Outlier detection: Methods, models, and classification

A Boukerche, L Zheng, O Alfandi - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Over the past decade, we have witnessed an enormous amount of research effort dedicated
to the design of efficient outlier detection techniques while taking into consideration …

Towards crowdsourcing internet of things (crowd-iot): Architectures, security and applications

KLM Ang, JKP Seng, E Ngharamike - Future Internet, 2022 - mdpi.com
Crowdsourcing can play an important role in the Internet of Things (IoT) applications for
information sensing and gathering where the participants are equipped with geolocated …

CrowdBC: A blockchain-based decentralized framework for crowdsourcing

M Li, J Weng, A Yang, W Lu, Y Zhang… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Crowdsourcing systems which utilize the human intelligence to solve complex tasks have
gained considerable interest and adoption in recent years. However, the majority of existing …

A survey of opportunistic offloading

D Xu, Y Li, X Chen, J Li, P Hui, S Chen… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper surveys the literature of opportunistic offloading. Opportunistic offloading refers to
offloading traffic originally transmitted through the cellular network to opportunistic network …

Designing a tourism business model on block chain platform

H Aghaei, N Naderibeni, A Karimi - Tourism Management Perspectives, 2021 - Elsevier
Today, blockchain is given attention in tourism, and research has begun about it. This study
aimed to present a business model on blockchain platform. Blockchain is a shared …

Dependent task placement and scheduling with function configuration in edge computing

L Liu, H Tan, SHC Jiang, Z Han, XY Li… - Proceedings of the …, 2019 - dl.acm.org
In Mobile Edge Computing (MEC), each edge server can be configured with only a small
number of functions due to the limited capacity of various resources. Meanwhile, mobile …

A low redundancy data collection scheme to maximize lifetime using matrix completion technique

J Tan, W Liu, M Xie, H Song, A Liu, M Zhao… - EURASIP Journal on …, 2019 - Springer
Sensor nodes equipped with various sensory devices can sense a wide range of information
regarding human or things, thereby providing a foundation for Internet of Thing (IoT). Fast …

TCNS: Node selection with privacy protection in crowdsensing based on twice consensuses of blockchain

J An, H Yang, X Gui, W Zhang, R Gui… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the rapid growth of smart terminals in recent years, crowdsensing which utilizes the
human intelligence to solve complicated problems have gained considerable interest and …

Optimal online data dissemination for resource constrained mobile opportunistic networks

Y Liu, H Wu, Y Xia, Y Wang, F Li… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Delivery delay and communication costs are two conflicting design issues for mobile
opportunistic networks with nonreplenishable energy resources. In this paper, we study the …

Data: Dependency-aware task allocation scheme in distributed edge clouds

J Lee, H Ko, J Kim, S Pack - IEEE Transactions on Industrial …, 2020 - ieeexplore.ieee.org
To overcome the limitation of standalone edge cloud in terms of computing power and
resource, a concept of distributed edge cloud has been introduced, where application tasks …