2020
DOI: 10.1109/tvt.2020.3022766
|View full text |Cite
|
Sign up to set email alerts
|

Computation Offloading in Hierarchical Multi-Access Edge Computing Based on Contract Theory and Bayesian Matching Game

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 41 publications
0
14
0
Order By: Relevance
“…Among the wide variety of applications of contract theory in wireless communications and networking (e.g., cognitive radio networks [10], Device-to-Device (D2D) communications [11], crowdsourcing [12], resource allocation [13]), some effort has been made in the direction of computation offloading. In [14], the problem of incentivization of potential temporary edge nodes from an edge computing operator is examined under a MEC paradigm. Similar problems are considered in [15], [16] under the concept of vehicular edge/fog computing offered by vehicles to other travelling vehicles or roadside users.…”
Section: A Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Among the wide variety of applications of contract theory in wireless communications and networking (e.g., cognitive radio networks [10], Device-to-Device (D2D) communications [11], crowdsourcing [12], resource allocation [13]), some effort has been made in the direction of computation offloading. In [14], the problem of incentivization of potential temporary edge nodes from an edge computing operator is examined under a MEC paradigm. Similar problems are considered in [15], [16] under the concept of vehicular edge/fog computing offered by vehicles to other travelling vehicles or roadside users.…”
Section: A Related Workmentioning
confidence: 99%
“…Focusing on the practical application of contract theory models, most of the existing works in the literature, including the aforementioned ones in [10]- [12], [14]- [17], rely on one-dimensional user types that typically capture each user's level of willingness or ability to participate in the contract. Nevertheless, such an approach appears to be rather restrictive, since in most cases there are more than one distinguishing features for each user that should steer the contract modeling, especially when these features are conflicting.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the above labels, we can predict the brand preference of cross-border e-commerce consumers. Bayesian personalized ranking method (BPR) obtains the correct ranking of brands based on Bayesian theory [20], as shown in formula (13):…”
Section: Regression Algorithm Of Brand Preference Predictionmentioning
confidence: 99%
“…e proposed method, literature [4] method, and literature [5] method are used to calculate the brand emotion tendency of the above consumers, and the calculation accuracy of different methods is compared, as shown in formula (20):…”
Section: Calculation Of Brand Emotional Tendencymentioning
confidence: 99%