Proceedings of the Second ACM/IEEE Symposium on Edge Computing 2017
DOI: 10.1145/3132211.3134451
|View full text |Cite
|
Sign up to set email alerts
|

Socially trusted collaborative edge computing in ultra dense networks

Abstract: Small cell base stations (SBSs) endowed with cloud-like computing capabilities are considered as a key enabler of edge computing (EC), which provides ultra-low latency and location-awareness for a variety of emerging mobile applications and the Internet of Things. However, due to the limited computation resources of an individual SBS, providing computation services of high quality to its users faces significant challenges when it is overloaded with an excessive amount of computation workload.In this paper, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
64
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 67 publications
(64 citation statements)
references
References 28 publications
0
64
0
Order By: Relevance
“…We believe scalability is critical in designing fog systems; fog systems should be scalable so that they could be implemented in IoT networks. For instance, a scalable algorithm for fog offloading is an online offloading scheme that does not need information of individual IoT nodes for decision making (e.g., [88,312,313]). We encourage researchers in the fog computing area to verify the scalability of their proposed algorithms and schemes (e.g., by an actual implementation).…”
Section: Scalable Design Of Fog Schemesmentioning
confidence: 99%
“…We believe scalability is critical in designing fog systems; fog systems should be scalable so that they could be implemented in IoT networks. For instance, a scalable algorithm for fog offloading is an online offloading scheme that does not need information of individual IoT nodes for decision making (e.g., [88,312,313]). We encourage researchers in the fog computing area to verify the scalability of their proposed algorithms and schemes (e.g., by an actual implementation).…”
Section: Scalable Design Of Fog Schemesmentioning
confidence: 99%
“…In this section, we discuss in detail the solutions for optimization problems in (8), (14), and (15). Since these optimization problems have the same form, we take the Oracle subproblem (8) as an example. Note that the problem is solved for each time slot t, the time index is dropped in this section for ease of notation.…”
Section: A Exact and Approximate Solutions For Sub-problemsmentioning
confidence: 99%
“…In addition, we see that COERR achieves a higher cumulative utility when the size of rental decision set |F | is larger. A larger rental decision set F loosens the constraint in per-slot problem (8), e.g., the constraint in (8c) becomes looser if we change the rental decision set F n = [0, 2,4] to F n = [0, 2,4,6]. Therefore, we may have a higher utility in each exploitation phase with F n = [0, 2,4,6].…”
Section: ) Comparison On Cumulativementioning
confidence: 99%
“…Furthermore, let ρ j ∈ [0, 1] denote a device-specific weight on security; e.g., a larger ρ j can be used for safetysensitive tasks involved in autonomous vehicle and healthcare, while a smaller ρ j can be adopted by sensors in smart homes and smart grids where privacy is the first priority. Per slot t, the security risk for device j choosing server k is modeled by [26] r j t (k) = ρ j c j t γ 1,t (k) + (1 − ρ j )s j t γ 2,t (k).…”
Section: A Modeling Preliminariesmentioning
confidence: 99%