2021
DOI: 10.1007/s10514-021-09987-4
|View full text |Cite
|
Sign up to set email alerts
|

Network offloading policies for cloud robotics: a learning-based approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 41 publications
(11 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…Engineers must handle sensor data correctly to overcome such constraints and utilize the benefits of wireless cellular communication. Many studies research this topic, such as [ 10 ].…”
Section: Uav As Uementioning
confidence: 99%
See 2 more Smart Citations
“…Engineers must handle sensor data correctly to overcome such constraints and utilize the benefits of wireless cellular communication. Many studies research this topic, such as [ 10 ].…”
Section: Uav As Uementioning
confidence: 99%
“…Therefore, every engineer must carefully assess the capability of the current wireless communication. Then, one has to design a corresponding sensor data handling mechanism to ensure that the application stays within the bounds of the offered communication while making as much use of the available sensor data as possible [ 7 , 10 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Conceived as highly scalable systems with access to potentially unlimited resources, they can accelerate both CNN inference and training on dedicated servers, fully or partially taking on the required computational load and thus relegating user-level devices to mere data-entry and result-presentation terminals [21,22]. Nevertheless, this model presents certain limitations in terms of response speed, availability, and security [23][24][25][26][27][28][29][30][31], which is why it might be inadequate in scenarios where system response time must be as short as possible, in austere contexts with limited communication or computational resources, or even in cases where data privacy is a hard requirement. More specifically:…”
Section: Introductionmentioning
confidence: 99%
“…• Increase in latency, i.e., the response time of the system, does not harm detection accuracy, but it can lead to significant degradation of the experience [24]. Offloading processing tasks to a remote machine adds to inference time-that is, trained model execution timethe amount of time devoted to image encoding and transfer, consequently generating the perception among end-users of higher slowness in the whole process [23,25,28]. • Connectivity between a terminal device and the serverside is crucial.…”
Section: Introductionmentioning
confidence: 99%