A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Reinforcement Learning-Empowered Mobile Edge Computing for 6G Edge Intelligence
[article]
2022
arXiv
pre-print
This paper provides a comprehensive research review on RL-enabled MEC and offers insight for development in this area. ...
Finally, the open challenges are discussed to provide helpful guidance for future research in RL training and learning MEC. ...
Furthermore, a double auction game model was established to manage the resource by introducing an honest broker between MEC servers and IoT devices in [174] . ...
arXiv:2201.11410v4
fatcat:24igkq4kbrb2pjzwf3mf3n7qtq
Table of Contents
2022
IEEE Transactions on Vehicular Technology
Maiti 1820 A Double Auction Mechanism for Resource Allocation in Coded Vehicular Edge Computing . . . . . . . . . . . . . . . . . . . . . . . . ...
Fair Resource Allocation for User-Centric Networks . . . . . . . . . . . . . . . S. Wu, Y. Wei, S. Zhang, and W. ...
doi:10.1109/tvt.2022.3146184
fatcat:hhxbxepal5bbzatwlcaoyt6r5y
Reinforcement Learning-Empowered Mobile Edge Computing for 6G Edge Intelligence
2022
IEEE Access
This paper provides a comprehensive research review on RL-enabled MEC and offers insight for development in this area. ...
Finally, the open challenges are discussed to provide helpful guidance for future research in RL training and learning MEC. ...
Furthermore, a double auction game model was established to manage the resource by introducing an honest broker between MEC servers and IoT devices in [175] . ...
doi:10.1109/access.2022.3183647
fatcat:pd5z6q4innd5jl25g4r7b4nq3i
Artificial Intelligence-Empowered Edge of Vehicles: Architecture, Enabling Technologies, and Applications
2020
IEEE Access
Artificial intelligence (AI) technology can adapt to rapidly changing dynamic environments to provide multiple task requirements for resource allocation, computational task scheduling, and vehicle trajectory ...
The application of MEC and AI in IoV is analyzed and compared with current approaches. Finally, several promising future directions in the field of IoV are discussed. ...
[72] proposed an online double auction scheme for k-anonymous location privacy protection, which could solve the problems of optimal charging scheduling for electric vehicles and location privacy protection ...
doi:10.1109/access.2020.2983609
fatcat:b45abdrxbracnbfpvtvtu5uxui
Resource Scheduling in Edge Computing: A Survey
[article]
2021
arXiv
pre-print
Particularly, we introduce a unified model before summarizing the current works on resource scheduling from three research issues, including computation offloading, resource allocation, and resource provisioning ...
To shed light on the significance of resource scheduling in real-world scenarios, we discuss several typical application scenarios involved in the research of resource scheduling in edge computing. ...
They proposed two double auction schemes with dynamic pricing in MEC to maximize the number of successful trades, one is called breakeven-based double auction (BDA), and another is called dynamic pricing ...
arXiv:2108.08059v1
fatcat:oo4lepcn3rhdfafefw5lkq2lia
2020 Index IEEE Transactions on Vehicular Technology Vol. 69
2020
IEEE Transactions on Vehicular Technology
+ Check author entry for coauthors ami-mFading Channels With Integer and Non-Integerm; TVT March 2020 2785-2801 Hoang, T.M., Tran, X.N., Nguyen, B.C., and Dung, L.T., On the Performance of MIMO Full-Duplex ...
Hoon-Kim, T., see Kumar, G., TVT July 2020 7707-7722 Horlin, F., see Monfared, S., TVT Oct. 2020 11369-11382 Horng, S., Lu, C., and Zhou, W., An Identity-Based and Revocable Data-Sharing Scheme in ...
Zheng, J., +, TVT
Nov. 2020 13942-13946
Pair Auction and Matching for Resource Allocation in Full-Duplex Cellular
Systems. ...
doi:10.1109/tvt.2021.3055470
fatcat:536l4pgnufhixneoa3a3dibdma
A Survey on Spectrum Management for Unmanned Aerial Vehicles (UAVs)
2021
IEEE Access
In addition, network monitoring, patrolling, and enforcement schemes are identified. ...
Existing surveys mostly focus on UAV applications, channel models, and security challenges, with a lack of studies on spectrum management in the context of UAV networks. ...
For example, by inserting dummy bids, the seller/buyer can collude with the auctioneer to obtain higher payments [212] . (8) Privacy Preservation: Other parties, especially the untrustworthy auctioneer ...
doi:10.1109/access.2021.3138048
fatcat:2h5ls7ywo5g3bbz454gqatvkw4
Emerging Technologies for 6G Non-Terrestrial-Networks: From Academia to Industrial Applications
[article]
2024
arXiv
pre-print
Moreover, we present how ORAN can be utilized for NTNs. Finally, we highlight important challenges, open issues, and future research directions of NTN in the 6G era. ...
Particularly, we first provide an in-depth tutorial on NTN and the key enabling technologies including network slicing, AI/ML, and ORAN. ...
The addition of privacy for resource allocation in integrated networks can also be implemented. ...
arXiv:2403.07763v1
fatcat:73it5nruabfpjhv2nm3o7q5lcm
A Survey of State-of-the-art on Edge Computing: Theoretical Models, Technologies, Directions, and Development Paths
2022
IEEE Access
We hope that this survey report will attract much more attention, stimulate fruitful discussions, and provide ideas and useful guidance for further research on the theoretical models, technologies, directions ...
In order to describe the roadmap of current edge computing research activities, we first address a brief overview of the most advanced edge computing surveys published in the last six years. ...
[77] designed an allocation mechanism using convex programming that solves the management problem of computing resources and radio resources in a MEC system, guaranteeing efficiency and fairness for ...
doi:10.1109/access.2022.3176106
fatcat:7l3p2ug5dfb6pl6qvw7liuzayu
2020 Index IEEE Internet of Things Journal Vol. 7
2020
IEEE Internet of Things Journal
., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe, T.R., ...
., +, JIoT June 2020 4849-4861
Reinforcement-Learning-and Belief-Learning-Based Double Auction
Mechanism for Edge Computing Resource Allocation. ...
., +, JIoT July 2020 6603-6609
A Fog-Assisted Privacy-Preserving Task Allocation in Crowdsourcing. ...
doi:10.1109/jiot.2020.3046055
fatcat:wpyblbhkrbcyxpnajhiz5pj74a
Federated Learning: A Cutting-Edge Survey of the Latest Advancements and Applications
[article]
2024
arXiv
pre-print
This survey provides a comprehensive analysis and comparison of the most recent FL algorithms, evaluating them on various fronts including mathematical frameworks, privacy protection, resource allocation ...
This survey enables researchers to readily identify existing limitations in the FL field for further exploration. ...
A non-orthogonal multiple access (NOMA)-based joint resource allocation and IIoT device orchestration strategy for MEC-assisted hierarchical FL (HFL) was presented in [150] . ...
arXiv:2310.05269v3
fatcat:6uq6yqawozfp5nynuagm6fdkli
6G-enabled Edge AI for Metaverse: Challenges, Methods, and Future Research Directions
[article]
2022
arXiv
pre-print
Specifically, we first introduce three new types of edge-Metaverse architectures that use 6G-enabled edge AI to solve resource and computing constraints in Metaverse. ...
Then we summarize technical challenges that these architectures face in Metaverse and the existing solutions. ...
Therefore, in this paper, we propose an FL-based Metaverse of MEC architecture for protecting users' privacy. ...
arXiv:2204.06192v1
fatcat:cxd5g5vd75gnbowiece77aibea
2021 Index IEEE Transactions on Vehicular Technology Vol. 70
2021
IEEE Transactions on Vehicular Technology
The Author Index contains the primary entry for each item, listed under the first author's name. ...
-that appeared in this periodical during 2021, and items from previous years that were commented upon or corrected in 2021. ...
., +, TVT July 2021 7087-7102 CPPA-D: Efficient Conditional Privacy-Preserving Authentication Scheme With Double-Insurance in VANETs. ...
doi:10.1109/tvt.2022.3151213
fatcat:vzuzqu54irebpibzp3ykgy5nca
Blockchain-enabled wireless communications: a new paradigm towards 6G
2021
National Science Review
sharing, trusted data interaction, secure access control, privacy protection, and tracing, certification and supervision functionalities for wireless networks, thus presenting a new paradigm towards 6G ...
However, this goal is impeded by a number of trust-related issues that are often neglected in network designs. ...
Intelligence
Client
Energy
Control
Content
Resource allocation
and sharing
RSU
Internet
Attack
Defend
MEC
BS
B-RAN for AI
B-RAN
for IoT
B-RAN for MEC
Offload
Natl Sci ...
doi:10.1093/nsr/nwab069
pmid:34691739
pmcid:PMC8433085
fatcat:pz44xzyetnee7beegpy3vkkcua
Wireless Backhaul in 5G and Beyond: Issues, Challenges and Opportunities
[article]
2021
arXiv
pre-print
Resource allocation, deployment, scheduling, power management and energy efficiency are some of these problems. ...
To name a few, rural connectivity, satellite communication, and mobile edge computing are some concepts for which wireless backhauling acts as an enabler. ...
Finally, smart usage of offloading to MEC servers is required, because this decision means spending air resources to preserve computation and power of UE. ...
arXiv:2103.08234v2
fatcat:3fug6wsmtrg5bfxk2ga2f2al5i
« Previous
Showing results 1 — 15 out of 48 results