Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

hyper heuristic algorithm

biblio

Visible to the public A security aware scheduling in fog computing by hyper heuristic algorithm

Submitted by K_Hooper on Wed, 05/09/2018 - 11:03am
  • scheduling
  • Internet of Things
  • job scheduling
  • latency
  • Processor scheduling
  • pubcrawl
  • Resiliency
  • resource allocation
  • Scalability
  • integrity parameter
  • security
  • security aware scheduling
  • Security Heuristics
  • security of data
  • security overhead
  • sensor nodes
  • Task Analysis
  • data mining technique
  • authorisation
  • average energy consumption
  • Cloud Computing
  • computational overhead
  • confidentiality parameter
  • CPU utilization
  • data integrity
  • Data mining
  • authentication parameter
  • edge computing
  • Fog computing
  • fog devices
  • heterogeneous distributed environment
  • heuristic algorithm
  • Heuristic algorithms
  • hyper heuristic algorithm

Terms of Use  |  ©2023. CPS-VO