2019
DOI: 10.1109/tcomm.2019.2898573
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Task Offloading and Resource Allocation for Ultra-Reliable Low-Latency Edge Computing

Abstract: To overcome devices' limitations in performing computation-intense applications, mobile edge computing (MEC) enables users to offload tasks to proximal MEC servers for faster task computation.However, current MEC system design is based on average-based metrics, which fails to account for the ultra-reliable low-latency requirements in mission-critical applications. To tackle this, this paper proposes a new system design, where probabilistic and statistical constraints are imposed on task queue lengths, by apply… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
199
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 361 publications
(200 citation statements)
references
References 41 publications
0
199
0
1
Order By: Relevance
“…i.e., σ k ≤ σ th k and ξ k ≤ ξ th k 8 [37], [38]. Subsequently, applying both parameter thresholds and (9) and (10), we impose constraints for the time-averaged mean and second moment of the conditional excess queue value, i.e.,…”
Section: A D/g/1 Queuing System (Deterministic Arrival)mentioning
confidence: 99%
“…i.e., σ k ≤ σ th k and ξ k ≤ ξ th k 8 [37], [38]. Subsequently, applying both parameter thresholds and (9) and (10), we impose constraints for the time-averaged mean and second moment of the conditional excess queue value, i.e.,…”
Section: A D/g/1 Queuing System (Deterministic Arrival)mentioning
confidence: 99%
“…In [16], an energy-efficient solution is presented to enhance the optimal allocation of resources by cloud providers. An efficient solution presented in [17] proposes ways to utilize the resources in a system that have been freed by preceding tasks. The multi-objective approach presented in the paper uses an approximation approach to perform this process.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, for the sake of simplicity, we can neglect the downlink transmission delay. Some previous works, e.g., [25]- [27], also ignore the downlink transmission time. On the other hand, our work can be easily extended to the scenario where the downlink transmission time is considered.…”
Section: A System Modelmentioning
confidence: 99%