Journal of Shandong University(Engineering Science) ›› 2022, Vol. 52 ›› Issue (4): 45-53.doi: 10.6040/j.issn.1672-3961.0.2021.537

Previous Articles    

Dynamic environment oriented D2D collaborative offloading for workflow applications in mobile edge computing

QIAN Cheng1,2, ZHAO Gansen1,2, LUO Haoyu1,2   

  1. 1. School of Computer Science, South China Normal University, Guangzhou 510631, Guangdong, China;
    2. Key Lab on Cloud Security and Assessment Technology of Guangzhou, Guangzhou 510631, Guangdong, China
  • Published:2022-08-24

CLC Number: 

  • TP399
[1] LI X J, CHEN T X, YUAN D, et al. Anovel graph-based computation offloading strategy for workflow applications in mobile edge computing[J/OL]. arXiv Preprint arXiv,[2022-07-20]. https://arxiv.org/abs/2102.12236.
[2] HOSSAIN M D, SULTANA T, HOSSAIN M A, et al. Fuzzy decision-based efficient task offloading management scheme in multi-tier MEC-enabled networks[J]. Sensors, 2021, 21(4): 1484.
[3] PU L J, CHEN X, XU J D, et al. D2D fogging: an energy-efficient and incentive-aware task offloading framework via network-assisted D2D collaboration[J]. IEEE Journal on Selected Areas in Communications, 2016, 34(12): 3887-3901.
[4] PENG Q L, HE Q, XIA Y N, et al. Collaborative workflow scheduling over MANET, a user position prediction-based approach[C] //International Conference on Collaborative Computing: Networking, Applications and Worksharing. Shanghai, China: Springer, 2018: 33-52.
[5] BLYTHE J, JAIN S, DEELMAN E, et al. Tasks cheduling strategies for workflow-based applications in grids[C] // IEEE International Symposium on Cluster Computing and the Grid, 2005. Cardiff, UK: IEEE, 2005: 759-767.
[6] HU Y C, PATEL M, SABELLA D, et al. Mobile edge computing: a key technology towards 5G[J]. ETSI White Paper, 2015, 11(11): 1-16.
[7] SHADI M, ABRISHAMI S, MOHAJERZADEH A H, et al. Ready-time partitioning algorithm for computation offloading of workflow applications in mobile cloud computing[J]. The Journal of Supercomputing, 2021, 77(6): 6408-6434.
[8] BAEK H, KO H, PACK S. Privacy-preserving and trustworthy device-to-device(D2D)offloading scheme[J]. IEEE Access, 2020, 8: 191551-191560.
[9] LI Z J, HU H Y, HU H, et al. Security and energy-aware collaborative task offloading in D2D communication[J]. Future Generation Computer Systems, 2021, 118: 358-373.
[10] ZHANG X M. Enhancing mobile cloud with social-aware device-to-device offloading[J]. Computer Communications, 2021, 168: 1-11.
[11] WANG X J, NING Z L, GUO S. Multi-agent imitation learning for pervasive edge computing: a decentralized computation of floading algorithm[J]. IEEE Trans-actions on Parallel and Distributed Systems, 2020, 32(2): 411-425.
[12] PENG Q L, JIANG H C, CHEN M J, et al. Reliability-aware and deadline-constrained workflow scheduling in mobile edge computing[C] //2019 IEEE 16Th International Conference on Networking, Sensing and Control(Icnsc). Banff, Canada: IEEE, 2019: 236-241.
[13] MOGENSEN P, NA W, KOVÁCS I Z, et al. LTE capacity compared to the Shannon bound[C] //2007 IEEE 65th Vehicular Technology Conference-Vtc2007-Spring. Dublin, Ireland: IEEE, 2007: 1234-1238.
[14] ANAMURO C V, VARSIER N, SCHWOERER J, et al. Distance-aware relay selection in an energy-efficient discovery protocol for 5G D2D communication[J]. IEEE Transactions on Wireless Communications, 2021, 20(7): 4379-4391.
[15] CAMP T, BOLENG J, DAVIES V. Asurvey of mobility models for ad hoc network research[J]. Wireless Communications and Mobile Computing, 2002, 2(5): 483-502.
[16] BHARATHI S, CHERVENAK A, DEELMAN E, et al.Characterization of scientific workflows[C] //2008 Third Workshop on Workflows in Support of Large-Scale Science. Austin, USA: IEEE, 2008: 1-10.
[17] TOPCUOGLU H, HARIRI S, WU M Y. Performance-effective and low-complexity task scheduling for heterogeneous computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2002, 13(3): 260-274.
[18] GUOFEI9987. Scikit-opt[CP/OL]. https://github.com/guofei9987/scikit-opt, 2021-7-13.
[1] Pengcheng ZHAO,Fuquan ZHANG,Xubing YANG,Yin WU. Optimal deployment strategy of forest fire monitoring nodes based on visualization [J]. Journal of Shandong University(Engineering Science), 2019, 49(1): 30-35, 40.
[2] Zhenbing LIU,Xusheng FANG,Huihua YANG,Rushi LAN. The diagnosis of Alzheimer's disease classification based on multi-scale residual neutral network [J]. Journal of Shandong University(Engineering Science), 2018, 48(6): 1-7, 18.
[3] CHEN Jiajie, WANG Jinfeng. Method for solving Choquet integral model based on ant colony algorithm [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 81-87.
[4] DAI Hongwei, YANG Yu, ZHONG Zhaoman, LI Cunhua. Improved quantum crossover immune clonal algorithm and its application [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2015, 45(2): 17-21.
[5] GUO Hui-ling, WANG Shi-tong*, YAN Xiao-bo. A novel method for face recognition based on generalized rotation invariant kernel [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 71-79.
[6] ZHOU Xiao-lin,ZENG Guang-zhou . P2P-based workflow management system [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(5): 89-94 .
[7] HUANG Caiyun, CHEN Dewu, HE Jifu, HU Yi, WANG Nan, CHEN Pei. Detection of upper limb musculoskeletal abnormality based on improved dual path network [J]. Journal of Shandong University(Engineering Science), 2022, 52(3): 25-33.
[8] WU Wan-qing, ZHOU Guo-long, WANG Qiao, ZHAO Yong-xin. Research of balanced Boolean functions with high nonlinearity based on GSA [J]. Journal of Shandong University(Engineering Science), 2022, 57(5): 74-84.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!