Q
Qun Li
Researcher at College of William & Mary
Publications - 175
Citations - 11618
Qun Li is an academic researcher from College of William & Mary. The author has contributed to research in topics: Wireless sensor network & Computer science. The author has an hindex of 52, co-authored 156 publications receiving 10246 citations. Previous affiliations of Qun Li include Nanjing University & Dartmouth College.
Papers
More filters
Proceedings ArticleDOI
A Survey of Fog Computing: Concepts, Applications and Issues
Shanhe Yi,Cheng Li,Qun Li +2 more
TL;DR: The definition of fog computing and similar concepts are discussed, representative application scenarios are introduced, and various aspects of issues the authors may encounter when designing and implementing fog computing systems are identified.
Proceedings ArticleDOI
Fog Computing: Platform and Applications
TL;DR: This paper discussed current definitions of fog computing and similar concepts, and proposed a more comprehensive definition, analyzed the goals and challenges in fog computing platform, and presented platform design with several exemplar applications.
Proceedings ArticleDOI
Online power-aware routing in wireless Ad-hoc networks
TL;DR: This paper discusses online power-aware routing in large wireless ad-hoc networks for applications where the message sequence is not known and develops an approximation algorithm called max-min zPmin that has a good empirical competitive ratio.
Journal ArticleDOI
Global clock synchronization in sensor networks
Qun Li,Daniela Rus +1 more
TL;DR: The diffusion-based protocol is presented, which is fully localized, and it is shown that, by imposing some constraints on the sensor network, global clock synchronization can be achieved in the presence of malicious nodes that exhibit Byzantine failures.
Book ChapterDOI
Security and Privacy Issues of Fog Computing: A Survey
Shanhe Yi,Zhengrui Qin,Qun Li +2 more
TL;DR: Fog computing is a promising computing paradigm that extends cloud computing to the edge of networks but with distinct characteristics that faces new security and privacy challenges besides those inherited from cloud computing.