L Li, Y Wei, L Zhang, X Wang - Journal of Cybersecurity, 2020 - cdn.techscience.cn
… In this work we simulate a resource allocation policy based on the network system which has
been formulated in Section 3. We use a heterogenous edge network with 20 users, M (M = 2…