2020 IEEE World Congress on Services (SERVICES) 2020
DOI: 10.1109/services48979.2020.00028
|View full text |Cite
|
Sign up to set email alerts
|

Availability-aware Service Function Chain Placement in Mobile Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(2 citation statements)
references
References 9 publications
0
1
0
Order By: Relevance
“…A greedy algorithm is a type of algorithm that aims to solve a problem by iteratively selecting the locally optimal choice at each step. Several studies [13,[30][31][32][33][34] have utilized the widely recognized greedy method as a comparative approach for evaluating the SFC deployment problem. While a greedy algorithm is often characterized by its simplicity and efficiency, this does not guarantee the attainment of an optimal solution in all cases.…”
Section: Greedy Algorithmmentioning
confidence: 99%
“…A greedy algorithm is a type of algorithm that aims to solve a problem by iteratively selecting the locally optimal choice at each step. Several studies [13,[30][31][32][33][34] have utilized the widely recognized greedy method as a comparative approach for evaluating the SFC deployment problem. While a greedy algorithm is often characterized by its simplicity and efficiency, this does not guarantee the attainment of an optimal solution in all cases.…”
Section: Greedy Algorithmmentioning
confidence: 99%
“…With the preliminaries of superior testbeds and architectural systems, the decision-making and management entities of intelligent modules can be deployed within specified interfaces and network service demands which interact with operations support system (OSS)/business support system (BSS). Therefore, the confluence of network functions virtualization (NFV), software-defined networking (SDN), and edge computing allows an adaptive configuration of intelligent model policies on resource pooling adjustment, networking abstractions, and efficient slicing capabilities in multi-type Quality-of-Service (QoS) indicators with different criticality requirements [4][5][6][7].…”
Section: Introduction 1motivation and Problem Statementmentioning
confidence: 99%