共 56 条
- [1] Akidau T, 2015, PROC VLDB ENDOW, V8, P1792
- [2] Akkus IE, 2018, PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, P923
- [3] [Anonymous], 2023, Assign CPU resources to containers and pods
- [4] [Anonymous], [20] [Online], available: https://spark.apache.org/docs/2.2.0/api/python/pyspark.ml.html#pyspark.ml.classification.LinearSVC. Accessed: [10 Otc. 2018].
- [5] [Anonymous], 2015, orized licensed use limited to the terms of the applicableJun
- [6] Anqi Zhao, 2019, IOP Conference Series: Materials Science and Engineering, V569, DOI 10.1088/1757-899X/569/5/052092
- [7] Breaking edge shackles: Infrastructure-free collaborative mobile augmented reality [J]. PROCEEDINGS OF THE TWENTIETH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, SENSYS 2022, 2022, : 1 - 15
- [8] Optimal Admission Control Mechanism Design for Time-Sensitive Services in Edge Computing [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, : 1169 - 1178
- [9] ThriftyEdge: Resource-Efficient Edge Computing for Intelligent IoT Applications [J]. IEEE NETWORK, 2018, 32 (01): : 61 - 65
- [10] Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI [J]. PROCEEDINGS OF THE 5TH WORKSHOP ON CPS & IOT SECURITY AND PRIVACY, CPSIOTSEC 2023, 2023, : 1 - 9