IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022
DOI: 10.1109/infocom48880.2022.9796961
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit Approach

Abstract: The widespread adoption of edge computing has emerged as a prominent trend for alleviating task processing delays and reducing energy consumption. However, the dynamic nature of network conditions and the varying computation capacities of edge servers (ESs) can introduce disparities between computation loads and available computing resources in edge computing networks, potentially leading to inadequate service quality. To address this challenge, this paper investigates a practical scenario characterized by dyn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(6 citation statements)
references
References 37 publications
0
6
0
Order By: Relevance
“…Then, the exploitation phase is the phase where the agent continuously chooses the action having the highest reward for future plays. Many studies resort to the multi-armed bandits (MAB), a RL framework applied in a single-state environment [9], to solve the problem of channel allocation in ad-hoc networks and treat the exploration and exploitation phases separately to learn the channels [10] and to manage the strategy for edge users [11].…”
Section: Prerequisites and System Componentsmentioning
confidence: 99%
“…Then, the exploitation phase is the phase where the agent continuously chooses the action having the highest reward for future plays. Many studies resort to the multi-armed bandits (MAB), a RL framework applied in a single-state environment [9], to solve the problem of channel allocation in ad-hoc networks and treat the exploration and exploitation phases separately to learn the channels [10] and to manage the strategy for edge users [11].…”
Section: Prerequisites and System Componentsmentioning
confidence: 99%
“…Mobile Edge Computing: Existing excellent works have conducted various research questions in MEC, including re-source allocation (e.g., (Wang et al 2022b)), service placement (e.g., (Taka, He, and Oki 2022)), and proactive caching (e.g., (Liu et al 2022a)). Task offloading (Wang, Ye, and Lui 2022;Ma et al 2022;Chen and Xie 2022), as another main research question in MEC, attracting considerable attention.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The simulation results further affirmed that the newly proposed algorithm can significantly conserve overhead compared to other existing computation offloading algorithms. Other inquiries documented in [18][19][20] addressed similar multi-user and multi-server environments. These studies introduced heuristic decision-making algorithms for offloading, which strategically assigned different tasks to optimal channels and servers with the objective of reducing average completion times.…”
Section: Related Workmentioning
confidence: 99%