2020
DOI: 10.1109/jsyst.2019.2903293
|View full text |Cite
|
Sign up to set email alerts
|

Cache-Aware Computation Offloading in IoT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 40 publications
(20 citation statements)
references
References 32 publications
0
19
0
1
Order By: Relevance
“…Based on the information in the current time slot, their tasks are dynamically offloaded to the nearby user equipment that has a lot of idle CPU resources. In a large amount of research work on edge computing and D2D offloading, a few research results have taken into account information security issues [31]. Whether it is a centralized or distributed architecture, the focus of most research is how to make offload decisions, how to schedule resources, and how to optimize system performance after base stations or UEs have mastered information about various mobile devices and edge servers.…”
Section: Related Researchmentioning
confidence: 99%
“…Based on the information in the current time slot, their tasks are dynamically offloaded to the nearby user equipment that has a lot of idle CPU resources. In a large amount of research work on edge computing and D2D offloading, a few research results have taken into account information security issues [31]. Whether it is a centralized or distributed architecture, the focus of most research is how to make offload decisions, how to schedule resources, and how to optimize system performance after base stations or UEs have mastered information about various mobile devices and edge servers.…”
Section: Related Researchmentioning
confidence: 99%
“…Various Device Limitations. The conventional network system needs upgrades and evolution, so do our own devices, which also have some flaws and need to be dealt with [115]. We pick up our cell phones quite frequently nowadays and hardware limitations such as poor battery life have forced us to depend on our software by optimizing our resource allocation.…”
Section: Factors Influencing Qoementioning
confidence: 99%
“…In particular, due to the integration of powerful sensoring and computing functions, IoT devices are equipped with intelligent identification, behavior tracking and daily management, heart rate monitoring, etc. [6]- [8]. Meanwhile, the application of short-range communication technology enables these IoT devices to form a variety of ad hoc network application scenarios (e.g., content airdrops and Apple Edge Cache Service).…”
Section: Introductionmentioning
confidence: 99%