Journals
Publish with us
Publishing partnerships
About us
Blog
Mobile Information Systems
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Mobile Information Systems
/
2017
/
Article
/
Tab 4
/
Research Article
Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing
Table 4
CPU usage of different VMS with the required functions.
ā
VM1
VM2
VM3
VM4
Service 1
83.1
85.2
84.7
84.4
Service 2
25.6
24.2
25.5
27.1
Service 3
22.1
24.7
23.9
23.3
Service 4
68.5
72.3
71.9
70.8