2020
DOI: 10.1109/twc.2020.2967371
|View full text |Cite
|
Sign up to set email alerts
|

Incentive-Aware Micro Computing Cluster Formation for Cooperative Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 48 publications
(14 citation statements)
references
References 38 publications
0
14
0
Order By: Relevance
“…A large body of recent research worked on addressing the challenges in offloading. The four offload methods were proposed in [15]. 1) Local Mobile Execution, 2) D2D Offloaded Execution, 3) Direct Fog Offloaded Execution, 4) D2D-Assisted Fog Offloaded Execution.…”
Section: Related Workmentioning
confidence: 99%
“…A large body of recent research worked on addressing the challenges in offloading. The four offload methods were proposed in [15]. 1) Local Mobile Execution, 2) D2D Offloaded Execution, 3) Direct Fog Offloaded Execution, 4) D2D-Assisted Fog Offloaded Execution.…”
Section: Related Workmentioning
confidence: 99%
“…Applications like speech recognition and computer vision are process and storage demanding ones, so it might require to be distributed between a group of fog nodes to accomplish the rigorous latency requirements and high network availability. Thus, fog cluster management must manage adjacent fog nodes, usually of similar capabilities, to form clusters of nodes [49]. A cluster is composed logically of several containers that cooperate to split a task and process it in parallel [50].…”
Section: Fc Software Featuresmentioning
confidence: 99%
“…As a complement to cloud and edge computing, fog computing provides a decentralized framework whereby the available computation resources of nearby mobile devices are exploited for task offloading through incentive policies [6][7][8]. Due to the proximity of the available resources, this type of task partitioning mechanism reduces the latency and the backbone traffic in the network, and in turn, increases energy efficiency [9].…”
Section: Introductionmentioning
confidence: 99%