IEEE INFOCOM 2019 - IEEE Conference on Computer Communications 2019
DOI: 10.1109/infocom.2019.8737604
|View full text |Cite
|
Sign up to set email alerts
|

Satisfying Network Slicing Constraints via 5G MAC Scheduling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 45 publications
(18 citation statements)
references
References 27 publications
0
14
0
Order By: Relevance
“…These are given by the fact that active users obtain in average the same amount of resources, but each user obtains more resources when it can achieve higher spectral efficiency than its average. For more details on PF, or similar scheduling metrics with Quality of Service awareness, the reader can resort to [15].…”
Section: Resource Schedulingmentioning
confidence: 99%
“…These are given by the fact that active users obtain in average the same amount of resources, but each user obtains more resources when it can achieve higher spectral efficiency than its average. For more details on PF, or similar scheduling metrics with Quality of Service awareness, the reader can resort to [15].…”
Section: Resource Schedulingmentioning
confidence: 99%
“…Motivated by the ever increasing interests from both NOs and standardization entities [19][20][21], network slicing and multi-access edge computing technologies have recently become "all the rage" in the wireless research community [15,23,24,39,40,45,57]. Lately, we have seen a deluge of algorithms to efficiently slice portions of the network and instantiate service-specific slices.…”
Section: Related Workmentioning
confidence: 99%
“…Motivated by the ever increasing interests from both NOs and standardization entities [18][19][20], network slicing and multi-access edge computing technologies have recently become "all the rage" in the wireless research community [14,22,23,38,39,44,56]. Lately, we have seen a deluge of algorithms to efficiently slice portions of the network and instantiate service-specific slices.…”
Section: Related Workmentioning
confidence: 99%