Results 11 to 20 of about 419,039 (271)
Survey on Multi-Access Edge Computing Security and Privacy [PDF]
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MEC deployments.
Pasika Ranaweera +2 more
openaire +6 more sources
EdgeDS: Data Spaces enabled Multi-Access Edge Computing
The potential of Edge Computing technologies is yet to be exploited for multi-domain, multi-party data-driven systems. One aspect that needs to be tackled for the realization of envisioned open edge Ecosystems, is the secure and trusted exchange of data services among diverse stakeholders.
Kalogeropoulos, Ioannis +4 more
openaire +2 more sources
Programmability of Connectivity Control
Network programmability and edge computing as key features of next generation communications enable innovative services. While the programmability is focused on the core network of the fifth-generation system, the edge computing moves the network ...
Ivaylo I. Atanasov, Evelina N. Pencheva
doaj +1 more source
Realizing Multi-Access Edge Computing Feasibility: Security Perspective [PDF]
Internet of Things (IoT) and 5G are emerging technologies that prompt a mobile service platform capable of provisioning billions of communication devices which enable ubiquitous computing and ambient intelligence. These novel approaches are guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. To
Ranaweera, Pasika +2 more
openaire +2 more sources
Mobile Personal Multi-Access Edge Computing Architecture Composed of Individual User Devices
The Multi-Access Edge Computing (MEC) paradigm provides a promising solution to solve the resource-insufficiency problem in user mobile devices by offloading computation-intensive and delay-sensitive computing services to nearby edge nodes.
Juyong Lee, Jeong-Weon Kim, Jihoon Lee
doaj +1 more source
Comparative Analysis of 5G Mobile Communication Network Architectures
Mobile communication technology is evolving from 4G to 5G. Compared to previous generations, 5G has the capability to implement latency-critical services, such as autonomous driving, real-time AI on handheld devices and remote drone control. Multi-access
Woosik Lee +3 more
doaj +1 more source
Deep Reinforcement Learning Based Computation Offloading in UAV-Assisted Edge Computing
Traditional multi-access edge computing (MEC) often has difficulty processing large amounts of data in the face of high computationally intensive tasks, so it needs to offload policies to offload computation tasks to adjacent edge servers.
Peiying Zhang +6 more
doaj +1 more source
Intelligent task migration with deep Qlearning in multi‐access edge computing
Multi‐access edge computing provides computation and network resources in proximity to user applications in mobile environments. Deploying edge servers in network boundary can not only offload the heavy task loading on the cloud, but also alleviate ...
Sheng‐Zhi Huang +2 more
doaj +1 more source
Attribute-Based Encryption Scheme for Edge Computing [PDF]
When existing Attribute-Based Encryption(ABE) schemes for traditional cloud environment determine the access rights of users,they consider only general attributes such as occupation and age,ignoring time and location constraints,which makes them fail to ...
PENG Hongyan, LING Jiao, QIN Shaohua, DENG Jianfeng
doaj +1 more source
Edge Computing Technology Enablers: A Systematic Lecture Study
With the increasing stringent QoS constraints (e.g., latency, bandwidth, jitter) imposed by novel applications (e.g., e-Health, autonomous vehicles, smart cities, etc.), as well as the rapidly increasing number of connected IoT (Internet of Things ...
Salmane Douch +4 more
doaj +1 more source

