2023
DOI: 10.1109/tvt.2022.3204839
|View full text |Cite
|
Sign up to set email alerts
|

Reliable Distributed Computing for Metaverse: A Hierarchical Game-Theoretic Approach

Abstract: The metaverse is regarded as a new wave of technological transformation that provides a virtual space for people to interact through digital avatars. To achieve immersive user experiences in the metaverse, real-time rendering is the key technology. However, computing intensive tasks of real-time rendering from metaverse service providers cannot be processed efficiently on a single resource-limited mobile device. Alternatively, such mobile devices can offload the metaverse rendering tasks to other mobile device… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
79
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 83 publications
(79 citation statements)
references
References 47 publications
0
79
0
Order By: Relevance
“…At a time when the current educational system is under fire for being divorced from the actual world, the metaverse can assist develop virtual worlds that can enable teachers to engage with students regardless of geographical barriers. The metaverse enables educators to design more immersive learning experiences [24], [25], [28], [41].…”
Section: Metaverse In Educationmentioning
confidence: 99%
“…At a time when the current educational system is under fire for being divorced from the actual world, the metaverse can assist develop virtual worlds that can enable teachers to engage with students regardless of geographical barriers. The metaverse enables educators to design more immersive learning experiences [24], [25], [28], [41].…”
Section: Metaverse In Educationmentioning
confidence: 99%
“…This reduces the level of vulnerability of the system to cyber threats. In [93], to increase the reliability of the Metaverse network, the authors have presented a method based on distributed coded computing algorithms that can be implemented at the edge. Also, a growing number of solutions are being offered for edge computing reliability in hazardous environments [94].…”
Section: A Metaverse Requirements To Be Met By Edge Computingmentioning
confidence: 99%
“…Since the metaverse is built upon cyberspace, all security threats, such as botnets [2], website fingerprinting [3], [4], phishing [5], sybil attacks [6], and frauds [7], would be inherited. Additionally, the metaverse's growing complexity and diversity in terms of functionalities [8], as well the exponentially increasing demand in network bandwidth and computational resources [9], [10], makes security big concerns. On the one hand, complex and diverse functionalities introduce extra vulnerabilities, exposing the metaverse to new unexpected threats [11].…”
Section: Introductionmentioning
confidence: 99%