|
[1]“Cisco Annual Internet Report - Cisco Annual Internet Report (2018–2023) WhitePaper.” [Online]. Available: https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html [2]M. R. Palattella, M. Dohler, A. Grieco, G. Rizzo, J. Torsner, T. Engel, and L. Ladid,“Internet of Things in the 5G era: Enablers, architecture, and business models,”IEEEJournal on Selected Areas in Communications, vol. 34, no. 3, pp. 510–527, Mar. 2016,conference Name: IEEE Journal on Selected Areas in Communications. [3]D. Agrawal, S. B. Mane, A. Pacharne, and S. Tiwari, “IoT based augmented reality systemof human heart: An android application,” in2018 2nd International Conference on Trendsin Electronics and Informatics (ICOEI), May 2018, pp. 899–902. [4]Z. Lv, T. Yin, X. Zhang, H. Song, and G. Chen, “Virtual reality smart city based onwebvrgis,”IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1015–1024, 2016. [5]T. Soyata, R. Muraleedharan, C. Funai, M. Kwon, and W. Heinzelman, “Cloud-Vision: Real-time face recognition using a mobile-cloudlet-cloud acceleration architecture,” in2012 IEEESymposium on Computers and Communications (ISCC), Jul. 2012, pp. 000059–000066. [6]W. Trappe, R. Howard, and R. S. Moore, “Low-energy security: Limits and opportunitiesin the Internet of Things,”IEEE Security Privacy, vol. 13, no. 1, pp. 14–21, Jan. 2015.87 [7]R. Buyya, C. S. Yeo, and S. Venugopal, “Market-oriented cloud computing: Vision, hype,and reality for delivering IT services as computing utilities,” in2008 10th IEEE InternationalConference on High Performance Computing and Communications, 2008, pp. 5–13. [8]M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, “The case for vm-based cloudletsin mobile computing,”IEEE Pervasive Computing, vol. 8, no. 4, pp. 14–23, 2009. [9]C. You, K. Huang, and H. Chae, “Energy efficient mobile cloud computing powered bywireless energy transfer,”IEEE Journal on Selected Areas in Communications, vol. 34,no. 5, pp. 1757–1771, 2016. [10]L. Yang, J. Cao, H. Cheng, and Y. Ji, “Multi-user computation partitioning for latencysensitive mobile cloud applications,”IEEE Transactions on Computers, vol. 64, no. 8, pp.2253–2266, 2015. [11]Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya, “Heterogeneity in mobile cloud computing:Taxonomy and open challenges,”IEEE Communications Surveys and Tutorials, vol. 16,no. 1, pp. 369–392, 2014. [12]K. Kumar and Y. Lu, “Cloud computing for mobile users: Can offloading computation saveenergy?”Computer, vol. 43, no. 4, pp. 51–56, 2010. [13]M. Chiang and T. Zhang, “Fog and iot: An overview of research opportunities,”IEEEInternet of Things Journal, vol. 3, no. 6, pp. 854–864, 2016. [14]N. Abbas, Y. Zhang, A. Taherkordi, and T. Skeie, “Mobile edge computing: A survey,”IEEE Internet of Things Journal, vol. 5, no. 1, pp. 450–465, Feb. 2018. [15]Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey on mobile edge comput-ing: The communication perspective,”IEEE Communications Surveys Tutorials, vol. 19,no. 4, pp. 2322–2358, 2017.88 [16]P. Porambage, J. Okwuibe, M. Liyanage, M. Ylianttila, and T. Taleb, “Survey on multi-access edge computing for internet of things realization,”IEEE Communications SurveysTutorials, vol. 20, no. 4, pp. 2961–2991, 2018. [17]C. You, K. Huang, H. Chae, and B. Kim, “Energy-efficient resource allocation for mobile-edge computation offloading,”IEEE Transactions on Wireless Communications, vol. 16,no. 3, pp. 1397–1411, 2017. [18]H. Guo, J. Liu, J. Zhang, W. Sun, and N. Kato, “Mobile-edge computation offloading forultradense iot networks,”IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4977–4988,Dec. 2018. [19]Z. Ning, P. Dong, X. Kong, and F. Xia, “A cooperative partial computation offloadingscheme for mobile edge computing enabled Internet of Things,”IEEE Internet of ThingsJournal, vol. 6, no. 3, pp. 4804–4814, Jun. 2019. [20]T. Q. Dinh, J. Tang, Q. D. La, and T. Q. S. Quek, “Offloading in mobile edge computing:Task allocation and computational frequency scaling,”IEEE Transactions on Communica-tions, vol. 65, no. 8, pp. 3571–3584, Aug. 2017. [21]T. X. Tran and D. Pompili, “Joint task offloading and resource allocation for multi-servermobile-edge computing networks,”IEEE Transactions on Vehicular Technology, vol. 68,no. 1, pp. 856–868, Jan. 2019. [22]V. Francois-Lavet, P. Henderson, R. Islam, M. G. Bellemare, and J. Pineau, “An introduc-tion to deep reinforcement learning,”Foundations and Trends in Machine Learning, vol. 11,no. 3-4, pp. 219–354, 2018.89 [23]K. Arulkumaran, M. P. Deisenroth, M. Brundage, and A. A. Bharath, “Deep ReinforcementLearning: A Brief Survey,”IEEE Signal Processing Magazine, vol. 34, no. 6, pp. 26–38,Nov. 2017. [Online]. Available: http://ieeexplore.ieee.org/document/8103164/ [24]M. Min, L. Xiao, Y. Chen, P. Cheng, D. Wu, and W. Zhuang, “Learning-based computa-tion offloading for IoT devices with energy harvesting,”IEEE Transactions on VehicularTechnology, vol. 68, no. 2, pp. 1930–1941, Feb. 2019. [25]X. Chen, H. Zhang, C. Wu, S. Mao, Y. Ji, and M. Bennis, “Optimized computation offloadingperformance in virtual edge computing systems via deep reinforcement learning,”IEEEInternet of Things Journal, vol. 6, no. 3, pp. 4005–4018, Jun. 2019. [26]X. Xiong, K. Zheng, L. Lei, and L. Hou, “Resource allocation based on deep reinforcementlearning in iot edge computing,”IEEE Journal on Selected Areas in Communications, vol. 38,no. 6, pp. 1133–1146, 2020. [27]Y. Liu, H. Yu, S. Xie, and Y. Zhang, “Deep reinforcement learning for offloading and re-source allocation in vehicle edge computing and networks,”IEEE Transactions on VehicularTechnology, vol. 68, no. 11, pp. 11158–11168, 2019. [28]H. Guo and J. Liu, “Collaborative computation offloading for multiaccess edge computingover fiber-wireless networks,”IEEE Transactions on Vehicular Technology, vol. 67, no. 5,pp. 4514–4526, May 2018. [29]T. Q. Dinh, Q. D. La, T. Q. S. Quek, and H. Shin, “Learning for computation offloadingin mobile edge computing,”IEEE Transactions on Communications, vol. 66, no. 12, pp.6353–6367, Dec. 2018. [30]S. Boyd and M. Grant, “CVX: Matlab software for disciplined convex programming | CVXResearch, Inc.” [Online]. Available: http://cvxr.com/cvx/90 [31]H. Fawzi, J. Saunderson, and P. A. Parrilo, “Semidefinite approximations of the matrixlogarithm,”Foundations of Computational Mathematics, vol. 19, no. 2, p. 259–296, Mar2018. [32]S. Herbert and D. Marculescu, “Variation-aware dynamic voltage/frequency scaling,” in2009 IEEE 15th International Symposium on High Performance Computer Architecture,Feb. 2009, pp. 301–312. [33]S. Bi and Y. J. Zhang, “Computation rate maximization for wireless powered mobile-edgecomputing with binary computation offloading,”IEEE Transactions on Wireless Commu-nications, vol. 17, no. 6, pp. 4177–4190, Jun. 2018. [34]J. Liu and Q. Zhang, “Offloading schemes in mobile edge computing for ultra-reliable lowlatency communications,”IEEE Access, vol. 6, pp. 12825–12837, 2018. [35]T. Q. Dinh, Q. D. La, T. Q. S. Quek, and H. Shin, “Learning for computation offloadingin mobile edge computing,”IEEE Transactions on Communications, vol. 66, no. 12, pp.6353–6367, Dec. 2018. [36]J. Li, H. Gao, T. Lv, and Y. Lu, “Deep reinforcement learning based computation offloadingand resource allocation for MEC,” in2018 IEEE Wireless Communications and NetworkingConference (WCNC), Apr. 2018, pp. 1–6. [37]T. Burd and R. W. Brodersen, “Processor design for portable systems,”Journal of VLSISignal Processing, vol. 13, pp. 203–222, Aug. 1996. [38]A. P. Chandrakasan, S. Sheng, and R. W. Brodersen, “Low power CMOS digital design,”IEEE Journal of Solid-State Circuits, vol. 27, pp. 473–484, 1995.91 [39]Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey on mobile edge comput-ing: The communication perspective,”IEEE Communications Surveys Tutorials, vol. 19,no. 4, pp. 2322–2358, 2017. [40]Q. D. Lã, Y. H. Chew, and B.-H. Soong,Potential Game Theory: Applications in RadioResource Allocation. Springer International Publishing, May 2016. [41]Z. Zhang, F. R. Yu, F. Fu, Q. Yan, and Z. Wang, “Joint offloading and resource alloca-tion in mobile edge computing systems: An actor-critic approach,” in2018 IEEE GlobalCommunications Conference (GLOBECOM), 2018, pp. 1–6. [42]K. Shen and W. Yu, “Fractional programming for communication systems–Part I: Powercontrol and beamforming,”IEEE Transactions on Signal Processing, vol. 66, no. 10, pp.2616–2630, May 2018. [43]F. Palacios-Gomez, L. Lasdon, and M. Engquist, “Nonlinear Optimization by SuccessiveLinear Programming,”Management Science, vol. 28, no. 10, pp. 1106–1120, Oct. 1982. [44]W. Li, T. Chang, C. Lin, and C. Chi, “Coordinated beamforming for multiuser MISO in-terference channel under rate outage constraints,”IEEE Transactions on Signal Processing,vol. 61, no. 5, pp. 1087–1103, May 2013. |