Mobile edge computing: A survey on architecture and computation offloading

P Mach, Z Becvar - IEEE communications surveys & tutorials, 2017 - ieeexplore.ieee.org
Technological evolution of mobile user equipment (TIEs), such as smartphones or laptops,
goes hand-in-hand with evolution of new mobile applications. However, running …

A survey of security architectures for edge computing-based IoT

E Fazeldehkordi, TM Grønli - IoT, 2022 - mdpi.com
The Internet of Things (IoT) is an innovative scheme providing massive applications that
have become part of our daily lives. The number of IoT and connected devices are growing …

Highly efficient data migration and backup for big data applications in elastic optical inter-data-center networks

P Lu, L Zhang, X Liu, J Yao, Z Zhu - IEEE Network, 2015 - ieeexplore.ieee.org
This article discusses the technologies for realizing highly efficient data migration and
backup for big data applications in elastic optical inter-data-center (inter-DC) networks. We …

Optimal schedule of mobile edge computing for internet of things using partial information

X Lyu, W Ni, H Tian, RP Liu, X Wang… - IEEE Journal on …, 2017 - ieeexplore.ieee.org
Mobile edge computing is of particular interest to Internet of Things (IoT), where inexpensive
simple devices can get complex tasks offloaded to and processed at powerful infrastructure …

Deep-learning-based joint resource scheduling algorithms for hybrid MEC networks

F Jiang, K Wang, L Dong, C Pan… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
In this article, we consider a hybrid mobile edge computing (H-MEC) platform, which
includes ground stations (GSs), ground vehicles (GVs), and unmanned aerial vehicles …

Decentralized computation offloading for multi-user mobile edge computing: A deep reinforcement learning approach

Z Chen, X Wang - EURASIP Journal on Wireless Communications and …, 2020 - Springer
Mobile edge computing (MEC) emerges recently as a promising solution to relieve resource-
limited mobile devices from computation-intensive tasks, which enables devices to offload …

Response time in man-computer conversational transactions

RB Miller - Proceedings of the December 9-11, 1968, fall joint …, 1968 - dl.acm.org
The literature concerning man-computer transactions abounds in controversy about the
limits of" system response time" to a user's command or inquiry at a terminal. Two major …

Energy-efficient admission of delay-sensitive tasks for mobile edge computing

X Lyu, H Tian, W Ni, Y Zhang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Task admission is critical to delay-sensitive applications in mobile edge computing, but is
technically challenging due to its combinatorial mixed nature and consequently limited …

Collaborative task execution in mobile cloud computing under a stochastic wireless channel

W Zhang, Y Wen, DO Wu - IEEE Transactions on Wireless …, 2014 - ieeexplore.ieee.org
This paper investigates collaborative task execution between a mobile device and a cloud
clone for mobile applications under a stochastic wireless channel. A mobile application is …

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection

A Mourad, H Tout, OA Wahab, H Otrok… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Vehicles and vehicular networks have been compelling targets for malicious
security attacks where several intrusion detection solutions have been proposed for …