Search
for Author
All Reviews
Li, Tao
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
5
of
14
reviews
A survey on end-edge-cloud orchestrated network computing paradigms: transparent computing, mobile edge computing, fog computing, and cloudlet
Ren J., Zhang D., He S., Zhang Y., Li T. ACM Computing Surveys 52(6): 1-36, 2019. Type: Article
Recognizing the limits of (distant) cloud computing, modern Internet of things (IoT) architectures recognize the so-called edge continuum between cloud applications and IoT devices and machines. “Continuum” implies ...
...
Jun 17 2022
Event summarization for sports games using Twitter streams
Huang Y., Shen C., Li T. World Wide Web 21(3): 609-627, 2018. Type: Article
The
Wall Street Journal
recently published an article by Jason Gay titled “How Twitter Rules the NBA” [1]. It contends that the National Basketball Association (NBA) is heavily linked to social media, especia...
...
Jul 9 2018
A survey on malware detection using data mining techniques
Ye Y., Li T., Adjeroh D., Iyengar S. ACM Computing Surveys 50(3): 1-40, 2017. Type: Article
It is not new that software is eating the world [1]. Industries and businesses everywhere are being “softwareized.” Meanwhile, we cannot deny that malware (malicious software) is also having a feast. This paper prov...
...
Sep 22 2017
Event mining: algorithms and applications
Li T., Chapman & Hall/CRC, Boca Raton, FL, 2016. 332 pp. Type: Book (978-1-466568-57-0)
A very interesting and well-structured survey work,
Event mining: algorithms and applications
succeeds in presenting a thorough overview of the most important characteristics of the field of event processing. It is a unique and ...
...
May 11 2017
Per-flow traffic measurement through randomized counter sharing
Li T., Chen S., Ling Y. IEEE/ACM Transactions on Networking 20(5): 1622-1634, 2012. Type: Article
Network traffic measurement is quite an important requirement for network administration for a variety of reasons, including traffic and capacity planning, accounting, billing, network forensics, and anomaly detection. Measurements nee...
...
Mar 22 2013
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy