Orchestration in fog computing: A comprehensive survey

B Costa, J Bachiega Jr, LR De Carvalho… - ACM Computing …, 2022 - dl.acm.org
Fog computing is a paradigm that brings computational resources and services to the
network edge in the vicinity of user devices, lowering latency and connecting with cloud …

Incentive mechanisms in peer-to-peer networks—a systematic literature review

C Ihle, D Trautwein, M Schubotz, N Meuschke… - ACM Computing …, 2023 - dl.acm.org
Centralized networks inevitably exhibit single points of failure that malicious actors regularly
target. Decentralized networks are more resilient if numerous participants contribute to the …

DQN-based mobile edge computing for smart Internet of vehicle

L Zhang, W Zhou, J Xia, C Gao, F Zhu, C Fan… - EURASIP journal on …, 2022 - Springer
In this paper, we investigate a multiuser mobile edge computing (MEC)-aided smart Internet
of vehicle (IoV) network, where one edge server can help accomplish the intensive …

Edge computing technology enablers: A systematic lecture study

S Douch, MR Abid, K Zine-Dine, D Bouzidi… - IEEE …, 2022 - ieeexplore.ieee.org
With the increasing stringent QoS constraints (eg, latency, bandwidth, jitter) imposed by
novel applications (eg, e-Health, autonomous vehicles, smart cities, etc.), as well as the …

Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions

M Mahbub, RM Shubair - Journal of Network and Computer Applications, 2023 - Elsevier
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …

[HTML][HTML] Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities

D Rupanetti, N Kaabouch - Applied Sciences, 2024 - mdpi.com
The integration of edge computing with IoT (EC-IoT) systems provides significant
improvements in addressing security and privacy challenges in IoT networks. This paper …

A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach

A Emami, G Keshavarz Kalhori, S Mirzakhani… - The Journal of …, 2024 - Springer
Big data refers to sets of structured, semi-structured, and unstructured data collected by
organizations and may be difficult to process using traditional processing methods. Big data …

Time-constrained service handoff for mobile edge computing in 5g

N Sharghivand, L Mashayekhy, W Ma… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Many mobile device applications require low end-to-end latency to edge computing
infrastructure when offloading their computation tasks in order to achieve real-time …

Human-machine collaboration for smart decision making: current trends and future opportunities

B Geng, PK Varshney - 2022 IEEE 8th International …, 2022 - ieeexplore.ieee.org
Recently, modeling of decision making and control systems that include heterogeneous
smart sensing devices (machines) as well as human agents as participants is becoming an …

A low-cost communication security scheme of UAV based on multi-round reverse auction model

J Xue, H Zhang, Q Hu - Pervasive and Mobile Computing, 2022 - Elsevier
In recent years, the security of wireless communication has received more and more
attention. However, with the increasing requirements for security performance in the process …