2018
DOI: 10.1109/comst.2018.2814571
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
222
0
5

Year Published

2018
2018
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 551 publications
(251 citation statements)
references
References 173 publications
0
222
0
5
Order By: Relevance
“…Lee et al in [31] and Alrawais et al in [32] discuss the security and privacy issues and present solutions for mitigating the security threats. More details of Fog computing are in [33], [34]. Recently, several groups have also advocated the need for Fog Robotics.…”
Section: Fog Roboticsmentioning
confidence: 99%
See 1 more Smart Citation
“…Lee et al in [31] and Alrawais et al in [32] discuss the security and privacy issues and present solutions for mitigating the security threats. More details of Fog computing are in [33], [34]. Recently, several groups have also advocated the need for Fog Robotics.…”
Section: Fog Roboticsmentioning
confidence: 99%
“…Quality of service provisioning depends upon a number of factors such as communication latency, energy constraints, durability, size of the data, model placement over Cloud and/or Edge, computation times for learning and inference of the deep models, etc. This has motivated several models for appropriate resource allocation and service provisioning [34]. Chinchali et al use a deep reinforcement learning strategy to offload robot sensing tasks over the network [56].…”
Section: Flexibility Of Resource Placement and Allocationmentioning
confidence: 99%
“…The main purpose of dew computing is to fetch existing remote computational resources at a near vicinity to the dew‐user. Four trending paradigms are in this list, such as cloud computing, cloudlets, fog computing, and mobile edge computing (MEC) . Cloud computing provides the best solution for large enterprize related issues through virtualization techniques.…”
Section: Taxonomymentioning
confidence: 99%
“…It provides an easy, reliable, fast, secure, and close access for computational services. In Fog computing, service nodes are close to the end‐users, and they perform all mandatory computing services . The Fog computing concept is similar to natural “Fog” in the environment, as they are closed to ground/humans.…”
Section: Introductionmentioning
confidence: 99%
“…We can feel and access the Fog easily. This concept is applied to the computing domain, where the computing and processing units are deployed close to end‐users . Therefore, a layman user can feel real‐time computing and data processing.…”
Section: Introductionmentioning
confidence: 99%