Edge Computing: Vision and Challenges W Shi, J Cao, Q Zhang, Y Li, L Xu IEEE Internet of Things Journal 3 (5), 637-646, 2016 | 7444 | 2016 |
The promise of edge computing W Shi, S Dustdar Computer 49 (5), 78-81, 2016 | 1429 | 2016 |
Wireless sensor network security: A survey JP Walters, Z Liang, W Shi, V Chaudhary Security in distributed, grid, mobile, and pervasive computing, 367-409, 2007 | 855 | 2007 |
Edge computing for autonomous driving: Opportunities and challenges S Liu, L Liu, J Tang, B Yu, Y Wang, W Shi Proceedings of the IEEE 107 (8), 1697-1716, 2019 | 576 | 2019 |
Lavea: Latency-aware video analytics on edge computing platform S Yi, Z Hao, Q Zhang, Q Zhang, W Shi, Q Li Proceedings of the Second ACM/IEEE Symposium on Edge Computing, 1-13, 2017 | 354 | 2017 |
Resource scheduling in edge computing: A survey Q Luo, S Hu, C Li, G Li, W Shi IEEE Communications Surveys & Tutorials 23 (4), 2131-2165, 2021 | 294 | 2021 |
On security challenges and open issues in Internet of Things K Sha, W Wei, TA Yang, Z Wang, W Shi Future generation computer systems 83, 326-337, 2018 | 277 | 2018 |
Computing systems for autonomous driving: State of the art and challenges L Liu, S Lu, R Zhong, B Wu, Y Yao, Q Zhang, W Shi IEEE Internet of Things Journal 8 (8), 6469-6486, 2020 | 276 | 2020 |
Design and implementation of TARF: A trust-aware routing framework for WSNs G Zhan, W Shi, J Deng IEEE Transactions on dependable and secure computing 9 (2), 184-197, 2011 | 272 | 2011 |
Preserving source location privacy in monitoring-based wireless sensor networks Y Xi, L Schwiebert, W Shi Proceedings 20th IEEE International Parallel & Distributed Processing …, 2006 | 271 | 2006 |
PET: A personalized trust model with reputation and risk evaluation for P2P resource sharing Z Liang, W Shi Proceedings of the 38th Annual Hawaii International Conference on System …, 2005 | 258 | 2005 |
Edge computing-an emerging computing model for the internet of everything era W Shi, H Sun, J Cao, Q Zhang, W Liu Journal of computer research and development 54 (5), 907-924, 2017 | 246 | 2017 |
JIAJIA: A software DSM system based on a new cache coherence protocol W Hu, W Shi, Z Tang High-Performance Computing and Networking: 7th International Conference …, 1999 | 235 | 1999 |
Using wireless sensor networks for fire rescue applications: Requirements and challenges K Sha, W Shi, O Watkins 2006 IEEE International Conference on Electro/Information Technology, 239-244, 2006 | 229 | 2006 |
{CANS}: Composable, Adaptive Network Services Infrastructure X Fu, W Shi, A Akkerman, V Karamcheti 3rd USENIX Symposium on Internet Technologies and Systems (USITS 01), 2001 | 222 | 2001 |
In cloud, can scientific communities benefit from the economies of scale? L Wang, J Zhan, W Shi, Y Liang IEEE Transactions on Parallel and Distributed Systems 23 (2), 296-303, 2011 | 218 | 2011 |
TrPF: A trajectory privacy-preserving framework for participatory sensing S Gao, J Ma, W Shi, G Zhan, C Sun IEEE Transactions on Information Forensics and Security 8 (6), 874-887, 2013 | 196 | 2013 |
Edge computing: state-of-the-art and future directions W Shi, X Zhang, YF Wang, Q Zhang Journal of Computer Research and Development 56 (1), 69-89, 2019 | 187 | 2019 |
Analysis of ratings on trust inference in open environments Z Liang, W Shi Performance Evaluation 65 (2), 99-128, 2008 | 183 | 2008 |
Edge computing [scanning the issue] W Shi, G Pallis, Z Xu Proceedings of the IEEE 107 (8), 1474-1481, 2019 | 171 | 2019 |