2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High P 2018
DOI: 10.1109/bds/hpsc/ids18.2018.00060
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Computation Offloading for Mobile Edge Computing Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…These surveys focused on multiple aspects such as architecture [5]- [7], resource allocation [8], [9], communication [8], [10], [11], caching [10], mobility management [6], [10], [12], integration with wireless, IoT and 5G technologies [5], [8], [13], [14], decision on task offloading [6], [11], application partitioning [12], [15], application models [8], [12], [16], [17], application scenarios [5], [8], [10], [15], [18], [19] and algorithms [11], [12], [17].…”
mentioning
confidence: 99%
“…These surveys focused on multiple aspects such as architecture [5]- [7], resource allocation [8], [9], communication [8], [10], [11], caching [10], mobility management [6], [10], [12], integration with wireless, IoT and 5G technologies [5], [8], [13], [14], decision on task offloading [6], [11], application partitioning [12], [15], application models [8], [12], [16], [17], application scenarios [5], [8], [10], [15], [18], [19] and algorithms [11], [12], [17].…”
mentioning
confidence: 99%
“…(iii) If the user is not legal, he is not provided with the service of computation offloading [51]. Mostly, the computation offloading algorithm's purpose is to minimize the energy consumed by MDs by migrating tasks to the MEC server while fulfilling the reduction in execution delay accordingly.…”
Section: A Computation Offloading (Co) Processmentioning
confidence: 99%
“…Owing to such unprecedented amount of data with exponential growth trend [3] and the typical private nature of these data, sending all the data to a remote cloud becomes impracticable, unnecessary, and full of privacy concerns [2]. Therefore, all of these factors have contributed to the emergence of the new mobile edge computing (MEC) paradigm [4][5][6], which exploits the advancement in the storage and computation capacity of modern devices for pushing processing and storing procedures locally on the devices themselves. The MEC approach involves the cooperation of edge-nodes with the remote cloud in order to give rise to a computing system able to support large-scale task processing and managing the environment [1].…”
Section: Introductionmentioning
confidence: 99%