Proceedings of the 4th ACM/IEEE Symposium on Edge Computing 2019
DOI: 10.1145/3318216.3363320
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-by-design task offloading for UAV-mounted cloudlets

Abstract: We consider a network of capacitated Unmanned Aerial Vehicles (UAVs) cooperating as an aerial edge computing system. Due to limited onboard energy and computation capabilities of UAV-mounted cloudlets, a single UAV might not be able to execute a large number of tasks and guarantee their desired quality of services. The overloaded UAV can fulfill its overwhelming workload by offloading its tasks to other UAVs. However, data privacy and accessibility are of critical importance that need to be considered for offl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
0
0
Order By: Relevance
“…Many advancements in collaborative perception using infrastructure and vehicle (V2X) communication have been made for disturbed systems. 7,8 Wang et al 9 used local point cloud data from neighboring infrastructures for 3D object detection, leveraging collaborative perception through an encoder-decoder network architecture and an attention-based learnable communication mechanism. This framework demonstrated enhanced detection accuracy on a custom dataset.…”
Section: Collaboration-based Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…Many advancements in collaborative perception using infrastructure and vehicle (V2X) communication have been made for disturbed systems. 7,8 Wang et al 9 used local point cloud data from neighboring infrastructures for 3D object detection, leveraging collaborative perception through an encoder-decoder network architecture and an attention-based learnable communication mechanism. This framework demonstrated enhanced detection accuracy on a custom dataset.…”
Section: Collaboration-based Learningmentioning
confidence: 99%
“…r ic . cos θ ij log(1 + F (q i , q j )) (8) and add it to the priority queue Q (Lines 7-9). This score considers the device's reliability level r ic , its distance to the object F (q i , q j ), and its angle of view θ ij , ensuring that devices with higher priorities are selected for committee formation.…”
Section: Collaborative Labeling Algorithmmentioning
confidence: 99%