[1] ZHOU Yuezhi,ZHANG Di.Near-end cloud computing: opportunities and challenges in the post-cloud computing era[J].Chinese Journal of Computers,2019,42(4):677-700.(in Chinese) 周悦芝,张迪.近端云计算:后云计算时代的机遇与挑战[J].计算机学报,2019,42(4):677-700. [2] BONOMI F,MILITO R,ZHU J,et al.Fog computing and its role in the Internet of things[C]//Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing.New York,USA:ACM Press,2012:13-16. [3] YU Jinliang,TU Shanshan,MENG Yuan.Impersonation attack detection algorithm based on reinforcement learning in mobile fog computing[J].Computer Engineering,2020,46(1):38-44.(in Chinese) 于金亮,涂山山,孟远.移动雾计算中基于强化学习的伪装攻击检测算法[J].计算机工程,2020,46(1):38-44. [4] ZHANG W,ZHANG Z J,CHAO H C.Cooperative fog computing for dealing with big data in the Internet of vehicles:architecture and hierarchical resource management[J].IEEE Communications Magazine,2017,55(12):60-67. [5] HOU Xueshi,LI Yong,CHEN Min,et al.Vehicular fog computing:a viewpoint of vehicles as the infrastructures[J].IEEE Transactions on Vehicular Technology,2016,65(6):3860-3873. [6] SOOKHAK M,YU F R,HE Y,et al.Fog vehicular computing:augmentation of fog computing using vehicular cloud computing[J].IEEE Vehicular Technology Magazine,2017,12(3):55-64. [7] FAHEE M,MAHMUD S A,KHAN G M,et al.A survey of intelligent car parking system[J].Journal of Applied Research and Technology,2013,11(5):714-726. [8] SUN Yan.Research on resource management model and algorithm in fog computing environment[D].Beijing:University of Science and Technology Beijing,2018.(in Chinese) 孙岩.雾计算环境下资源管理模型及算法研究[D].北京:北京科技大学,2018. [9] PAN Hongjie,LIU Jimin,ZHAO Huiqi,et al.Research and design of family health monitoring and management platform based fog computing[J].Software Guide,2020,19(5):124-127.(in Chinese) 泮洪杰,刘纪敏,赵慧奇,等.一种基于雾计算的健康监测系统架构[J].软件导刊,2020,19(5):124-127. [10] YI S,LI C,LI Q.A survey of fog computing: concepts,applications and issues[C]//Proceedings of 2015 Workshop on Mobile Big Data.New York,USA:ACM Press,2015:37-42. [11] ZENG D Z,GU L,GUO S,et al.Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system[J].IEEE Transactions on Computers,2016,65(12):3702-3712. [12] VAQUERO L M,RODERO-MERINO L.Finding your way in the fog[J].ACM SIGCOMM Computer Communication Review,2014,44(5):27-32. [13] LIAO S Y,LI J H,WU J,et al.Fog-enabled vehicle as a service for computing geographical migration in smart cities[J].IEEE Access,2019,7:8726-8736. [14] XU Jinhong,XU Weijun.Competitive analysis of online mean pricing strategy about reverse auctions[J].Operations Research and Management Science,2007(6):97-101.(in Chinese) 徐金红,徐维军.反向拍卖的一种在线定价策略及竞争分析[J].运筹与管理,2007(6): 97-101. [15] ZHU Xuan,YANG Maishun,AN Jian,et al.Crowdsourcing incentive method based on reverse auction model in crowd sensing [J].Journal of Computer Applications,2016,36(7):2038-2045.(in Chinese) 朱旋,杨麦顺,安健,等.群智感知中基于反拍卖模型的众包激励方法[J].计算机应用,2016,36(7):2038-2045. [16] XING Chunxiao.Research crowd sensing incentive mechanism based on game theory [D].Nanjing:Nanjing University of Posts and Telecommunications,2018.(in Chinese) 邢春晓.基于博弈论的群智感知激励机制研究[D].南京:南京邮电大学,2018. [17] KIANI A,ANSARI N.Toward hierarchical mobile edge computing:an auction-based profit maximization approach[J].IEEE Internet of Things Journal,2017,4(6):2082-2091. [18] ZHANG H Q,XIAO Y,BU S R,et al.Computing resource allocation in three-tier IoT fog networks:a joint optimization approach combining stackelberg game and matching[J].IEEE Internet of Things Journal,2017,4(5):1204-1215. [19] JIAO Y T,WANG P,NIYATO D,et al.Auction mechanisms in cloud/fog computing resource allocation for public blockchain networks[J].IEEE Transactions on Parallel and Distributed Systems,2019,30(9):1975-1989. [20] YU R Z,XUE G L,KILARI V T,et al.The fog of things paradigm:road toward on-demand Internet of things[J].IEEE Communications Magazine,2018,56(9):48-54. [21] DIJKSTRA E W.A note on two problems in connexion with graphs[J].Numerische Mathematik,1959,1(1):269-271. [22] EDMONDS J.Matroids and the greedy algorithm[J].Mathematical Programming,1971,1(1):127-136. |