2023
DOI: 10.1109/tmc.2022.3150432
|View full text |Cite
|
Sign up to set email alerts
|

Joint Task Offloading and Resource Allocation for Energy-Constrained Mobile Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 168 publications
(36 citation statements)
references
References 50 publications
0
36
0
Order By: Relevance
“…Kuang et al 13 put forward two iterative algorithms JPOA‐J and JPOA‐C to minimize the weighted sum of energy consumption and execution delay in a single‐user MEC system. Jiang et al 14 studied the MEC system with long‐term energy constraint for edge server, and proposed the Lyapunov‐guided algorithm to minimize the average weighted sum of task delay and energy consumption of MDs. Deng et al 15 presented a branch‐and‐bound algorithm LRBB as well as a meta‐heuristic algorithm IWPSO to minimize delay, energy consumption, and service price via jointly optimizing offloading decision and resource allocation.…”
Section: Related Workmentioning
confidence: 99%
“…Kuang et al 13 put forward two iterative algorithms JPOA‐J and JPOA‐C to minimize the weighted sum of energy consumption and execution delay in a single‐user MEC system. Jiang et al 14 studied the MEC system with long‐term energy constraint for edge server, and proposed the Lyapunov‐guided algorithm to minimize the average weighted sum of task delay and energy consumption of MDs. Deng et al 15 presented a branch‐and‐bound algorithm LRBB as well as a meta‐heuristic algorithm IWPSO to minimize delay, energy consumption, and service price via jointly optimizing offloading decision and resource allocation.…”
Section: Related Workmentioning
confidence: 99%
“…The edge layer facilitates terminal device downward access and retail chains and computes information uploaded by terminals. Join the cloud and send the processed information there [ 18 ]. Because this layer is closer to the user, data transfer to the edge layer is better suited for real-time data assessment and digital signal processing, which makes it more effective and safer than cloud computing.…”
Section: Evaluation Of Internet Fraud Governance Capability Using Edg...mentioning
confidence: 99%
“…where κ is the energy coefficient, which depends on the chip architecture [35][36][37]. In this article, according to the work in [38], we set κ = 10 −25 .…”
Section: Processing At Iot Devicementioning
confidence: 99%