2021
DOI: 10.1007/s11227-021-03672-0
|View full text |Cite
|
Sign up to set email alerts
|

Analytical models for availability evaluation of edge and fog computing nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 37 publications
0
10
0
Order By: Relevance
“…Step 2: Start the loop: obtain the most suitable data according to the ant colony algorithm theory, send out the accounting service task submission signal, update the global pheromone by using the formula (6), and analyze whether to implement the task. If the accounting service task is completed, end it.…”
Section: Intermediate Data Fault Tolerance Technology Based On the An...mentioning
confidence: 99%
See 1 more Smart Citation
“…Step 2: Start the loop: obtain the most suitable data according to the ant colony algorithm theory, send out the accounting service task submission signal, update the global pheromone by using the formula (6), and analyze whether to implement the task. If the accounting service task is completed, end it.…”
Section: Intermediate Data Fault Tolerance Technology Based On the An...mentioning
confidence: 99%
“…Realize the rationalization mechanism of data collection-benefit judgment-fault-tolerant processing, data analysis model, and interactive platform to provide scientific and effective help for enterprise benefit decision-making. At present, the analysis model of node availability evaluation can deal with the reasonable fault tolerance between data storage nodes, but the evaluation is subjective [6]. For the analysis of data storage risk, the sensitivity ranking of the hierarchical model [7] can also be applied in the enterprise to deal with service data problems, but it is still a difficult problem to be solved to put the fault tolerance in an acceptable range.…”
Section: Introductionmentioning
confidence: 99%
“…ubiquitously in a distributed manner. Instead of contacting the centralized cloud, fog enables the client devices to utilize its resource pool at the edge of the network with the scalability characteristics in ever-increasing IoT and mobile devices [24][25][26].…”
Section: Advantages Of Fogmentioning
confidence: 99%
“…Santos et al [26] proposed using a multi-objective optimization algorithm, NSGA-II, in combination with stochastic models, to optimize the system availability of a fog-cloud based IoT for healthcare. Pereira et al [27] in their most recent work proposed comprehensive continuous time Markov chain (CTMC) models to investigate the availability of fog/edge computing nodes for drone-based facial recognition security systems. Only two recent works [2,28] presented comprehensive studies on the performance assessment of IoT-based healthcare systems with a consideration of the integration of cloud/fog/edge computing paradigms using M/M/c/K queuing network models for pure performance evaluation.…”
Section: Literature Reviewmentioning
confidence: 99%