Showing 221 - 240 results of 3,870 for search 'edge process', query time: 0.13s Refine Results
  1. 221

    Collaborative Optimization Strategy for Dependent Task Offloading in Vehicular Edge Computing by Xiting Peng, Yandi Zhang, Xiaoyu Zhang, Chaofeng Zhang, Wei Yang

    Published 2024-12-01
    “…This paper proposes a task-offloading scheme based on deep reinforcement learning to optimize the strategy between vehicles and edge computing resources. The task-offloading problem is modeled as a Markov Decision Process, and an improved twin-delayed deep deterministic policy gradient algorithm, LT-TD3, is introduced to enhance the decision-making process. …”
    Get full text
    Article
  2. 222

    Backbone extraction through statistical edge filtering: A comparative study. by Ali Yassin, Hocine Cherifi, Hamida Seba, Olivier Togni

    Published 2025-01-01
    “…Furthermore, the results suggest a limited influence of the edge betweenness on the filtering process. The backbones global properties analysis (edge fraction, node fraction, weight fraction, weight entropy, reachability, number of components, and transitivity) identifies three typical behavior types for each property. …”
    Get full text
    Article
  3. 223

    A Matching Game for LLM Layer Deployment in Heterogeneous Edge Networks by Benedetta Picano, Dinh Thai Hoang, Diep N. Nguyen

    Published 2025-01-01
    “…This mutual selection process minimizes inference latency in the learning process and models the bubble time as game externalities, assuming a sequential pipeline execution. …”
    Get full text
    Article
  4. 224

    Iterative Assessment of Edge Criticality: Efficiency Enhancement or Hidden Insufficiency Detection by Vasily Lubashevskiy, Hamza Ejjbiri, Ihor Lubashevsky

    Published 2025-01-01
    “…The second is the Optimization-based approach, which treats network decomposition as an integral process and optimizes the edge sequence for network decomposition using genetic-like algorithms. …”
    Get full text
    Article
  5. 225

    Mechanochemical control of graphene etching along zigzag and armchair edge directions by Yilong Jiang, Chuan Tang, Chao Chen, Yangqin Liu, Yang Wang, Seong H. Kim, Junhui Sun, Linmao Qian, Lei Chen

    Published 2025-04-01
    “…To fully realize its potential, it is critical to develop a precision etching process producing graphene edges along desired directions. …”
    Get full text
    Article
  6. 226

    The Heat Exchange in the Edge Area – the Problem of Hot Mix Asphalt Compaction by Paweł Mieczkowski

    Published 2015-09-01
    “…This facilitates the correct planning of the process of compaction, and by the same obtaining the required density of mix.…”
    Get full text
    Article
  7. 227

    The Cutting Edge of Comics: Destructive Technologies in Morrison and Quitely’s We3 by Isabelle Licari-Guillaume

    Published 2020-05-01
    “…This exploration of hybridity develops within a visual narrative where the low-tech process of paper and pencil drawing is subsequently enhanced through computer treatment, foregrounding its high-tech, digital dimension. …”
    Get full text
    Article
  8. 228

    Task distribution offloading algorithm of vehicle edge network based on DQN by Haitao ZHAO, Tangwei ZHANG, Yue CHEN, Houlin ZHAO, Hongbo ZHU

    Published 2020-10-01
    “…In order to achieve the best balance between latency,computational rate and energy consumption,for a edge access network of IoV,a distribution offloading algorithm based on deep Q network (DQN) was considered.Firstly,these tasks of different vehicles were prioritized according to the analytic hierarchy process (AHP),so as to give different weights to the task processing rate to establish a relationship model.Secondly,by introducing edge computing based on DQN,the task offloading model was established by making weighted sum of task processing rate as optimization goal,which realized the long-term utility of strategies for offloading decisions.The performance evaluation results show that,compared with the Q-learning algorithm,the average task processing delay of the proposed method can effectively improve the task offload efficiency.…”
    Get full text
    Article
  9. 229

    Leveraging edge learning and game theory for intrusion detection in Internet of things by Haoran LIANG, Jun WU, Chengcheng ZHAO, Jianhua LI

    Published 2021-06-01
    “…With the commercialization of 5G and the development of 6G, more and more Internet of things (IoT) devices are linked to the novel cyber-physical system (CPS) to support intelligent decision making.However, the highly decentralized and heterogeneous IoT devices face potential threats that may mislead the CPS.Traditional intrusion detection solutions cannot protect the privacy of IoT devices, and they have to deal with the single point of failure, which prevents these solutions from being deploying in IoT scenarios.The edge learning and game theory based intrusion detection for IoT was proposed.Firstly, an edge learning based intrusion detection framework was proposed to detect potential threats in IoT.Moreover, a multi-leader multi-follower game was employed to motivate trusted parameter servers and edge devices to participate in the edge learning process.Experiments and evaluations show the security and effectiveness of the proposed intrusion detection framework.…”
    Get full text
    Article
  10. 230

    Edge computing privacy protection method based on blockchain and federated learning by Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU

    Published 2021-11-01
    “…Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.…”
    Get full text
    Article
  11. 231
  12. 232

    Edge-activated graphene nanopores for thermally robust hydrogen membrane separations by Chi Cheng, Lohyun Kim, Aaron H. Persad, Chun Man Chow, Rohit Karnik

    Published 2025-07-01
    “…Combined experiment and modelling trace this behavior to graphene nanopore edge functional groups, whose thermal fluctuations modulate effective pore size. …”
    Get full text
    Article
  13. 233

    Dynamic computing offloading strategy in LEO constellation edge computing network by GAO Yufang, JI Zhi, ZHAO Kanglian, LI Wenfeng, HU Peicong

    Published 2024-07-01
    “…To address this problem, a multi-user computing offloading strategy based on stochastic game was proposed under the system model of dynamic environment low earth orbit constellation edge computing network. On the premise of considering the selfishness of users, the stochastic characteristics of the satellite-ground channel and the dynamic nature of ground user access, from the perspective of game theory, the offloading decision-making process of ground users in the dynamic environment was formulated as a stochastic game. …”
    Get full text
    Article
  14. 234

    Provisioning of Live Container Migration in Edge/Cloud Environments: Techniques and Challenges by Radhwan Al-Bayram, Rawaa Qasha

    Published 2025-06-01
    “…In IoT applications and edge/cloud deployment, the live container migration can substantially reduce computing system overheads by minimizing the migration time and transmitting minimum memory pages from the source host without interrupting the service process. …”
    Get full text
    Article
  15. 235

    Distributed Optimization for Mobile Robots under Mobile Edge Computing Environment by Hui Luo, Quan Yin

    Published 2021-01-01
    “…In this respect, mobile edge computing (MEC) technology and millimeter wave (mmW) technology can provide powerful support. …”
    Get full text
    Article
  16. 236
  17. 237
  18. 238
  19. 239

    Resource Allocation for Edge-enhanced Distributed Power Wireless Sensor Network by Gang WU, Jinhui ZHOU, Hui LI

    Published 2023-08-01
    “…Then, the total resource processing capacity of the central unit/distribution unit is determined by controlling the waiting latency in the load transfer process under the common constraints of the remaining resources of the RF remote unit, the load queuing latency, and the remaining resources of the central unit/distribution unit. …”
    Get full text
    Article
  20. 240

    A Panoramic Review on Cutting-Edge Methods for Video Anomaly Localization by Rashmiranjan Nayak, Sambit Kumar Mishra, Asish Kumar Dalai, Umesh Chandra Pati, Santos Kumar Das

    Published 2024-01-01
    “…Video anomaly detection and localization is the process of spatiotemporally localizing the anomalous video segment corresponding to the abnormal event or activities. …”
    Get full text
    Article