dependency-aware task allocation scheme in distributed edge clouds
To overcome the limitation of standalone edge cloud in terms of computing power and
resource, a concept of distributed edge cloud has been introduced, where application tasks …
resource, a concept of distributed edge cloud has been introduced, where application tasks …