2021
DOI: 10.1016/j.jnca.2021.102974
|View full text |Cite
|
Sign up to set email alerts
|

An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 95 publications
(31 citation statements)
references
References 32 publications
0
31
0
Order By: Relevance
“…The mobile IDS consists of handheld wireless devices (smartphones or mobile devices) with intrusion detection capabilities [59][60][61][62][63][64][65]. It has a self-configurable network in which, without the help of any party, the system automatically deployed very quickly.…”
Section: Ids Overview and Limitationsmentioning
confidence: 99%
“…The mobile IDS consists of handheld wireless devices (smartphones or mobile devices) with intrusion detection capabilities [59][60][61][62][63][64][65]. It has a self-configurable network in which, without the help of any party, the system automatically deployed very quickly.…”
Section: Ids Overview and Limitationsmentioning
confidence: 99%
“…In the past few years, we can find a plethora of work towards offloading problems from mobile devices to the remote server or cloud. Similar to other domains, in cloud computing, Deep Learning (DL) has been widely applied [8][9][10][11][12][13]. At the same time, a tremendous amount of efforts have been made towards reducing the overload of DL tasks to make it feasible on smartphones [14].…”
Section: Related Workmentioning
confidence: 99%
“…The MAPE‐K (monitor, analyze, plan, execute, knowledge) loop is a control methodology for self‐control systems introduced by IBM in 2003. This concept has been utilized as a reference control model in different environments and computation paradigms such as cloud computing, fog computing, and edge computing 18‐20 . The four mentioned components of MAPE‐K would be discussed later in more detail.…”
Section: Introductionmentioning
confidence: 99%
“…The four mentioned components of MAPE‐K would be discussed later in more detail. However, despite its comprehensive utilization in various computation environments such as the cloud, the MAPE‐K loop has not yet been exploited in the service placement process, applied in the present study 20 .…”
Section: Introductionmentioning
confidence: 99%