J Yu, Y Li, X Liu, B Sun, Y Wu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
By employing powerful edge servers for data processing, mobile edge computing (MEC) has been recognized as a promising technology to support emerging computation-intensive …
X Wu, L Qi, J Gao, G Ji, X Xu - Neurocomputing, 2022 - Elsevier
Edge computing is an emerging computing paradigm, which offers a great opportunity to implement data mining-based services and applications for a large number of devices and …
M Li, X Zhou, T Qiu, Q Zhao, K Li - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In multi-access edge computing systems with energy harvesting (MEC-EH), the mobile devices are empowered with unstable energy harvested from renewable energy sources. To …
Y Deng, X Chen, G Zhu, Y Fang… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
Multi-access edge computing (MEC) is an emerging paradigm that pushes resources for sensing, communications, computing, storage, and intelligence to the premises closer to the …
K Xiong, S Leng, X Chen, C Huang… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Transportation system is facing a sharp disruption since the Connected Autonomous Vehicles (CAVs) can free people from driving and provide good driving experience with the …
X Cao, Y Li, X Xiong, J Wang - Sensors, 2022 - mdpi.com
The Satellite network is an important part of the global network. However, the complex architecture, changeable constellation topology, and frequent inter-satellite connection …
Inspired by the shared infrastructure of colocation data centers and the growth of Mobile Edge Computing (MEC), colocation MEC businesses have thrived to offer an economical …
L Qian, Y Wu, J Ouyang, Z Shi, B Lin… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article, we investigate the cellular assisted mobile edge computing (MEC) via non- orthogonal multiple access (NOMA), where a group of edge-computing users (EUs) exploit …
Need of security enhancement for 5G network has been increased in last decade. Data transmitted over network need to be secure from external attacks. Thus there is need to …