2019
DOI: 10.1109/mwc.2019.1800411
|View full text |Cite
|
Sign up to set email alerts
|

Artificial Intelligence Empowered Edge Computing and Caching for Internet of Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
102
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 245 publications
(102 citation statements)
references
References 11 publications
0
102
0
Order By: Relevance
“…Reference [18] used game theory to solve the optimization problem and proved the existence of Nash equilibrium. Reference [19] calculated the theoretical upper limit of server-side task processing, and proved that their algorithm can be close to the theoretical value. It transformed nonconvex quadratic functions into separable semi-definite programming problems by relaxation techniques under quadratic constraints.…”
Section: Related Workmentioning
confidence: 84%
“…Reference [18] used game theory to solve the optimization problem and proved the existence of Nash equilibrium. Reference [19] calculated the theoretical upper limit of server-side task processing, and proved that their algorithm can be close to the theoretical value. It transformed nonconvex quadratic functions into separable semi-definite programming problems by relaxation techniques under quadratic constraints.…”
Section: Related Workmentioning
confidence: 84%
“…Moreover, blockchain tehcnologies can be used to protect both the energy and information interactions between electric vehicles [94] and hybrid electric vehicles in smart grids [95], [96]. In the future, incorporating artificial intelligence, mobile edge computing and blockchain can further optimize the resource allocation in IoVs [97].…”
Section: F Internet Of Vehicles and Unmanned Aerial Vehiclesmentioning
confidence: 99%
“…• ML-Aware Networking: The networking entities are aware of the availability of ML functionalities and optionally might exploit advantages of ML, for example, when the user load escalates. [344] UAV network trajectory control a model-free UAV trajectory control scheme in smart cities relying on DQN [345] ITS train control jointly optimize the communication handoff strategy and control performances [153] energy-aware network energy scheduling associate the stacked auto-encoder and the deep Q-learning model [346] CRAN power allocation decide RRU's sleeping mode and the optimal beamformer's power allocation [347] cognitive IoT traffic scheduling construct the mapping between states and actions relying on stacked auto-encoder [348] content-centric IoT cache allocation jointly design cache allocation and transmission rate for maximizing long-term QoE [350] IA network user scheduling obtain the action-value function relying on DQN for lowering complexity [351] vehicular network resource allocation consider programmable SDN, information-centric caching and mobile edge computing [352] CR network spectrum access distributed spectrum access for maximizing network utility without message exchanges [353] CR network multichannel access adaptive DQN aided multichannel access yielding a near-optimal performance [356] MEC network resource allocation DQN assisted cache, computation and power resources joint association [357] CR network energy scheduling energy efficiency optimization for distributed cooperative spectrum sensing [358] vehicular network resource allocation edge computing and caching resources dynamic association for IoV and resource-allocation is excessive for full search. Depending on the specific application, this may rely either on off-line ML or on on-line ML.…”
Section: A Future Machine Learning Aided Network Applicationsmentioning
confidence: 99%