2023
DOI: 10.1016/j.comnet.2022.109458
|View full text |Cite
|
Sign up to set email alerts
|

Computation power maximization for mobile edge computing enabled dense network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 47 publications
0
1
0
Order By: Relevance
“…Figure 17 comprises four subfigures, showing transmitted data of legitimate nodes, the number of GTS-requesting nodes entertained, the data transmission time of all the legitimate nodes, and the mean trust values. The results are compared with the 0/1 knapsack algorithm [32] in addition to the other three standards. The results show that the proposed scheme allows more legitimate nodes to transmit their data as compared to the four other schemes.…”
Section: Mean Trust Valuementioning
confidence: 99%
“…Figure 17 comprises four subfigures, showing transmitted data of legitimate nodes, the number of GTS-requesting nodes entertained, the data transmission time of all the legitimate nodes, and the mean trust values. The results are compared with the 0/1 knapsack algorithm [32] in addition to the other three standards. The results show that the proposed scheme allows more legitimate nodes to transmit their data as compared to the four other schemes.…”
Section: Mean Trust Valuementioning
confidence: 99%
“…In recent years MEC has received significant attention from the academic and industrial communities [1]. MEC alleviates the shortcomings of traditional cloud computing by minimizing the delay of computation services for mobile devices [2]. One of MEC's critical challenges is selecting an efficient placement of the cloudlet and task offloading decision [3].…”
Section: Introductionmentioning
confidence: 99%