4.1 Article

A survey on decision making for task migration in mobile cloud environments

期刊

PERSONAL AND UBIQUITOUS COMPUTING
卷 20, 期 3, 页码 295-309

出版社

SPRINGER LONDON LTD
DOI: 10.1007/s00779-016-0915-y

关键词

Cloud computing; Task migration; Decision making; Mobile cloud; Context awareness

资金

  1. International S&T Cooperation Program of China (ISTCP) [2013DFA10980]

向作者/读者索取更多资源

The key idea of MCC is using powerful back-end computing nodes to enhance capabilities of small mobile devices and provide better user experiences. An effective and widely used approach to realize this is task migrations. Decision making is an important aspect of migrations which affects the feasibility and effectiveness of task migrations. There have been a number of research efforts to MCC which help make decisions for task migrations. In this paper, we present a comprehensive survey on decision making for task migrations in MCC, including decision factors and algorithms. We observe that there are still some challenges such as comprehensive context awareness, unified migration standards, large-scale experiments, more involvement of latest achievements from artificial intelligence, and flexible decision-making mechanisms. The paper highlights these issues and challenges to attract more efforts to work on MCC.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.1
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Edge data based trailer inception probabilistic matrix factorization for context-aware movie recommendation

Honglong Chen, Zhe Li, Zhu Wang, Zhichen Ni, Junjian Li, Ge Xu, Abdul Aziz, Feng Xia

Summary: The rapid growth of edge data generated by mobile devices has led to information overload, which can be alleviated by recommender systems. The Ti-PMF model combines multiple models to improve rating prediction accuracy.

WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Deep Graph Learning for Anomalous Citation Detection

Jiaying Liu, Feng Xia, Xu Feng, Jing Ren, Huan Liu

Summary: Anomaly detection in citation networks is an important research area that has received little attention. The proposed GLAD model combines text semantic mining and graph neural networks to effectively identify anomalies in citation networks. Experimental results demonstrate the effectiveness of GLAD in the task of anomalous citation detection.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2022)

Article Computer Science, Cybernetics

Exploring Public Sentiment During COVID-19: A Cross Country Analysis

Shuo Yu, Sihan He, Zhen Cai, Ivan Lee, Mehdi Naseriparsa, Feng Xia

Summary: This study investigates the differences in reactions to the COVID-19 pandemic across various countries using social media posts on Twitter and Weibo. The findings highlight noticeable variations in public reactions to certain policies among different countries, emphasizing the significant impact of sentiment analysis on policy-making.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Engineering, Multidisciplinary

CHIEF: Clustering With Higher-Order Motifs in Big Networks

Feng Xia, Shuo Yu, Chengfei Liu, Jianxin Li, Ivan Lee

Summary: This paper proposes a solution called CHIEF for efficient motif clustering in large networks, and validates the significance of higher-order motifs.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Editorial Material Automation & Control Systems

Guest Editorial: Special Section on Distributed Intelligence Over Internet of Things

H. O. N. G. L. O. N. G. CHEN, J. O. E. L. RODRIGUES, F. E. N. G. XIA, S. A. J. A. L. DAS

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

MIRROR: Mining Implicit Relationships via Structure-Enhanced Graph Convolutional Networks

Jiaying Liu, Feng Xia, Jing Ren, Bo Xu, Guansong Pang, Lianhua Chi

Summary: The explosion of data in the information society drives the need for more effective ways to extract meaningful information. Extracting semantic and relational information has become an important mining technique in practical applications. Current research on relation mining has mainly focused on explicit connections and ignored latent information, such as latent entity relations. This article proposes a novel research topic of identifying implicit relationships across heterogeneous networks. A graph convolutional network (GCN) model called MIRROR is introduced to infer implicit ties by incorporating attributes from heterogeneous neighbors and utilizing network structure. Empirical evaluations show that MIRROR achieves state-of-the-art performance in target relations mining, and the underlying information revealed contributes to enriching existing knowledge and gaining novel domain insights.

ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA (2023)

Article Computer Science, Information Systems

TAP: Traffic Accident Profiling via Multi-Task Spatio-Temporal Graph Representation Learning

Zhi Liu, Yang Chen, Feng Xia, Jixin Bian, Bing Zhu, Guojiang Shen, Xiangjie Kong

Summary: Predicting traffic accidents can help traffic management departments respond promptly to sudden situations, improve driver vigilance, and reduce accident-related losses. However, current methods for traffic accident prediction do not consider the dynamic spatio-temporal correlation of traffic data, resulting in unsatisfactory accuracy. To address this, we propose a multi-task learning framework (TAP) based on ST-VGAE for traffic accident profiling. Experimental results on real datasets show that TAP outperforms other state-of-the-art methods.

ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA (2023)

Article Computer Science, Information Systems

Lost at starting line: Predicting maladaptation of university freshmen based on educational big data

Teng Guo, Xiaomei Bai, Shihao Zhen, Shagufta Abid, Feng Xia

Summary: Helping freshmen adapt to university life is a long-term goal for academic institutions. This article proposes a prediction framework (MASTER) to tackle the issue of maladaptation in students, using the SMOTE algorithm to address data label imbalance and introducing the priority forest algorithm for prioritized interventions.

JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY (2023)

Article Computer Science, Artificial Intelligence

Graph Lifelong Learning: A Survey

Falih Gozi Febrinanto, Feng Xia, Kristen Moore, Chandra Thapa, Charu Aggarwal

Summary: Graph learning is a popular approach for machine learning on graph-structured data, but most methods assume static graphs and cannot handle dynamically growing or evolving graphs. This survey paper provides a comprehensive overview of recent advancements in graph lifelong learning and discusses potential applications and open research problems.

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE (2023)

Article Computer Science, Artificial Intelligence

Knowledge Graphs: Opportunities and Challenges

Ciyuan Peng, Feng Xia, Mehdi Naseriparsa, Francesco Osborne

Summary: With the explosive growth of AI and big data, the organization and representation of knowledge becomes crucial. Knowledge graphs, as graph data, effectively accumulate and convey knowledge of the real world, gaining rapid attention in academia and industry. This paper presents a systematic overview focusing on the opportunities and challenges of knowledge graphs. It reviews the opportunities in terms of AI systems and potential application fields, and thoroughly discusses technical challenges such as embeddings, acquisition, completion, fusion, and reasoning. The survey aims to provide insights for future research and development of knowledge graphs.

ARTIFICIAL INTELLIGENCE REVIEW (2023)

Editorial Material Computer Science, Artificial Intelligence

Deep Anomaly Analytics: Advancing the Frontier of Anomaly Detection

Feng Xia, Leman Akoglu, Charu Aggarwal, Huan Liu

Summary: Deep anomaly analytics is an evolving field that utilizes deep learning to detect anomalies in datasets. Its application has grown due to the need to detect anomalies in complex data. It has the potential to transform industries such as healthcare, finance, and cybersecurity by providing insights and detecting threats. However, challenges such as time series and graph anomaly detection, model efficiency, and solving real-world problems exist. This editorial provides an overview of deep anomaly analytics and highlights key challenges in the field.

IEEE INTELLIGENT SYSTEMS (2023)

Article Computer Science, Cybernetics

The Effect of Facial Perception and Academic Performance on Social Centrality

Dongyu Zhang, Ciyuan Peng, Xiaojun Chang, Feng Xia

Summary: This article explores the impact of facial perception on the social centrality of students in social networks and compares it with academic performance. The experimental results demonstrate that both facial perception and academic performance are closely correlated with students' social centrality.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Biochemical Research Methods

MSCET: A Multi-Scenario Offloading Schedule for Biomedical Data Processing and Analysis in Cloud-Edge-Terminal Collaborative Vehicular Networks

Zhichen Ni, Honglong Chen, Zhe Li, Xiaomeng Wang, Na Yan, Weifeng Liu, Feng Xia

Summary: With the development of AI and IoT, computation intensive and delay sensitive tasks in vehicles pose challenges to driver biometric monitoring. Edge computing offers a solution by offloading tasks to Edge Servers in RSUs, but some tasks may be too complex for ESs. To address this, we propose a collaborative vehicular network where cloud, edge, and terminal cooperate. Vehicles offload computation intensive tasks to the cloud, and we construct a virtual resource pool to integrate resources from multiple ESs. Our proposed MSCET schedule optimizes system utility and outperforms existing schedules according to extensive simulations.

IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS (2023)

Article Computer Science, Cybernetics

Trust-Aware Detection of Malicious Users in Dating Social Networks

Xingfa Shen, Wentao Lv, Jianhui Qiu, Achhardeep Kaur, Fengjun Xiao, Feng Xia

Summary: Online dating is a thriving business that raises concerns about privacy and trust. In order to maintain the safety of users, detecting malicious users is crucial. This study proposes a trust-aware detection framework based on real dating site data, which improves detection precision and recall rate through a user trust model and a data-balancing method.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Engineering, Civil

Efficiently Identifying Unknown COTS RFID Tags for Intelligent Transportation Systems

Kai Lin, Honglong Chen, Zhe Li, Na Yan, Huansheng Xue, Feng Xia

Summary: In the past decade, IoT technology has made significant advancements in various fields. Intelligent transportation systems (ITS), as a core application of IoT, have gained great attention from researchers. Radio frequency identification (RFID) is an essential technology in IoT and plays a crucial role in identifying tagged vehicles in ITS. However, the existing commercial-off-the-shelf (COTS) RFID tags cannot support the hash function, which poses a challenge for unknown tag identification protocols. To address this issue, we propose two approaches to efficiently identify unknown COTS RFID tags.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

暂无数据