Mobile edge computing: A survey on architecture and computation offloading
Technological evolution of mobile user equipment (TIEs), such as smartphones or laptops,
goes hand-in-hand with evolution of new mobile applications. However, running …
goes hand-in-hand with evolution of new mobile applications. However, running …
A survey of security architectures for edge computing-based IoT
The Internet of Things (IoT) is an innovative scheme providing massive applications that
have become part of our daily lives. The number of IoT and connected devices are growing …
have become part of our daily lives. The number of IoT and connected devices are growing …
Highly efficient data migration and backup for big data applications in elastic optical inter-data-center networks
This article discusses the technologies for realizing highly efficient data migration and
backup for big data applications in elastic optical inter-data-center (inter-DC) networks. We …
backup for big data applications in elastic optical inter-data-center (inter-DC) networks. We …
Optimal schedule of mobile edge computing for internet of things using partial information
Mobile edge computing is of particular interest to Internet of Things (IoT), where inexpensive
simple devices can get complex tasks offloaded to and processed at powerful infrastructure …
simple devices can get complex tasks offloaded to and processed at powerful infrastructure …
Deep-learning-based joint resource scheduling algorithms for hybrid MEC networks
In this article, we consider a hybrid mobile edge computing (H-MEC) platform, which
includes ground stations (GSs), ground vehicles (GVs), and unmanned aerial vehicles …
includes ground stations (GSs), ground vehicles (GVs), and unmanned aerial vehicles …
Decentralized computation offloading for multi-user mobile edge computing: A deep reinforcement learning approach
Z Chen, X Wang - EURASIP Journal on Wireless Communications and …, 2020 - Springer
Mobile edge computing (MEC) emerges recently as a promising solution to relieve resource-
limited mobile devices from computation-intensive tasks, which enables devices to offload …
limited mobile devices from computation-intensive tasks, which enables devices to offload …
Response time in man-computer conversational transactions
RB Miller - Proceedings of the December 9-11, 1968, fall joint …, 1968 - dl.acm.org
The literature concerning man-computer transactions abounds in controversy about the
limits of" system response time" to a user's command or inquiry at a terminal. Two major …
limits of" system response time" to a user's command or inquiry at a terminal. Two major …
Energy-efficient admission of delay-sensitive tasks for mobile edge computing
Task admission is critical to delay-sensitive applications in mobile edge computing, but is
technically challenging due to its combinatorial mixed nature and consequently limited …
technically challenging due to its combinatorial mixed nature and consequently limited …
Collaborative task execution in mobile cloud computing under a stochastic wireless channel
This paper investigates collaborative task execution between a mobile device and a cloud
clone for mobile applications under a stochastic wireless channel. A mobile application is …
clone for mobile applications under a stochastic wireless channel. A mobile application is …
Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection
Internet of Vehicles and vehicular networks have been compelling targets for malicious
security attacks where several intrusion detection solutions have been proposed for …
security attacks where several intrusion detection solutions have been proposed for …