2019
DOI: 10.1109/jiot.2019.2903191
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning Empowered Task Offloading for Mobile Edge Computing in Urban Informatics

Abstract: Led by industrialization of smart cities, numerous interconnected mobile devices and novel applications have emerged in the urban environment, providing great opportunities to realize industrial automation. In this context, autonomous driving is an attractive issue, which leverages large amounts of sensory information for smart navigation while posing intensive computation demands on resource constrained vehicles. Mobile Edge Computing (MEC) is a potential solution to alleviate the heavy burden on the devices.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
85
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 280 publications
(85 citation statements)
references
References 29 publications
0
85
0
Order By: Relevance
“…Value-iteration methods are often carried out off-policy, meaning that the policy used to generate behavior for training data can be unrelated to the policy being evaluated and improved, called the estimation policy [11,12]. Popular value-iteration methods used in dynamic task scheduling are Q-Learning [7,9,10,[15][16][17] and Deep Q-Network (DQN) [3,8,[18][19][20]. Apart from these two, Greedy methods [19], Monte Carlo Methods [21] and Temporal Difference (TD) Learning [22,23] also have been used.…”
Section: Value-iteration Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Value-iteration methods are often carried out off-policy, meaning that the policy used to generate behavior for training data can be unrelated to the policy being evaluated and improved, called the estimation policy [11,12]. Popular value-iteration methods used in dynamic task scheduling are Q-Learning [7,9,10,[15][16][17] and Deep Q-Network (DQN) [3,8,[18][19][20]. Apart from these two, Greedy methods [19], Monte Carlo Methods [21] and Temporal Difference (TD) Learning [22,23] also have been used.…”
Section: Value-iteration Methodsmentioning
confidence: 99%
“…Deep Q-Networks have also been studied along with reinforcement learning in Task Offloading for Mobile Edge Computing(MEC) applications. In [20], the task offloading in the heterogeneous vehicular network is studied. The system consists an application of several MEC servers, base station, mobile vehicles and roadside units.…”
Section: Deep Q-network (Dqn) / Deep Q-learning (Dql)mentioning
confidence: 99%
See 1 more Smart Citation
“…Considering the highly dynamic topology and time-varying spectrum states in cognitive radio based vehicular networks, a DRL-based optimal data transmission scheduling scheme is designed in [20] to minimize transmission costs while ensuring data QoS requirements. For computation offloading in vehicular netowrks, Zhang et al [21] propose a DRL-based optimal task offloading scheme with varying states of multiple edge servers and multiple vehicular offloading modes.…”
Section: A Related Work and Chanllengesmentioning
confidence: 99%
“…As shown above, the rise of new technologies (e.g. Internet of Vehicles, [34][35][36][37] Heterogeneous Sensor Networks, [38][39][40][41][42][43] Edge Computing, 44,45 Smart City, 46 Blockchain) [47][48][49] makes CIA unsuitable. In this section, we will answer two fundamental problems: which security properties are fundamental?…”
Section: Connotation Of Information Securitymentioning
confidence: 99%