2021
DOI: 10.1007/s11276-021-02554-w
|View full text |Cite
|
Sign up to set email alerts
|

Joint computation offloading and task caching for multi-user and multi-task MEC systems: reinforcement learning-based algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
30
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
7
3

Relationship

4
6

Authors

Journals

citations
Cited by 135 publications
(48 citation statements)
references
References 54 publications
0
30
0
Order By: Relevance
“…ey proposed an effective Lyapunov online algorithm that can perform joint task unloading and dynamic data caching strategies for computing tasks or data content. Elgendy et al [14] cached the completed applications and related codes on the edge server. On this basis, two effective algorithms based on Q-learning and deep-q-network are used to solve the approximate optimal solution of the problem, effectively reducing the overhead of mobile devices.…”
Section: Related Workmentioning
confidence: 99%
“…ey proposed an effective Lyapunov online algorithm that can perform joint task unloading and dynamic data caching strategies for computing tasks or data content. Elgendy et al [14] cached the completed applications and related codes on the edge server. On this basis, two effective algorithms based on Q-learning and deep-q-network are used to solve the approximate optimal solution of the problem, effectively reducing the overhead of mobile devices.…”
Section: Related Workmentioning
confidence: 99%
“…In mobile edge computing [15], an automated recommendation system is proposed for the joint computation of multiuser offloading and task caching. In this paper, Q-learning and Deep-Q-Network-based algorithms are proposed for this system.…”
Section: Introductionmentioning
confidence: 99%
“…However, URLLC implementation requires a delay to be decreased from 10 ms to 1 ms. This is achieved by the technical features involved in building a network at the level of access [12][13][14][15], in particular by changing the format of transmitted frames or by changing the structure of the network at other levels [3] primarily because of the "approaching" point of service provided by the user (cloud and edge organization) [16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%