Articles with "management mechanism" as a keyword



A Novel Joint Dataset and Incentive Management Mechanism for Federated Learning over MEC

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3156045

Abstract: In this study, to reduce the energy consumption for the federated learning (FL) participation of mobile devices (MDs), we design a novel joint dataset and incentive management mechanism for FL over mobile edge computing (MEC)… read more here.

Keywords: management mechanism; mechanism; dataset incentive; incentive management ... See more keywords

A Robust Reputation Management Mechanism in the Federated Cloud

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2017.2689020

Abstract: In the Infrastructure as a Service (IaaS) paradigm of cloud computing, computational resources are available for rent. Although it offers a cost efficient solution to virtual network requirements, low trust on the rented computational resources… read more here.

Keywords: robust reputation; computational resources; reputation; management mechanism ... See more keywords
Photo by john_cameron from unsplash

A Brief Analysis of Innovating and Perfecting the Management Mechanism of College Students' Ideological and Political Education

Sign Up to like & get
recommendations!
Published in 2020 at "Lethaia"

DOI: 10.18282/le.v9i5.1210

Abstract: Lifelong Education Copyright © 2020 Wei Li Ding doi: 10.18282/le.v9i5.1210 This is an open-access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0/), which permits unrestricted non-commercial use, distribution, and reproduction… read more here.

Keywords: analysis innovating; brief analysis; management mechanism; perfecting management ... See more keywords

A fuzzy trust management mechanism with dynamic behavior monitoring for wireless sensor networks

Sign Up to like & get
recommendations!
Published in 2024 at "China Communications"

DOI: 10.23919/jcc.fa.2022-0616.202405

Abstract: Traditional wireless sensor networks (WSNs) are typically deployed in remote and hostile environments for information collection. The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks. Traditional encryption… read more here.

Keywords: management mechanism; wireless; trust management; sensor ... See more keywords