|
|
|
Geming Xia, Chaodong Yu and Jian Chen
With the development of 5G and artificial intelligence, the security of Cloud-Edge-End Collaboration (CEEC) networks becomes an increasingly prominent issue due to the complexity of the environment, real-time variability and diversity of edge devices in ...
ver más
|
|
|
|
|
|
|
Jing Chen, Tong Li and Rui Zhu
False messages sent by malicious or selfish vehicle nodes will reduce the operation efficiency of the Internet of Vehicles, and can even endanger drivers in serious cases. Therefore, it is very important to detect malicious vehicle nodes in the network i...
ver más
|
|
|
|
|
|
|
Lloyd M. Basham
This case is to be used as an understanding of the causalities that result from the disarray of future direction, impeding chaos and dysfunctional status to an organization when its ?Vision? is lost. The case presents the financial impact when the ...
ver más
|
|
|
|
|
|
|
Qiuming Liu, Yong Luo, Yun Ling and Jun Zheng
In this paper, we study the throughput capacity of wireless networks considering the selfish feature of interaction between nodes. In our proposed network model, each node has a probability of cooperating to relay transmission. According to the extent of...
ver más
|
|
|
|