Author of the publication

A Scheduling Scheme in a Container-Based Edge Computing Environment Using Deep Reinforcement Learning Approach.

, , , , , and . MSN, page 56-65. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relative Entropy and Mean Li-Yorke Chaos for Biorderable Amenable Group Actions., and . Int. J. Bifurc. Chaos, 30 (2): 2050032:1-2050032:11 (2020)二进制程序的动态符号化污点分析 (Dynamic Symbolic Taint Analysis of Binary Programs)., , and . 计算机科学, 43 (2): 155-158 (2016)Capability Leakage Detection between Android Applications Based on Dynamic Feedback., , and . ICPADS, page 943-948. IEEE, (2019)Adaptive Random Testing for XSS Vulnerability., , , and . APSEC, page 63-69. IEEE, (2019)Uncertainty Measurement for a Tolerance Knowledge Base., , and . International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 28 (2): 331-357 (2020)Resolving reflection methods in Android applications., , , , , and . ISI, page 143-145. IEEE, (2017)A Scheduling Scheme in a Container-Based Edge Computing Environment Using Deep Reinforcement Learning Approach., , , , , and . MSN, page 56-65. IEEE, (2021)Research on TCP Initial Sequence Number Prediction Method Based on Adding-weight Chaotic Time Series., , and . ICYCS, page 1511-1515. IEEE Computer Society, (2008)Automatic Generation of Capability Leaks' Exploits for Android Applications., , , , , and . ICST Workshops, page 291-295. IEEE, (2019)Pre-Image Entropy of Nonautonomous Dynamical Systems., , and . J. Systems Science & Complexity, 21 (3): 441-445 (2008)