|
[1]
|
Yang, X., Chen, Z., Li, K., Sun, Y., Liu, N., Xie, W. and Zhao, Y. (2018) Communication-Constrained Mobile Edge Computing Systems for Wireless Virtual Reality: Scheduling and Tradeoff. IEEE Access, 6, 16665-16677. [Google Scholar] [CrossRef]
|
|
[2]
|
Shi, W., Cao, J., Zhang, Q., Li, Y. and Xu, L. (2016) Edge Computing: Vision and Challenges. IEEE Internet of Things Journal, 3, 637-646. [Google Scholar] [CrossRef]
|
|
[3]
|
Mao, Y., You, C., Zhang, J., Huang, K. and Letaief, K.B. (2017) A Survey on Mobile Edge Computing: The Communication Perspective. IEEE Communications Surveys & Tutorials, 19, 2322-2358. [Google Scholar] [CrossRef]
|
|
[4]
|
Chen, M. and Hao, Y. (2018) Task Offloading for Mobile Edge Computing in Software Defined Ultra-Dense Network. IEEE Journal on Selected Areas in Communications, 36, 587-597. [Google Scholar] [CrossRef]
|
|
[5]
|
Mozaffari, M., Saad, W., Bennis, M., Nam, Y. and Debbah, M. (2019) A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems. IEEE Communications Surveys & Tutorials, 21, 2334-2360. [Google Scholar] [CrossRef]
|
|
[6]
|
Li, B., Fei, Z. and Zhang, Y. (2019) UAV Communications for 5G and Beyond: Recent Advances and Future Trends. IEEE Internet of Things Journal, 6, 2241-2263. [Google Scholar] [CrossRef]
|
|
[7]
|
Chetlur Ravi, V.V. and Dhillon, H.S. (2016) Downlink Cover-age Probability in a Finite Network of Unmanned Aerial Vehicle (UAV) Base Stations. 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications, Edinburgh, 3-6 July 2016, 1-5. [Google Scholar] [CrossRef]
|
|
[8]
|
Cui, M., Zhang, G., Wu, Q. and Ng, D.W.K. (2018) Robust Trajectory and Transmit Power Design for Secure UAV Communications. IEEE Transactions on Vehicular Technology, 67, 9042-9046. [Google Scholar] [CrossRef]
|
|
[9]
|
Islambouli, R. and Sharafeddine, S. (2019) Optimized 3D De-ployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks. IEEE Access, 7, 172860-172870. [Google Scholar] [CrossRef]
|
|
[10]
|
Hu, X., Wong, K., Yang, K. and Zheng, Z. (2019) UAV-Assisted Relaying and Edge Computing: Scheduling and Trajectory Optimization. IEEE Transactions on Wireless Communications, 18, 4738-4752. [Google Scholar] [CrossRef]
|
|
[11]
|
Tang, Q., Chang, L., Yang, K., Wang, K.Z., Wang, J. and Shar-ma, P.K. (2020) Task Number Maximization of Floading Strategy Seamlessly Adapted to UAV Scenario. Computer Communications, 151, 19-30. [Google Scholar] [CrossRef]
|
|
[12]
|
Zhou, F., Wu, Y., Hu, R.Q. and Qian, Y. (2018) Computation Rate Maximization in UAV-Enabled Wireless-Powered Mobile-Edge Computing Systems. IEEE Journal on Selected Areas in Communications, 36, 1927-1941. [Google Scholar] [CrossRef]
|
|
[13]
|
Lakiotakis, E., Sermpezis, P. and Dimitropou-los, X. (2019) Joint Optimization of UAV Placement and Caching under Battery Constraints in UAV-Aided Small-Cell Networks. ACM SIGCOMM2019 Workshop on Mobile AirGround Edge Computing, Systems, Net-Works, and Applications, Bei-jing, August 2019, 8-14. [Google Scholar] [CrossRef]
|
|
[14]
|
Khuller, S., Moss, A. and Naor, J.S. (1999) The Budgeted Maxi-mum Coverage Problem. Information Processing Letters, 70, 39-45. [Google Scholar] [CrossRef]
|
|
[15]
|
Krause, A. and Golovin, D. (2012) Submodular Function Maximization. In: Bordeaux, L., Hamadi, Y. and Kohli, P., Eds., Tractability: Practical Approaches to Hard Problems, Cambridge University Press, Cambridge, 71-104. [Google Scholar] [CrossRef]
|
|
[16]
|
Caro, D.A. and Iovino, V. (2011) jPBC: Java Pairing Based Cryptography. 2011 IEEE Symposium on Computers and Communications, Kerkyra, 28 June-1 July 2011, 850-855. [Google Scholar] [CrossRef]
|