Range Segmentation of Dynamic Offloading (RSDO) Algorithm by Correlation for Edge Computing |
Kang, Jieun
(Dept. of IT Engineering, Sookmyung Women's University)
Kim, Svetlana (Dept. of IT Engineering, Sookmyung Women's University) Kim, Jae-Ho (Dept. of Electronics and Information Engineering, Sejong University) Sung, Nak-Myoung (Korea Electronics Technology Institute (KETI)) Yoon, Yong-Ik (Dept. of IT Engineering, Sookmyung Women's University) |
1 | C. T. Yang, S. T. Chen, Y. W. Chan, and Y. C. Shen, "On construction of a cloud storage system with heterogeneous software-defined storage technologies," Human-centric Computing and Information Sciences, vol. 9, article no. 12, 2019. https://doi.org/10.1186/s13673-019-0173-x DOI |
2 | A. Colakovic and M. Hadzialic, "Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues," Computer Networks, vol. 144, pp. 17-39, 2018. DOI |
3 | T. Kawakami, "A structured overlay network scheme based on multiple different time intervals," Journal of Information Processing Systems, vol. 16, no. 6, pp. 1447-1458, 2020. DOI |
4 | L. Zhou and Y. Shan, "Privacy-preserving, energy-saving data aggregation scheme in wireless sensor networks," Journal of Information Processing Systems, vol. 16, no. 1, pp. 83-95, 2020. DOI |
5 | L. Tran, H. To, L. Fan, and C. Shahabi, "A real-time framework for task assignment in hyperlocal spatial crowdsourcing," ACM Transactions on Intelligent Systems and Technology (TIST), vol. 9, no. 3, article no. 37, 2018. https://doi.org/10.1145/3078853 DOI |
6 | B. Li, M. He, W. Wu, A. K. Sangaiah, and G. Jeon, "Computation offloading algorithm for arbitrarily divisible applications in mobile edge computing environments: an OCR case," Sustainability, vol. 10, no. 5, article no. 1611, 2018. https://doi.org/10.3390/su10051611 DOI |
7 | W. Lin, C. Liang, J. Z. Wang, and R. Buyya, "Bandwidth-aware divisible task scheduling for cloud computing," Software: Practice and Experience, vol. 44, no. 2, pp. 163-174, 2014. DOI |
8 | H. Kim and S. Lee, "Document summarization model based on general context in RNN," Journal of Information Processing Systems, vol. 15, no. 6, pp. 1378-1391, 2019. DOI |
9 | Y. Bengio, Learning Deep Architectures for AI. Hanover, MA: Now Publisher, 2009. |
10 | C. Zhang, P. Patras, and H. Haddadi, "Deep learning in mobile and wireless networking: a survey," IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2224-2287, 2019. DOI |
11 | J. Kang, S. Kim, J. Kim, N. Sung, and Y. Yoon, "Dynamic offloading model for distributed collaboration in edge computing: a use case on forest fires management," Applied Sciences, vol. 10, no. 7, article no. 2334, 2020. https://doi.org/10.3390/app10072334 DOI |
12 | W. Lin, C. Liang, J. Z. Wang, and R. Buyya, "Bandwidth-aware divisible task scheduling for cloud computing," Software: Practice and Experience, vol. 44, no. 2, pp. 163-174, 2014. DOI |
13 | X. A. Yan, W. Q. Shi, and H. Tian, "Cloud storage security deduplication scheme based on dynamic bloom filter," Journal of Information Processing Systems, vol. 15, no. 6, pp. 1265-1276, 2019. DOI |
14 | J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, "A survey on internet of things: architecture, enabling technologies, security and privacy, and applications," IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125-1142, 2017. DOI |
15 | J. Wang, X. Gu, W. Liu, A. K. Sangaiah, and H. J. Kim, "An empower Hamilton loop based data collection algorithm with mobile agent for WSNs," Human-centric Computing and Information Sciences, vol. 9, article no. 18, 2019. https://doi.org/10.1186/s13673-019-0179-4 DOI |
16 | H. He, L. H. Zheng, P. Li, L. Deng, L. Huang, and X. Chen, "An efficient attribute-based hierarchical data access control scheme in cloud computing," Human-centric Computing and Information Sciences, vol. 10, article no. 49, 2020. https://doi.org/10.1186/s13673-020-00255-5 DOI |
17 | M. J. J. Ghrabat, G. Ma, I. Y. Maolood, S. S. Alresheedi, and Z. A. Abduljabbar, "An effective image retrieval based on optimized genetic algorithm utilized a novel SVM-based convolutional neural network classifier," Human-centric Computing and Information Sciences, vol. 9, article no. 31, 2019. https://doi.org/10.1186/s13673-019-0191-8 DOI |
18 | Z. Lu, X. Sun, and T. La Porta, "Cooperative data offload in opportunistic networks: from mobile devices to infrastructure," IEEE/ACM Transactions on Networking, vol. 25, no. 6, pp. 3382-3395, 2017. DOI |
19 | W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, "PDA: privacy-preserving data aggregation in wireless sensor networks," in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM), Anchorage, AK, 2007, pp. 2045-2053. |