2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) 2017
DOI: 10.1109/spawc.2017.8227713
|View full text |Cite
|
Sign up to set email alerts
|

Multiple access computational offloading with computation constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…where F(y (tj ) ) denotes the feasible set of problem (26) when fixing y = y (tj ) . By taking limit along the converging subsequence (x (tj ) , y (tj ) ) on both sides of (30), we get…”
Section: B Proof Of Theoremmentioning
confidence: 99%
See 3 more Smart Citations
“…where F(y (tj ) ) denotes the feasible set of problem (26) when fixing y = y (tj ) . By taking limit along the converging subsequence (x (tj ) , y (tj ) ) on both sides of (30), we get…”
Section: B Proof Of Theoremmentioning
confidence: 99%
“…There are some related works worth mentioning. The works [22] and [26] consider a joint optimization of radio and computation resources for energy minimization with latency constraints in single-cell and multicell networks, respectively (resp. ), where all the computation is done at the cloud with the UE-BS association prefixed.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, [23] proposed a wireless communication resource allocation algorithm that can meet the constraints of system computing resources and designed a loosely coupled architecture to reduce the burden on the fronthaul link and to achieve ultralow latency. References [24] and [25] studied the optimization of wireless and computing resources to minimize energy consumption in a single-cell and multicell network under a given delay constraint by deleting them jointly. However, all tasks in this case are performed in the cloud, and the access relationship between the user and the base station is set in advance.…”
Section: Introductionmentioning
confidence: 99%