2017
DOI: 10.1007/s10586-017-0849-9
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving outsourced classification in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
102
0
1

Year Published

2018
2018
2019
2019

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 206 publications
(107 citation statements)
references
References 31 publications
0
102
0
1
Order By: Relevance
“…The workflow scheduling problem is an inherited problem from the heterogeneous computing environments, for which different research efforts were made to address the scheduling problem [9][10][11]. However, heterogeneous computing environments are not easy to set up, and their capability of giving more uniform performance with less failure is quite limited in comparison to the cloud environments [12,13]. Moreover, the main objective of the various previous efforts in addressing the workflow scheduling problem in heterogeneous environments is to only minimize the finish time.…”
Section: Introductionmentioning
confidence: 99%
“…The workflow scheduling problem is an inherited problem from the heterogeneous computing environments, for which different research efforts were made to address the scheduling problem [9][10][11]. However, heterogeneous computing environments are not easy to set up, and their capability of giving more uniform performance with less failure is quite limited in comparison to the cloud environments [12,13]. Moreover, the main objective of the various previous efforts in addressing the workflow scheduling problem in heterogeneous environments is to only minimize the finish time.…”
Section: Introductionmentioning
confidence: 99%
“…In it, the data processing occurs in part at the network edge or between the cloud-to-end that can best meet customer necessities rather than entirely processing the data in a comparatively fewer number of massive clouds. Operators use the edge-of-things computing paradigm to provide network and computing services in a flexible and resource-efficient way [8][9][10][11]. Network virtualization is one of the main technologies and promoters of edge-of-things computing.…”
Section: Introductionmentioning
confidence: 99%
“…With the popularity of the camera and development of video surveillance system [24], video has gradually become one of the main carrier of daily life records [9,19]. Nowadays, security cameras are deployed in various places.…”
Section: Introductionmentioning
confidence: 99%