Author:
Yang YiZhuo,Zeng HongJin,Chen TingPing,Lv Meng
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference28 articles.
1. Park, H.D., et al.: Scalable architecture for an automated surveillance system using edge computing. J. Supercomput. (2017). https://doi.org/10.1007/s11227-016-1750-7
2. Romano, P., Quaglia, F.: Design and evaluation of a parallel invocation protocol for transactional applications over the web. IEEE Trans. Comput. 63(2), 317–334 (2014)
3. Wang, J.Y., Yen, L.H., Liman, J.: Incentive-stable matching protocol for service chain placement in multi-operator edge system. IEICE Trans. Commun. E105.B, 1353–1360 (2022)
4. Satyanarayanan, M., Bahl, P., Caceres, R., et al.: The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14–23 (2009)
5. Chun, B.G., Maniatis, P.: Augmented smartphone applications through clone cloud execution. In: Conference on hot topics in operating systems. USENIX Association (2009)