DAG Scheduling in Mobile Edge Computing
نویسندگان
چکیده
In Mobile Edge Computing, edge servers have limited storage and computing resources which can only support a small number of functions. Meanwhile, mobile applications are becoming more complex, consisting multiple dependent tasks, modeled as Directed Acyclic Graph (DAG). When request arrives, typically in an online manner with deadline specified, we need to configure the assign tasks for efficient processing. This work jointly considers problem task placement scheduling on-demand function configuration on servers, aiming meet many deadlines possible. For single request, when each server is fixed, derive FixDoc find optimal scheduling. allowed, propose GenDoc , novel approximation algorithm, analyze its additive error from theoretically. requests, OnDoc algorithm easy deploy practice. Our extensive experiments show that outperforms state-of-the-art baselines processing 86.14% these unique applications, reduces their average completion time by at least 24% . The satisfy 1.9 × baselines.
منابع مشابه
Advances in a Dag-Scheduling Theory for Internet-Based Computing
Earlier work has developed the underpinnings of a theory of scheduling computations having intertask dependencies—modeled via dags—for Internet-based computing. The goal of the schedules produced is to render tasks eligible for execution at the maximum possible rate. This goal aims: (a) to utilize remote clients’ computational resources well, by always having work to allocate to an available cl...
متن کامل1 Mobile Edge Computing
The ongoing development of the fifth-generation (5G) wireless technologies takes place in a unique landscape of recent advancement in information processing, marked by the emerging prevalence of cloud-based computing and smart mobile devices. These two technologies complement each other by design, with cloud servers providing the engine for computing and smart mobile devices naturally serving a...
متن کاملPreserving Location Privacy in Mobile Edge Computing
The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the...
متن کاملOptimization Task Scheduling Algorithm in Cloud Computing
Since software systems play an important role in applications more than ever, the security has become one of the most important indicators of softwares.Cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. Presenting a proper scheduling method can lead to efficiency of resources by decreasing response time and costs. This rese...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Sensor Networks
سال: 2023
ISSN: ['1550-4859', '1550-4867']
DOI: https://doi.org/10.1145/3616374