과제정보
This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2018-0-01456, AutoMaTa: Autonomous Management framework based on artificial intelligent technology for adaptive and disposable IoT). This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (No. NRF-2019R1I1A1A01064054).
참고문헌
- J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, "A survey on internet of things: architecture, enabling technologies, security and privacy, and applications," IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125-1142, 2017. https://doi.org/10.1109/JIOT.2017.2683200
- A. Colakovic and M. Hadzialic, "Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues," Computer Networks, vol. 144, pp. 17-39, 2018. https://doi.org/10.1016/j.comnet.2018.07.017
- T. Kawakami, "A structured overlay network scheme based on multiple different time intervals," Journal of Information Processing Systems, vol. 16, no. 6, pp. 1447-1458, 2020. https://doi.org/10.3745/JIPS.04.0198
- J. Wang, X. Gu, W. Liu, A. K. Sangaiah, and H. J. Kim, "An empower Hamilton loop based data collection algorithm with mobile agent for WSNs," Human-centric Computing and Information Sciences, vol. 9, article no. 18, 2019. https://doi.org/10.1186/s13673-019-0179-4
- L. Zhou and Y. Shan, "Privacy-preserving, energy-saving data aggregation scheme in wireless sensor networks," Journal of Information Processing Systems, vol. 16, no. 1, pp. 83-95, 2020. https://doi.org/10.3745/JIPS.03.0131
- L. Tran, H. To, L. Fan, and C. Shahabi, "A real-time framework for task assignment in hyperlocal spatial crowdsourcing," ACM Transactions on Intelligent Systems and Technology (TIST), vol. 9, no. 3, article no. 37, 2018. https://doi.org/10.1145/3078853
- Z. Lu, X. Sun, and T. La Porta, "Cooperative data offload in opportunistic networks: from mobile devices to infrastructure," IEEE/ACM Transactions on Networking, vol. 25, no. 6, pp. 3382-3395, 2017. https://doi.org/10.1109/TNET.2017.2747621
- B. Li, M. He, W. Wu, A. K. Sangaiah, and G. Jeon, "Computation offloading algorithm for arbitrarily divisible applications in mobile edge computing environments: an OCR case," Sustainability, vol. 10, no. 5, article no. 1611, 2018. https://doi.org/10.3390/su10051611
- W. Lin, C. Liang, J. Z. Wang, and R. Buyya, "Bandwidth-aware divisible task scheduling for cloud computing," Software: Practice and Experience, vol. 44, no. 2, pp. 163-174, 2014. https://doi.org/10.1002/spe.2163
- W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, "PDA: privacy-preserving data aggregation in wireless sensor networks," in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM), Anchorage, AK, 2007, pp. 2045-2053.
- H. He, L. H. Zheng, P. Li, L. Deng, L. Huang, and X. Chen, "An efficient attribute-based hierarchical data access control scheme in cloud computing," Human-centric Computing and Information Sciences, vol. 10, article no. 49, 2020. https://doi.org/10.1186/s13673-020-00255-5
- H. Kim and S. Lee, "Document summarization model based on general context in RNN," Journal of Information Processing Systems, vol. 15, no. 6, pp. 1378-1391, 2019. https://doi.org/10.3745/JIPS.02.0123
- M. J. J. Ghrabat, G. Ma, I. Y. Maolood, S. S. Alresheedi, and Z. A. Abduljabbar, "An effective image retrieval based on optimized genetic algorithm utilized a novel SVM-based convolutional neural network classifier," Human-centric Computing and Information Sciences, vol. 9, article no. 31, 2019. https://doi.org/10.1186/s13673-019-0191-8
- Y. Bengio, Learning Deep Architectures for AI. Hanover, MA: Now Publisher, 2009.
- C. Zhang, P. Patras, and H. Haddadi, "Deep learning in mobile and wireless networking: a survey," IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2224-2287, 2019. https://doi.org/10.1109/COMST.2019.2904897
- W. Lin, C. Liang, J. Z. Wang, and R. Buyya, "Bandwidth-aware divisible task scheduling for cloud computing," Software: Practice and Experience, vol. 44, no. 2, pp. 163-174, 2014. https://doi.org/10.1002/spe.2163
- J. Kang, S. Kim, J. Kim, N. Sung, and Y. Yoon, "Dynamic offloading model for distributed collaboration in edge computing: a use case on forest fires management," Applied Sciences, vol. 10, no. 7, article no. 2334, 2020. https://doi.org/10.3390/app10072334
- X. A. Yan, W. Q. Shi, and H. Tian, "Cloud storage security deduplication scheme based on dynamic bloom filter," Journal of Information Processing Systems, vol. 15, no. 6, pp. 1265-1276, 2019. https://doi.org/10.3745/JIPS.04.0143
- C. T. Yang, S. T. Chen, Y. W. Chan, and Y. C. Shen, "On construction of a cloud storage system with heterogeneous software-defined storage technologies," Human-centric Computing and Information Sciences, vol. 9, article no. 12, 2019. https://doi.org/10.1186/s13673-019-0173-x