2018
DOI: 10.1155/2018/8056195
|View full text |Cite
|
Sign up to set email alerts
|

CEPTM: A Cross‐Edge Model for Diverse Personalization Service and Topic Migration in MEC

Abstract: For several reasons, the cloud computing paradigm, e.g., mobile edge computing (MEC), is suffering from the problem of privacy issues. MEC servers provide personalization services to mobile users for better QoE qualities, but the ongoing migrated data from the source edge server to the destination edge server cause users to have privacy concerns and unwillingness of self-disclosure, which further leads to a sparsity problem. As a result, personalization services ignore valuable user profiles across edges where… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…Wu et al [106] proposed a cross-edge model for diverse personalization service and topic migration (CEPTM) in MEC. The edge servers collect the data from MDs.…”
Section: ) Ceptmmentioning
confidence: 99%
“…Wu et al [106] proposed a cross-edge model for diverse personalization service and topic migration (CEPTM) in MEC. The edge servers collect the data from MDs.…”
Section: ) Ceptmmentioning
confidence: 99%
“…e key rationale of the recruiting model is that opportunistic encounters of mobile devices are sufficient and prevalent in modern society [28], which offers lots of opportunities to exploit nearby intelligent devices [29]. If a mobile user has a complex task, it can self-organize its task crowdsourcing by leveraging many encountered mobile users in real-time, and fast response can be realized by interacting with intelligent workers in proximity directly.…”
Section: Recruitment Descriptionmentioning
confidence: 99%
“…e distance between worker W 1 and requester R is too long to establish D2D link. erefore, worker W 1 sends the result to requester R by a cellular link, the wireless transmission through mobile communication system [28]. at means worker W 1 sends the result to the base station at first.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…Hence, in a mobile blockchain network with edge computing, the mining tasks and other computation-intensive tasks can be offloaded to the edge servers. They are close to mobile devices with edge computing or multi-access edge computing [13]. The more miners involved, the better the robustness of the network [14].…”
Section: Introductionmentioning
confidence: 99%