Research Article

A Trusted and Privacy-Preserved Dispersed Computing Scheme for the Internet of Mobile Things

Algorithm 2

User service offloading.
Input:
Output:
(1)
(2)For in
(3)  if then
(4)    Forin
(5)      If formula4holds then
(6)        Appendto
(7)        break
(8)      end
(9)  else ifthen
(10)    Forin
(11)      If formula4holds then
(12)        Appendto
(13)        break
(14)    end
(15)  else
(16)    Forin
(17)      If formula4holds then
(18)        Appendto
(19)        break
(20)      end
(21)   end
(22) end
(23)  return