Computer Science
ad-hoc network
50%
context aware application
50%
Context Dependent
50%
Data Mining
100%
Energy Consumption
50%
Execution Environments
50%
Fault Tolerant
50%
fault-tolerance
50%
Hard Constraint
50%
Location-Based Service
50%
Optimization Strategy
50%
Performance Degradation
50%
Soft Constraint
50%
Stochastic Optimization
50%
Time Monitoring
50%
Time Requirement
50%
Keyphrases
Boston Bombing
11%
Communication Overhead
11%
Complex Processing
11%
Computation Overhead
11%
Computational Platform
11%
Context Requirement
11%
Context-aware Applications
11%
Data Mining Techniques
11%
Data Transfer
11%
Data Usage
11%
Distributed Execution
11%
Edge Habitat
11%
End-to-end Architecture
100%
Energy Consumption Reduction
11%
Execution Environment
11%
Fault Tolerance
11%
Fault-tolerant
11%
Hard Constraints
11%
Increasing Complexity
11%
Information Reliability
11%
Large Set
11%
Location-based Services
11%
Middleware
22%
Minimum Distance
11%
Mobile Crowdsensing
100%
Mobile Users
11%
Network Applications
11%
New Design Approach
11%
Offline Data
11%
Online Mining
11%
Operational Requirements
11%
Optimization Engine
11%
Optimization Strategy
11%
Performance Degradation
11%
Real-time Operation
33%
Real-time Requirements
11%
Resource Utilization
11%
Sensing Applications
100%
Soft Constraints
11%
Stochastic Optimization
11%
Tight Constraint
11%
Time Monitoring
11%
Tracking Applications
11%
Vehicular Ad Hoc Networks
11%