Z Li, J Ge, H Yang, L Huang, H Hu, H Hu… - Future Generation …, 2016 - Elsevier
Security is increasingly critical for various scientific workflows that are big data applications and typically take quite amount of time being executed on large-scale distributed …
H Chen, X Zhu, D Qiu, L Liu, Z Du - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the wide deployment of cloud computing in many business enterprises as well as science and engineering domains, high quality security services are increasingly critical for …
B Huang, Z Li, P Tang, S Wang, J Zhao, H Hu… - Future Generation …, 2019 - Elsevier
It is a big challenge for resource-limited mobile devices (MDs) to execute various complex and energy-consumed mobile applications. Fortunately, as a novel computing paradigm …
T Xiaoyong, K Li, Z Zeng… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
In the recent past, security-sensitive applications, such as electronic transaction processing systems, stock quote update systems, which require high quality of security to guarantee …
L Zeng, B Veeravalli, X Li - Journal of parallel and Distributed computing, 2015 - Elsevier
High quality of security service is increasingly critical for Cloud workflow applications. However, existing scheduling strategies for Cloud systems disregard security requirements …
With the rapid development of the modern science and technology, the hyperspectral remote sensing science, as a comprehensive high and new technology, has gained the extensive …
Recent advances in composing Cloud applications have been driven by deployments of inter-networking heterogeneous microservices across multiple Cloud datacenters. System …
B Huang, Y Li, Z Li, L Pan, S Wang… - … and Mobile Computing, 2019 - Wiley Online Library
With the explosive growth of mobile applications, mobile devices need to be equipped with abundant resources to process massive and complex mobile applications. However, mobile …
We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to …