Have a personal or library account? Click to login
A Study of Edge Computing Offloading Based on Security Cover
By:
Luo Pei and  Lei Juchao  
Open Access
|Jul 2020

References

  1. Xie Renchao, Huang Tao, Yang Fan, Liu Yunjie. Principles and practice of edge computing [M]. Beijing: People’s Publishing House, 2019.152-155
  2. Taleb T, Samdanis K, Mada B, et al On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration[J]. Communications Surveys & Tutorials, IEEE, 2017, 19(3):1657–1681.
  3. Liu J, Mao Y, Zhang J, et al. Delay-Optimal Computation Task Scheduling for Mobile-Edge Computing Systems[J]. 2016.
  4. Mao Y, Zhang J, Letaief K B. Dynamic Computation Offloading for Mobile-Edge Computing with Energy Harvesting Devices[J]. IEEE Journal on Selected Areas in Communications, 2016:1–1.
  5. Guo X, Singh R, Zhao T, et al. An index based task assignment policy for achieving optimal power-delay tradeoff in edge cloud systems[C]//ICC 2016 - 2016 IEEE International Conference on Communications. IEEE, 2016.
  6. Chen X, Jiao L, Li W, et al. Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing[J]. IEEE/ACM Transactions on Networking, 2015:1–1.
  7. Chen Yanbing, Li Juan, Zhang Qi. Exploration of quantum evolution algorithms for solving constrained multi-objective optimization problems[J]. Electronic Technology and Software Engineering, 2015, 000(016):P.185-186,187.
Language: English
Page range: 58 - 63
Published on: Jul 13, 2020
Published by: Sciendo
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2020 Luo Pei, Lei Juchao, published by Sciendo
This work is licensed under the Creative Commons Attribution 4.0 License.