Author of the publication

Cold-start aware cloud-native service function chain caching in resource-constrained edge: A reinforcement learning approach.

, , , and . Comput. Commun., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cold-start aware cloud-native service function chain caching in resource-constrained edge: A reinforcement learning approach., , , and . Comput. Commun., (2022)Leakage Resilient Leveled $FHE$FHE on Multiple Bits Message., , and . IEEE Trans. Big Data, 7 (5): 845-858 (2021)UC Modelling and Security Analysis of the Estonian IVXV Internet Voting System., , and . CoRR, (2021)Post-Quantum VRF and its Applications in Future-Proof Blockchain System., , , , and . CoRR, (2021)Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme., , and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 373-383. (2016)Dual LWE-Based Fully Homomorphic Encryption with Errorless Key Switching., , , and . ICPADS, page 1169-1174. IEEE Computer Society, (2016)Elastic Task Offloading and Resource Allocation Over Hybrid Cloud: A Reinforcement Learning Approach., , , and . IEEE Trans. Netw. Serv. Manag., 21 (2): 1983-1997 (April 2024)An Uncertain Continuous Collaborative Users Finding Algorithm for Location Privacy Protection., , , and . MSWiM, page 215-218. ACM, (2017)Multi-bit Leveled Homomorphic Encryption via Dual.LWE -Based., , , and . Inscrypt, volume 10143 of Lecture Notes in Computer Science, page 221-242. Springer, (2016)Achieving One-Round Password-Based Authenticated Key Exchange over Lattices., and . IEEE Trans. Serv. Comput., 15 (1): 308-321 (2022)