Citation: | WU Qiong, HE Fanfan, FAN Xiumei, “The Intelligent Control System of Traffic Light Based on Fog Computing,” Chinese Journal of Electronics, vol. 27, no. 6, pp. 1265-1270, 2018, doi: 10.1049/cje.2018.09.015 |
Cisco Global Cloud Index: Forecast and Methdology 2013-2018 white Paper.
|
Zhi Li, Yan Liu, Hongsong Zhu, et al., “Contact Duration Aware Cellular Traffic Offloading Over Delay Tolerant Networks”, IEEE Transactions on Vehicular Technology, Vol.64, No.2015.
|
Mell P and Grance T, “The NIST definition of cloud computing”, NIST special publication, Vol.800, No.145, pp.7, 2011.
|
Subashini and Kavitha V, “A survey on security issues in service delivery models of cloud computing”, Journal of Network and Computer Applications, Vol.34, No.1, pp.1-11, 2011.
|
Dinh H T, Lee C, Niyato D, et al., “A survey of mobile cloud computing: Architecture, applications, and approaches”, Wireless communications and mobile computing, Vol.13, No.17, pp.1587-1611, 2013.
|
Bonomi F, Milito R, Zhu J, et al., “Fog computing and its role in the Internet of Things”, Proceedings of the 1st ACM Mobile cloud Computing Workshop, Helsinki, Finland, pp.13-16, 2012.
|
Yang G and Tan C H, “Certificateless public key encryption:A new generic construction and two pairing-free schemes”, Theoretical Computer Science,Vol.41, No.8, pp.127-128, 2011.
|
Teng J, Wu C, “A provable authenticated certificateless group key agreement with constant rounds”, Journal of Communications & Networks, Vol.14, No.1, pp.104-110, 2012.
|
Ercolani G, “Cloud computing services potential analysis: An integrated model for evaluating Software as a Service”, Cloud Computing, Vol.24, No.3, pp.77-80, 2013.
|
Majid Hajibaba, Saeid Gorgin, “A review on modern distributed computing paradigms cloud computing jungle computing and fog computing”, Acm SIGCOMM Computer Communication Review, Vol.4, No.5, pp.13-15, 2012.
|
Jianbing Ni, Kuan Zhang, Xiaodong Lin, et al., “Securing fog computing for internet of things applications: Challenges and solutions”, IEEE Communications Surveys & Tutorials, pp.1, 2017.
|
Sripriya Srikant Adhatarao, Mayutan Arumaithurai, et al., “A fog computing based gateway to integrate sensor networks to internet”, 201729th International Teletraffic Congress (ITC 29), pp.42-47, 2017.
|
Luca Cerina, Sara Notargiacomo, Matteo GrecoLuca Paccanit, et al., “A fog-computing architecture for preventive healthcare and assisted living in smart ambients”, 2017 IEEE 3rd International Forum on Research and Technologies for Society and Industry (RTSI), pp.1-6, 2017.
|
Mithun Mukherjee, Rakesh Matam, Lei Shu, et al., “Security and privacy in fog computing: Challenges”, IEEE Access, pp.19293-19304, 2017.
|
Yong Xiao, and Marwan Krunz, “QoE and power efficiency tradeoff for fog computing networks with fog node cooperation”, IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp.1-9, 2017.
|
Zhang Y, Ren J, Liu J, et al., “A survey on emerging computing paradigms for big data”, Chinese Journal of Electronics, Vol.26, No.1, pp.1-12, 2017.
|
Lina Ni, Jinquan Zhang, Changjun Jiang, et al., “Resource allocation strategy in fog computing based on priced timed petri nets”, IEEE Internet of Things Journal, pp.1216-1228, 2017.
|