2017
DOI: 10.1109/jsac.2017.2760186
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Schedule of Mobile Edge Computing for Internet of Things Using Partial Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
109
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 242 publications
(109 citation statements)
references
References 25 publications
0
109
0
Order By: Relevance
“…Offline algorithm for the joint optimization would require complete non-causal information of networks and may suffer from the curse of dimensionality when the system is in large scale. To address these issues, a perturbed Lyapunov technique was employed to decouple the spatial-and time-dependency of multiple resources in [13] and [14]. However, these analyses may not be suitable for IIoT, since their energy harvesting processes were modeled as stochastic energy packet arrivals.…”
Section: A Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Offline algorithm for the joint optimization would require complete non-causal information of networks and may suffer from the curse of dimensionality when the system is in large scale. To address these issues, a perturbed Lyapunov technique was employed to decouple the spatial-and time-dependency of multiple resources in [13] and [14]. However, these analyses may not be suitable for IIoT, since their energy harvesting processes were modeled as stochastic energy packet arrivals.…”
Section: A Related Workmentioning
confidence: 99%
“…It is generally impractical due to systems' stochasticity and unpredictability, partial feedback, and non-negligible transmission delay. In [13] and [25], new analytic frameworks were proposed and applied to accommodate outdated NSI, which were able to diminish the optimality loss asymptotically. Chenshan et al in [26] later extended those frameworks to the scenario of Internet of Things with finite device buffers.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…By integrating the network function virtualization (NFV) techniques, MEC provides flexibility on the resource scheduling and service deployment [201], [202]. Initial investigations on EH powered MEC systems have been conducted in [203]- [211], focusing on EHbased MEC servers [203], [204] and EH mobile users [205]- [210]. In [203], [210], the system operator learns online the task amounts to be offloaded from the MEC server to the central cloud and the CPU frequency of the MEC server, based on the states of core network congestion and RES.…”
Section: A Mobile Edge Computing (Mec)mentioning
confidence: 99%
“…Fog computing, also known as fogging, is an architecture that uses edge devices to carry out a substantial amount of local computation, storage, and communication [18][19][20]. We use a fog server at the BS to concentrate data, data processing, and applications.…”
Section: Introductionmentioning
confidence: 99%