Soft Actor-Critic-Based Service Migration in Multiuser MEC Systems DOI
Xinyu Zhang, Shuang Ren

Published: Dec. 22, 2023

Multi-access Edge Computing (MEC) is an emerging computing paradigm that provides abundant resource support for the next generation of Internet Things (IoT). When users move between edge servers with limited coverage, it necessary to determine service migration strategies ensure quality. However, traditional research on often oversimplifies multi-user scenario, focusing only individual users. This limitation hinders these methods from achieving optimality in real MEC environments. To address this issue, paper models scenario and focuses exploring impact user latency system energy consumption. We propose a method based discrete version Soft Actor-Critic algorithm (SACDM). Through simulation experiments evaluate performance our proposed solution, results demonstrate outperforms Deep Q-learning (DQNM) by reducing approximately 11.12%. Additionally, also achieves reduction consumption 6.66% compared DQNM.

Language: Английский

Resource allocation in Fog–Cloud Environments: State of the art DOI

Mohammad Zolghadri,

Parvaneh Asghari, Seyed Ebrahim Dashti

et al.

Journal of Network and Computer Applications, Journal Year: 2024, Volume and Issue: 227, P. 103891 - 103891

Published: April 28, 2024

Language: Английский

Citations

10

Empirical Evaluation of QUIC-Based Software-Defined Service Migration in Multi-access Edge Computing Over 5G Networks DOI Creative Commons
Tran-Tuan Chu, Mohamed Aymen Labiod,

Brice Augustin

et al.

Journal of Network and Systems Management, Journal Year: 2025, Volume and Issue: 33(2)

Published: Feb. 3, 2025

Language: Английский

Citations

0

Resiliency focused proactive lifecycle management for stateful microservices in multi-cluster containerized environments DOI

Meliani Abd Elghani,

Monizaihasra Mohamed,

Adlen Ksentini

et al.

Computer Communications, Journal Year: 2025, Volume and Issue: unknown, P. 108111 - 108111

Published: March 1, 2025

Language: Английский

Citations

0

Containerized service placement and resource allocation at edge: A Hybrid Reinforcement Learning approach DOI
Chao Zeng, Xingwei Wang,

Rongfei Zeng

et al.

Computer Networks, Journal Year: 2025, Volume and Issue: unknown, P. 111343 - 111343

Published: May 1, 2025

Language: Английский

Citations

0

Mobility-aware SFC migration in dynamic 5G-Edge networks DOI
Juan Lucas Vieira, Evandro L. C. Macedo, Anselmo Luiz Éden Battisti

et al.

Computer Networks, Journal Year: 2024, Volume and Issue: 250, P. 110571 - 110571

Published: June 6, 2024

Language: Английский

Citations

2

Distributed Intelligence for Dynamic Task Migration in the 6G User Plane using Deep Reinforcement Learning DOI
Sayantini Majumdar, Susanna Schwarzmann, Riccardo Trivisonno

et al.

Published: May 6, 2024

Language: Английский

Citations

1

An effective partition-based framework for virtual machine migration in cloud services DOI

L.X. Yun X. Zhang Z.H. Luo,

S. Wei, Hua Tang

et al.

Cluster Computing, Journal Year: 2024, Volume and Issue: 27(9), P. 12899 - 12917

Published: June 19, 2024

Language: Английский

Citations

1

PEEV: Parse Encrypt Execute Verify—A Verifiable FHE Framework DOI Creative Commons
Omar Ahmed, Charles Gouert, Nektarios Georgios Tsoutsos

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 94673 - 94689

Published: Jan. 1, 2024

Cloud computing has been a prominent technology that allows users to store their data and outsource intensive computations. However, of cloud services are also concerned about protecting the confidentiality against attacks can leak sensitive information. Although traditional cryptography be used protect static or being transmitted over network, it does not support processing encrypted data. Homomorphic encryption allow directly on data, but dishonest provider alter computations performed, thus violating integrity results. To overcome these issues, we propose PEEV (Parse, Encrypt, Execute, Verify), framework developer with no background in write programs operating remote server, verify correctness The proposed relies homomorphic techniques as well zero-knowledge proofs achieve verifiable privacy-preserving computation. It supports practical deployments low performance overheads developers express high-level language, abstracting away complexities verification.

Language: Английский

Citations

0

Verification of Deep Neural Networks with KGZ-Based zkSNARK DOI
Subhasis Thakur, John G. Breslin

Lecture notes in networks and systems, Journal Year: 2024, Volume and Issue: unknown, P. 79 - 95

Published: Jan. 1, 2024

Language: Английский

Citations

0

Efficient Deep Neural Network Verification with QAP-Based ZkSNARK DOI
Subhasis Thakur, John G. Breslin

Communications in computer and information science, Journal Year: 2024, Volume and Issue: unknown, P. 178 - 191

Published: Jan. 1, 2024

Language: Английский

Citations

0