2019
DOI: 10.1109/jiot.2018.2878872
|View full text |Cite
|
Sign up to set email alerts
|

A Maximum Cache Value Policy in Hybrid Memory-Based Edge Computing for Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 27 publications
0
10
0
Order By: Relevance
“…Over the past few years, a large number of research works has investigated cloud computing [18][19][20], fog&edge computing [21][22][23][24][25][26][27][28][29], and content caching [30][31][32]. However, most of these works involved these three technologies separately.…”
Section: Related Workmentioning
confidence: 99%
“…Over the past few years, a large number of research works has investigated cloud computing [18][19][20], fog&edge computing [21][22][23][24][25][26][27][28][29], and content caching [30][31][32]. However, most of these works involved these three technologies separately.…”
Section: Related Workmentioning
confidence: 99%
“…Testbed results verified the energy efficiency and adaptability of this approach However, the storage, processing and network features have not been considered in the current work. There are some related work can be used as references [124]- [134], which are not described in our body text.…”
Section: Energy Savings Strategies Utilizing Data Replication Techmentioning
confidence: 99%
“…The operating system level includes applications for different scenarios, file systems for file management, and block layers for blockdevice abstraction. At the flash memory level, a flash translation layer (FTL) acts as an interface layer between the operating system and the flash memory chip to overcome the inherent defects of NAND flash memory and becomes compatible with the legacy or heterogeneous upper-layer operating system [21]- [23]. Buffer management is integrated in FTL, along with other flash memory management strategies, such as address mapping, garbage collection, and wear leveling [24]- [26].…”
Section: Introductionmentioning
confidence: 99%