Applying an auction optimization algorithm to mobile edge computing for security

评论