Buscar
Mostrando ítems 1-10 de 215
Sharpening the edge: Towards improved edge computing environment for mobile and IoT applications
(Elsevier Science, 2020-06)
Offloading personal security applications to the Network Edge: a mobile user case scenario
(Institute of Electrical and Electronics Engineers, 2016)
Cloud Computing At The Edges
(SPRINGER-VERLAG BERLINBERLIN, 2016)
Augmenting computing capabilities at the edge by jointly exploiting mobile devices: A survey
(Elsevier Science, 2018-11)
The ever-growing adoption of smart mobile devices is a worldwide phenomenon that positions smartphones and tablets as primary devices, i.e., that people mostly use. In addition to this, the computing capabilities of such ...
A performance comparison of heuristics for scheduling jobs in hybrid mobile topologies
(IEEE, 2019)
Hardware improvements of mobile devices have allowed them to be considered as first-class resources at the edge, which has led to the need to propose new techniques and scheduling heuristics to make efficient usage of these ...
A unified model for the mobile-edge-cloud continuum
(Association for Computing Machinery, 2019-04)
Technologies such as mobile, edge, and cloud computing have the potential to form a computing continuum for new, disruptive applications. At runtime, applications can choose to execute parts of their logic on different ...
Offloading personal security applications to the Network Edge: A mobile user case scenario
(INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS INC., 2016-09-05)
This paper discusses some challenges that user mobility imposes over the user-centric protection model against security threats. This model is based on the idea of offloading the security applications from the end user ...
Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT
The Mobile networks deploy and offers a multiaspective approach for various resource allocation paradigms and the service based options in the computing segments with its implication in the Industrial Internet of Things ...
Offloading personal security applications to the Network Edge: A mobile user case scenario
(INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS INC., 2018)