Results 21 to 30 of about 3,062,410 (214)

Digital Twin-Assisted Edge Computation Offloading in Industrial Internet of Things With NOMA

open access: yesIEEE Transactions on Vehicular Technology, 2023
Integrating digital twins (DTs) and multi-access edge computing (MEC) is a promising technology that realizes edge intelligence in 6 G, which has been recognized as the key enabler for Industrial Internet of Things (IIoT).
Long Zhang   +6 more
semanticscholar   +1 more source

Dynamic computation offloading algorithm based on particle swarm optimization with a mutation operator in multi-access edge computing

open access: yesMathematical Biosciences and Engineering, 2021
The current computation offloading algorithm for the mobile cloud ignores the selection of offloading opportunities and does not consider the uninstall frequency, resource waste, and energy efficiency reduction of the user's offloading success ...
Yanpei Liu   +4 more
doaj   +1 more source

Decentralized Computation Offloading and Resource Allocation for Mobile-Edge Computing: A Matching Game Approach

open access: yesIEEE Access, 2018
In this paper, we propose an optimization framework of computation offloading and resource allocation for mobile-edge computing with multiple servers.
Quoc-Viet Pham   +4 more
doaj   +1 more source

Joint Computation Offloading and Resource Allocation for D2D-Assisted Mobile Edge Computing

open access: yesIEEE Transactions on Services Computing, 2023
Computation offloading via device-to-device communications can improve the performance of mobile edge computing by exploiting the computing resources of user devices.
W. Jiang   +5 more
semanticscholar   +1 more source

Computing Offloading and Semantic Compression for Intelligent Computing Tasks in MEC Systems [PDF]

open access: yes, 2023
This paper investigates the intelligent computing task-oriented computing offloading and semantic compression in mobile edge computing (MEC) systems. With the popularity of intelligent applications in various industries, terminals increasingly need to offload intelligent computing tasks with complex demands to MEC servers for computing, which is a ...
arxiv   +1 more source

Research on Distributed V2V Computation Offloading Method for Internet of Vehicles Blockchain [PDF]

open access: yesJisuanji kexue yu tansuo
Vehicle edge computing enhances the computational capabilities of vehicles by offloading computations. The existing task offloading strategies do not simultaneously consider data security, priority of offloading tasks, computation resource release, and ...
MENG Zhen, REN Guanyu, WAN Jianxiong, LI Leixiao
doaj   +1 more source

Optimal Access Scheme for Security Provisioning of C-V2X Computation Offloading Network With Imperfect CSI

open access: yesIEEE Access, 2020
In a cellular vehicle-to-everything (C-V2X) enabled computation-offloading network, vehicular users may deliver computation tasks to a cellular base station (BS) through vehicle-to-infrastructure (V2I) transmission links in order to accommodate ...
Bin Qiu   +4 more
doaj   +1 more source

Utility-Oriented Computation Scheduling for Energy-Efficient Mobile Edge Computing Networks

open access: yesIEEE Open Journal of the Computer Society, 2022
As a new computing paradigm, mobile edge computing (MEC) enables users to execute computation-intensive tasks at the network edge nodes (ENs) through computation offloading.
Ran Bi   +5 more
doaj   +1 more source

Optimal Multi-User Computation Offloading Strategy for Wireless Powered Sensor Networks

open access: yesIEEE Access, 2020
Wireless sensors network (WSN) is widely used for environmental monitoring, surveillance, healthcare, and security services. One of the most critical challenges that WSN facing is the heavy computation requirements and limited energy storage.
Luhan Wang   +4 more
doaj   +1 more source

Encryption Mechanism And Resource Allocation Optimization Based On Edge Computing Environment [PDF]

open access: yesarXiv, 2022
A method for optimizing encryption mechanism and resource allocation based on edge computing environment is proposed. A local differential privacy algorithm based on a histogram algorithm is used to protect user information during task offloading, which allows accurate preservation of user contextual information while reducing interference with the ...
arxiv  

Home - About - Disclaimer - Privacy