A comprehensive confirmation-based selfish node detection algorithm for socially aware networks

Z **ong, X Li, X Zhang, M Deng, F Xu, B Zhou… - Journal of Signal …, 2023 - Springer
Data transmission in socially aware networks is usually accomplished through opportunistic
peer-to-peer links in a storage-carry-forward way. This way demands nodes to actively …

A service pricing-based two-stage incentive algorithm for socially aware networks

X Zenggang, L **ang, Z Xueming, Z Sanyuan… - Journal of Signal …, 2022 - Springer
In socially aware networks, data forwarding is usually performed based on opportunistic
peer-to-peer connections and using a store-and-forward method. This method requires …

Energy-aware design of stochastic applications with statistical deadline and reliability guarantees

W Jiang, X Pan, K Jiang, L Wen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Energy efficiency, reliability, and real-time are three key requirements of mission-critical
embedded systems. Existing approaches over emphasize the worst case design of real-time …

A fault detection model for edge computing security using imbalanced classification

P Liang, G Liu, Z **ong, H Fan, H Zhu… - Journal of Systems …, 2022 - Elsevier
The edge computing-based Internet of Thing (IoT) has been growing drastically by taking
advantage of edge computing which provides great assistance for IoT and mobile devices to …

Online data allocation for hybrid memories on embedded tele-health systems

M Qiu, L Chen, Y Zhu, J Hu… - … 2014 IEEE 6th Intl Symp on …, 2014 - ieeexplore.ieee.org
The developments of wearable devices such as Body Sensor Networks (BSNs) have greatly
improved the capability of tele-health industry. Large amount of data will be collected from …

Energy efficient multiprocessor task scheduling under input-dependent variation

J Cong, K Gururaj - 2009 Design, Automation & Test in Europe …, 2009 - ieeexplore.ieee.org
In this paper, we propose a novel, energy aware scheduling algorithm for applications
running on DVS-enabled multiprocessor systems, which exploits variation in execution times …

Recovering spectral reflectance under commonly available lighting conditions

J Jiang, J Gu - 2012 IEEE Computer Society Conference on …, 2012 - ieeexplore.ieee.org
Recovering the spectral reflectance of a scene is important for scene understanding.
Previous approaches use either specialized filters or controlled illumination where the extra …

Rolling-horizon scheduling for energy constrained distributed real-time embedded systems

C He, X Zhu, H Guo, D Qiu, J Jiang - Journal of Systems and Software, 2012 - Elsevier
Energy-efficient scheduling approaches are critical to battery driven real-time embedded
systems. Traditional energy-aware scheduling schemes are mainly based on the individual …

Overview of medical data privacy protection based on Blockchain Technology

L Chen, Q Yu, W Liang, J Cai, H Zhu… - 2022 IEEE 7th …, 2022 - ieeexplore.ieee.org
With the increasing growth of electronic medical data, the difficulties of data sharing among
medical institutions and the leakage of data privacy have become the focus of the public and …

Vision Transformer-based overlay processor for Edge Computing

F Liu, Z Fan, W Hu, D Xu, M Peng, J He, Y He - Applied Soft Computing, 2024 - Elsevier
Abstract Accelerating Visual Neural Networks in Edge Computing environments is crucial for
processing image and video data. Visual Neural Networks, including Convolutional Neural …