Author:
Dsouza Clinton,Ahn Gail-Joon,Taguinod Marthony
Cited by
155 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Lightweight two-factor authentication framework with privacy preserving for smart eHealth;Peer-to-Peer Networking and Applications;2023-12-16
2. Fog Computing Complete Review: Concepts, Trends, Architectures, Technologies, Simulators, Security Issues, Applications, and Open Research Fields;SN Computer Science;2023-10-04
3. A Comprehensive Analysis of Computing Paradigms Leading to Fog Computing: Simulation Tools, Applications, and Use Cases;Journal of Computer Information Systems;2023-08-31
4. Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions;Computer Science Review;2023-08
5. Context‐aware application scheduling in fog computing environment;Concurrency and Computation: Practice and Experience;2023-06-23