Skip to main content

Blockchain-enabled Decentralized Cloud/Edge Computing

  1. As urban rail transit construction advances with information technology, modernization, information, and intelligence have become the direction of development. A growing number of cloud platforms are being dev...

    Authors: Li Zhu, Qingheng Zhuang, Hailin Jiang, Hao Liang, Xinjun Gao and Wei Wang
    Citation: Journal of Cloud Computing 2023 12:147
  2. Multi-source data fusion techniques are widely applied in dynamic target detection scenarios, such as target situational awareness, radar signal resolution, and feature fusion labeling. Currently, techniques i...

    Authors: Nan Yang, Li Yang, Xingzhou Du, Xunyi Guo, Fanke Meng and Yuwen Zhang
    Citation: Journal of Cloud Computing 2023 12:122
  3. Under the trend of green development, the traditional fossil fuel and centralized energy management models are no longer applicable, and distributed energy systems that can efficiently utilize clean energy hav...

    Authors: Ruohan Wang, Yunlong Chen, Entang Li, Lixuan Che, Hongwei Xin, Jing Li and Xueyao Zhang
    Citation: Journal of Cloud Computing 2023 12:121
  4. The rapid development of the Internet of Vehicles (IoV) along with the emergence of intelligent applications have put forward higher requirements for massive task offloading. Even though Mobile Edge Computing ...

    Authors: Chunhai Li, Qiyong Chen, Mingfeng Chen, Zhaoyu Su, Yong Ding, Dapeng Lan and Amir Taherkordi
    Citation: Journal of Cloud Computing 2023 12:120
  5. With the introduction of emerging technologies such as cloud computing, the railway communication network has the characteristics of complex structure and blurred boundaries, which leads to a series of securit...

    Authors: Yuan Feng, Zhangdui Zhong, Xiaofang Sun, Lei Wang, Yunlong Lu and Yongsheng Zhu
    Citation: Journal of Cloud Computing 2023 12:62
  6. In the era of big data, an ocean of data generated by Internet of Things (IoT) devices will be analyzed and processed by cloud computing. However, outsourcing of data can lead to leakage of user privacy to tho...

    Authors: Qian Zhou, Chengzhe Lai, Qili Guo, Haoyan Ma and Dong Zheng
    Citation: Journal of Cloud Computing 2022 11:93