2023
DOI: 10.1109/tii.2022.3227634
|View full text |Cite
|
Sign up to set email alerts
|

Fog Node Planning With Stochastic Sensor Traffic in Dynamic Industrial Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…The solutions for fog computing from the specialized literature that are analyzed in different review or survey papers [ 13 , 17 , 18 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 ] specify that either they are presented at an abstract level or they are solutions for specific applications. An essential advantage of the proposed solution, which distinguishes it from the solutions presented in the specialized literature, is customizability, because it allows the instantiation of objects and their interconnection to implement specific solutions.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The solutions for fog computing from the specialized literature that are analyzed in different review or survey papers [ 13 , 17 , 18 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 ] specify that either they are presented at an abstract level or they are solutions for specific applications. An essential advantage of the proposed solution, which distinguishes it from the solutions presented in the specialized literature, is customizability, because it allows the instantiation of objects and their interconnection to implement specific solutions.…”
Section: Discussionmentioning
confidence: 99%
“…The main solutions for fog computing from the specialized literature that are analyzed in different reviews or survey papers [ 13 , 17 , 18 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 ] present the high-level parts of the fog nodes, such as security, the task scheduling, or resource scheduling when resources are limited; these papers are not focused on how data are processed within fog computing.…”
Section: Related Workmentioning
confidence: 99%