Author:
Wang Jing,Zhou Zhangbing,Li Yi
Publisher
Springer Nature Singapore
Reference30 articles.
1. Chen, J., Ran, X.: Deep learning with edge computing: a review. Proc. IEEE 107, 1655–1674 (2019). https://doi.org/10.1109/JPROC.2019.2921977
2. Angrishi, K.: Turning internet of things (IoT) into internet of vulnerabilities (IoV): IoT botnets (2017). http://arxiv.org/abs/1702.03681, https://doi.org/10.48550/arXiv.1702.03681
3. Pahl, C.: Containerization and the PaaS cloud. IEEE Cloud Comput. 2, 24–31 (2015). https://doi.org/10.1109/MCC.2015.51
4. Resource allocation for edge computing with multiple tenant configurations $$|$$ Proceedings of the 35th Annual ACM Symposium on Applied Computing. https://dl.acm.org/doi/abs/10.1145/3341105.3374026. Accessed 20 Feb 2023
5. Wang, S., Xu, J., Zhang, N., Liu, Y.: A survey on service migration in mobile edge computing. IEEE Access 6, 23511–23528 (2018). https://doi.org/10.1109/ACCESS.2018.2828102