{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T00:35:23Z","timestamp":1776213323279,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T00:00:00Z","timestamp":1612828800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T00:00:00Z","timestamp":1612828800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11276-021-02554-w","type":"journal-article","created":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T02:51:15Z","timestamp":1612925475000},"page":"2023-2038","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":155,"title":["Joint computation offloading and task caching for multi-user and multi-task MEC systems: reinforcement learning-based algorithms"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7154-2307","authenticated-orcid":false,"given":"Ibrahim A.","family":"Elgendy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7521-2871","authenticated-orcid":false,"given":"Wei-Zhe","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4929-4698","authenticated-orcid":false,"given":"Brij B.","family":"Gupta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5068-2033","authenticated-orcid":false,"given":"Ahmed A.","family":"Abd El-Latif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,9]]},"reference":[{"key":"2554_CR1","unstructured":"Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., et\u00a0al. (2016). Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467."},{"issue":"1","key":"2554_CR2","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/TNSM.2020.2969863","volume":"17","author":"AA Abd El-Latif","year":"2020","unstructured":"Abd El-Latif, A. A., Abd-El-Atty, B., Mazurczyk, W., Fung, C., & Venegas-Andraca, S. E. (2020). Secure data encryption based on quantum walks for 5G internet of things scenario. IEEE Transactions on Network and Service Management, 17(1), 118\u2013131.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"2554_CR3","doi-asserted-by":"crossref","first-page":"92687","DOI":"10.1109\/ACCESS.2020.2992820","volume":"8","author":"AA Abd El-Latif","year":"2020","unstructured":"Abd El-Latif, A. A., Abd-El-Atty, B., Venegas-Andraca, S. E., Elwahsh, H., Piran, M. J., Bashir, A. K., et al. (2020). Providing end-to-end security using quantum walks in IoT networks. IEEE Access, 8, 92687\u201392696.","journal-title":"IEEE Access"},{"key":"2554_CR4","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1016\/j.future.2019.05.053","volume":"100","author":"AA Abd EL-Latif","year":"2019","unstructured":"Abd EL-Latif, A. A., Abd-El-Atty, B., Venegas-Andraca, S. E. and Mazurczyk, W., (2019). Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Generation Computer Systems, 100, 893\u2013906.","journal-title":"Future Generation Computer Systems"},{"key":"2554_CR5","doi-asserted-by":"crossref","first-page":"111223","DOI":"10.1109\/ACCESS.2020.2999468","volume":"8","author":"EM Abou-Nassar","year":"2020","unstructured":"Abou-Nassar, E. M., Iliyasu, A. M., El-Kafrawy, P. M., Song, O.-Y., Bashir, A. K., & Abd El-Latif, A. A. (2020). Ditrust chain: Towards blockchain-based trust models for sustainable healthcare iot systems. IEEE Access, 8, 111223\u2013111238.","journal-title":"IEEE Access"},{"key":"2554_CR6","doi-asserted-by":"crossref","first-page":"5520","DOI":"10.1109\/JIOT.2019.2903245","volume":"6","author":"L Ale","year":"2019","unstructured":"Ale, L., Zhang, N., Wu, H., Chen, D., & Han, T. (2019). Online proactive caching in mobile edge computing using bidirectional deep recurrent neural network. IEEE Internet of Things Journal, 6, 5520\u20135530.","journal-title":"IEEE Internet of Things Journal"},{"key":"2554_CR7","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.patrec.2018.07.026","volume":"130","author":"S AlZu\u2019bi","year":"2020","unstructured":"AlZu\u2019bi, S., Shehab, M., Al-Ayyoub, M., Jararweh, Y., & Gupta, B. (2020). Parallel implementation for 3D medical volume fuzzy segmentation. Pattern Recognition Letters, 130, 312\u2013318.","journal-title":"Pattern Recognition Letters"},{"key":"2554_CR8","doi-asserted-by":"crossref","unstructured":"Ananthanarayanan, G., Bahl, V., Cox, L., Crown, A., Nogbahi, S., & Shu, Y. (2019). Video analytics-killer app for edge computing. In Proceedings of the 17th annual international conference on mobile systems, applications, and services (pp.\u00a0695\u2013696). ACM.","DOI":"10.1145\/3307334.3328589"},{"key":"2554_CR9","unstructured":"Arulkumaran, K., Deisenroth, M. P., Brundage, M., & Bharath, A. A. (2017). A brief survey of deep reinforcement learning. arXiv preprint arXiv:1708.05866."},{"issue":"1","key":"2554_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3286688","volume":"52","author":"A Boukerche","year":"2019","unstructured":"Boukerche, A., Guan, S., & Grande, R. E. D. (2019). Sustainable offloading in mobile cloud computing: Algorithmic design and implementation. ACM Computing Surveys (CSUR), 52(1), 1\u201337.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"8","key":"2554_CR11","doi-asserted-by":"crossref","first-page":"1655","DOI":"10.1109\/JPROC.2019.2921977","volume":"107","author":"J Chen","year":"2019","unstructured":"Chen, J., & Ran, X. (2019). Deep learning with edge computing: A review. Proceedings of the IEEE, 107(8), 1655\u20131674.","journal-title":"Proceedings of the IEEE"},{"issue":"4","key":"2554_CR12","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1007\/s00521-015-1916-x","volume":"27","author":"L Chen","year":"2016","unstructured":"Chen, L., Qu, H., Zhao, J., Chen, B., & Principe, J. C. (2016). Efficient and robust deep learning with correntropy-induced loss function. Neural Computing and Applications, 27(4), 1019\u20131031.","journal-title":"Neural Computing and Applications"},{"key":"2554_CR13","doi-asserted-by":"crossref","unstructured":"Chen, M.-H., Liang, B., & Dong, M. (2017). Joint offloading and resource allocation for computation and communication in mobile cloud with computing access point. In IEEE INFOCOM 2017-IEEE conference on computer communications (pp.\u00a01\u20139). IEEE.","DOI":"10.1109\/INFOCOM.2017.8057150"},{"issue":"4","key":"2554_CR14","doi-asserted-by":"crossref","first-page":"974","DOI":"10.1109\/TPDS.2014.2316834","volume":"26","author":"X Chen","year":"2014","unstructured":"Chen, X. (2014). Decentralized computation offloading game for mobile cloud computing. IEEE Transactions on Parallel and Distributed Systems, 26(4), 974\u2013983.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"5","key":"2554_CR15","doi-asserted-by":"crossref","first-page":"2795","DOI":"10.1109\/TNET.2015.2487344","volume":"24","author":"X Chen","year":"2015","unstructured":"Chen, X., Jiao, L., Li, W., & Fu, X. (2015). Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE\/ACM Transactions on Networking, 24(5), 2795\u20132808.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"2554_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2923692","author":"Y Chen","year":"2019","unstructured":"Chen, Y., Zhang, N., Zhang, Y., Chen, X., Wu, W., & Shen, X. S. (2019). Toffee: Task offloading and frequency scaling for energy efficiency of mobile devices in mobile edge computing. IEEE Transactions on Cloud Computing, https:\/\/doi.org\/10.1109\/TCC.2019.2923692.","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"2","key":"2554_CR17","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1109\/TNET.2014.2300448","volume":"23","author":"S Deb","year":"2015","unstructured":"Deb, S., & Monogioudis, P. (2015). Learning-based uplink interference management in 4G LTE cellular systems. IEEE\/ACM Transactions on Networking, 23(2), 398\u2013411.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"2554_CR18","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1016\/j.future.2019.05.037","volume":"100","author":"IA Elgendy","year":"2019","unstructured":"Elgendy, I. A., Zhang, W., Tian, Y.-C., & Li, K. (2019). Resource allocation and computation offloading with data security for mobile edge computing. Future Generation Computer Systems, 100, 531\u2013541.","journal-title":"Future Generation Computer Systems"},{"key":"2554_CR19","doi-asserted-by":"crossref","first-page":"2410","DOI":"10.1109\/TNSM.2020.3020249","volume":"17","author":"IA Elgendy","year":"2020","unstructured":"Elgendy, I. A., Zhang, W.-Z., Zeng, Y., He, H., Tian, Y.-C., & Yang, Y. (2020). Efficient and secure multi-user multi-task computation offloading for mobile-edge computing in mobile IoT networks. IEEE Transactions on Network and Service Management, 17, 2410\u20132422.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"2554_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2018.2847347","author":"I Elgendy","year":"2018","unstructured":"Elgendy, I., Zhang, W., Liu, C., & Hsu, C.-H. (2018). An efficient and secured framework for mobile cloud computing. IEEE Transactions on Cloud Computing. https:\/\/doi.org\/10.1109\/TCC.2018.2847347","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"1","key":"2554_CR21","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/TWC.2012.121112.120018","volume":"12","author":"D Fooladivanda","year":"2011","unstructured":"Fooladivanda, D., & Rosenberg, C. (2011). Joint resource allocation and user association for heterogeneous wireless cellular networks. IEEE Transactions on Wireless Communications, 12(1), 248\u2013257.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2554_CR22","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.future.2018.06.020","volume":"89","author":"R Gad","year":"2018","unstructured":"Gad, R., Talha, M., Abd El-Latif, A. A., Zorkany, M., Ayman, E.-S., Nawal, E.-F., et al. (2018). Iris recognition using multi-algorithmic approaches for cognitive internet of things (CIoT) framework. Future Generation Computer Systems, 89, 178\u2013191.","journal-title":"Future Generation Computer Systems"},{"key":"2554_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2973993","author":"S Guo","year":"2020","unstructured":"Guo, S., Chen, M., Liu, K., Liao, X., & Xiao, B. (2020). Robust computation offloading and resource scheduling in cloudlet-based mobile cloud computing. IEEE Transactions on Mobile Computing. https:\/\/doi.org\/10.1109\/TMC.2020.2973993","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"21","key":"2554_CR24","doi-asserted-by":"crossref","first-page":"e4946","DOI":"10.1002\/cpe.4946","volume":"32","author":"B Gupta","year":"2020","unstructured":"Gupta, B., & Quamara, M. (2020). An overview of internet of things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, 32(21), e4946.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"2554_CR25","unstructured":"Han, Y., Wang, X., Leung, V., Niyato, D., Yan, X., & Chen, X. (2019). Convergence of edge computing and deep learning: A comprehensive survey. arXiv preprint arXiv:1907.08349."},{"key":"2554_CR26","doi-asserted-by":"crossref","first-page":"11365","DOI":"10.1109\/ACCESS.2018.2805798","volume":"6","author":"Y Hao","year":"2018","unstructured":"Hao, Y., Chen, M., Hu, L., Hossain, M. S., & Ghoneim, A. (2018). Energy efficient task caching and offloading for mobile edge computing. IEEE Access, 6, 11365\u201311373.","journal-title":"IEEE Access"},{"issue":"1","key":"2554_CR27","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.dcan.2018.10.003","volume":"5","author":"L Huang","year":"2019","unstructured":"Huang, L., Feng, X., Zhang, C., Qian, L., & Wu, Y. (2019). Deep reinforcement learning-based joint task offloading and bandwidth allocation for multi-user mobile edge computing. Digital Communications and Networks, 5(1), 10\u201317.","journal-title":"Digital Communications and Networks"},{"key":"2554_CR28","doi-asserted-by":"crossref","unstructured":"Jararweh, Y., Doulat, A., Alqudah, O., Ahmed, E., Al-Ayyoub, M., & Benkhelifa, E. (2016). The future of mobile cloud computing: Integrating cloudlets and mobile edge computing. In International conference on telecommunications.","DOI":"10.1109\/ICT.2016.7500486"},{"issue":"6","key":"2554_CR29","doi-asserted-by":"crossref","first-page":"2497","DOI":"10.3390\/su12062497","volume":"12","author":"M Khayyat","year":"2020","unstructured":"Khayyat, M., Alshahrani, A., Alharbi, S., Elgendy, I. A., Paramonov, A., & Koucheryavy, A. (2020). Multilevel service-provisioning-based autonomous vehicle applications. Sustainability, 12(6), 2497\u20132513.","journal-title":"Sustainability"},{"key":"2554_CR30","doi-asserted-by":"crossref","first-page":"137052","DOI":"10.1109\/ACCESS.2020.3011705","volume":"8","author":"M Khayyat","year":"2020","unstructured":"Khayyat, M., Elgendy, I. A., Muthanna, A., Alshahrani, A. S., Alharbi, S., & Koucheryavy, A. (2020). Advanced deep learning-based computational offloading for multilevel vehicular edge-cloud computing networks. IEEE Access, 8, 137052\u2013137062.","journal-title":"IEEE Access"},{"key":"2554_CR31","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.ins.2018.02.060","volume":"479","author":"D Li","year":"2019","unstructured":"Li, D., Deng, L., Gupta, B. B., Wang, H., & Choi, C. (2019). A novel cnn based security guaranteed image watermarking generation scenario for smart city applications. Information Sciences, 479, 432\u2013447.","journal-title":"Information Sciences"},{"key":"2554_CR32","doi-asserted-by":"crossref","unstructured":"Li, J., Gao, H., Lv, T., & Lu, Y. (2018). Deep reinforcement learning based computation offloading and resource allocation for MEC. In 2018 IEEE Wireless communications and networking conference (WCNC) (pp. 1\u20136). IEEE.","DOI":"10.1109\/WCNC.2018.8377343"},{"issue":"2","key":"2554_CR33","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1109\/TSC.2014.2381227","volume":"8","author":"X Lin","year":"2015","unstructured":"Lin, X., Wang, Y., Xie, Q., & Pedram, M. (2015). Task scheduling with dynamic voltage and frequency scaling for energy minimization in the mobile cloud computing environment. IEEE Transactions on Services Computing, 8(2), 175\u2013186.","journal-title":"IEEE Transactions on Services Computing"},{"key":"2554_CR34","doi-asserted-by":"crossref","first-page":"3336","DOI":"10.1109\/ACCESS.2018.2889815","volume":"7","author":"P Liu","year":"2018","unstructured":"Liu, P., Xu, G., Yang, K., Wang, K., & Meng, X. (2018). Jointly optimized energy-minimal resource allocation in cache-enhanced mobile edge computing systems. IEEE Access, 7, 3336\u20133347.","journal-title":"IEEE Access"},{"key":"2554_CR35","unstructured":"Liu, Y., Peng, J., Kang, J., Iliyasu, A.\u00a0M., Niyato, D., & El-Latif, A. A. A. (2020). A secure federated learning framework for 5G networks. arXiv preprint arXiv:2005.05752."},{"key":"2554_CR36","doi-asserted-by":"crossref","first-page":"3133","DOI":"10.1109\/COMST.2019.2916583","volume":"21","author":"NC Luong","year":"2019","unstructured":"Luong, N. C., Hoang, D. T., Gong, S., Niyato, D., Wang, P., Liang, Y.-C., et al. (2019). Applications of deep reinforcement learning in communications and networking: A survey. IEEE Communications Surveys & Tutorials, 21, 3133\u20133174.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"2554_CR37","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2983924","author":"X Lyu","year":"2020","unstructured":"Lyu, X., Ren, C., Ni, W., Tian, H., Liu, R. P., & Tao, X. (2020). Distributed online learning of cooperative caching in edge cloud. IEEE Transactions on Mobile Computing. https:\/\/doi.org\/10.1109\/TMC.2020.2983924","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"5","key":"2554_CR38","doi-asserted-by":"crossref","first-page":"878","DOI":"10.1109\/LCOMM.2016.2531047","volume":"20","author":"X Lyu","year":"2016","unstructured":"Lyu, X., & Tian, H. (2016). Adaptive receding horizon offloading strategy under dynamic environment. IEEE Communications Letters, 20(5), 878\u2013881.","journal-title":"IEEE Communications Letters"},{"issue":"3","key":"2554_CR39","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1109\/COMST.2017.2682318","volume":"19","author":"P Mach","year":"2017","unstructured":"Mach, P., & Becvar, Z. (2017). Mobile edge computing: A survey on architecture and computation offloading. IEEE Communications Surveys and Tutorials, 19(3), 1628\u20131656.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"2554_CR40","doi-asserted-by":"crossref","unstructured":"Mao, Y., Zhang, J., Song, S., & Letaief, K. B. (2016). Power-delay tradeoff in multi-user mobile-edge computing systems. In 2016 IEEE Global communications conference (GLOBECOM) (pp. 1\u20136). IEEE.","DOI":"10.1109\/GLOCOM.2016.7842160"},{"issue":"2","key":"2554_CR41","doi-asserted-by":"crossref","first-page":"1930","DOI":"10.1109\/TVT.2018.2890685","volume":"68","author":"M Min","year":"2019","unstructured":"Min, M., Xiao, L., Chen, Y., Cheng, P., Wu, D., & Zhuang, W. (2019). Learning-based computation offloading for IoT devices with energy harvesting. IEEE Transactions on Vehicular Technology, 68(2), 1930\u20131941.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"2","key":"2554_CR42","first-page":"193","volume":"15","author":"FN Nur","year":"2019","unstructured":"Nur, F. N., Islam, S., Moon, N. N., Karim, A., Azam, S., & Shanmugam, B. (2019). Priority-based offloading and caching in mobile edge cloud. Journal of Communications Software and Systems, 15(2), 193\u2013201.","journal-title":"Journal of Communications Software and Systems"},{"key":"2554_CR43","volume-title":"Wireless communications: Principles and practice","author":"TS Rappaport","year":"2009","unstructured":"Rappaport, T. S. (2009). Wireless communications: Principles and practice. London: Prentice Hall."},{"key":"2554_CR44","unstructured":"Ruder, S. (2016). An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747."},{"issue":"1","key":"2554_CR45","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1109\/JSTSP.2017.2787979","volume":"12","author":"A Sadeghi","year":"2017","unstructured":"Sadeghi, A., Sheikholeslami, F., & Giannakis, G. B. (2017). Optimal and scalable caching for 5G using reinforcement learning of space-time popularities. IEEE Journal of Selected Topics in Signal Processing, 12(1), 180\u2013190.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"2554_CR46","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3033131","author":"CL Stergiou","year":"2020","unstructured":"Stergiou, C. L., Psannis, K. E., & Gupta, B. B. (2020). IoT-based big data secure management in the fog over a 6G wireless network. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2020.3033131","journal-title":"IEEE Internet of Things Journal"},{"key":"2554_CR47","volume-title":"Reinforcement learning: An introduction","author":"RS Sutton","year":"2018","unstructured":"Sutton, R. S., & Barto, A. G. (2018). Reinforcement learning: An introduction. Cambridge: MIT Press."},{"key":"2554_CR48","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1016\/j.future.2018.04.027","volume":"108","author":"A Tewari","year":"2020","unstructured":"Tewari, A., & Gupta, B. (2020). Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Future Generation Computer Systems, 108, 909\u2013920.","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"2554_CR49","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1109\/SURV.2012.021312.00045","volume":"15","author":"N Vallina-Rodriguez","year":"2013","unstructured":"Vallina-Rodriguez, N., & Crowcroft, J. (2013). Energy management techniques in modern mobile handsets. IEEE Communications Surveys Tutorials, 15(1), 179\u2013198.","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"2554_CR50","doi-asserted-by":"crossref","unstructured":"Wang, H., Li, R., Fan, L., & Zhang, H. (2017). Joint computation offloading and data caching with delay optimization in mobile-edge computing systems. In International conference on wireless communications and signal processing (pp.\u00a01\u20136).","DOI":"10.1109\/WCSP.2017.8171178"},{"key":"2554_CR51","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.patrec.2018.08.010","volume":"130","author":"H Wang","year":"2020","unstructured":"Wang, H., Li, Z., Li, Y., Gupta, B., & Choi, C. (2020). Visual saliency guided complex image retrieval. Pattern Recognition Letters, 130, 64\u201372.","journal-title":"Pattern Recognition Letters"},{"issue":"99","key":"2554_CR52","doi-asserted-by":"crossref","first-page":"6757","DOI":"10.1109\/ACCESS.2017.2685434","volume":"5","author":"S Wang","year":"2017","unstructured":"Wang, S., Zhang, X., Zhang, Y., Wang, L., Yang, J., & Wang, W. (2017). A survey on mobile edge networks: Convergence of computing, caching and communications. IEEE Access, 5(99), 6757\u20136779.","journal-title":"IEEE Access"},{"key":"2554_CR53","doi-asserted-by":"crossref","unstructured":"Wen, Y., Zhang, W., & Luo, H. (2012). Energy-optimal mobile application execution: Taming resource-poor mobile devices with cloud clones. In IEEE INFOCOM (pp.\u00a02716\u20132720).","DOI":"10.1109\/INFCOM.2012.6195685"},{"key":"2554_CR54","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1109\/COMST.2020.2970550","volume":"22","author":"X Wang","year":"2020","unstructured":"Wang, X., Han, Y., Leung, V. C., Niyato, D., Yan, X., & Chen, X. (2020). Convergence of edge computing and deep learning: A comprehensive survey. IEEE Communications Surveys & Tutorials, 22, 869\u2013904.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"2554_CR55","doi-asserted-by":"crossref","first-page":"55923","DOI":"10.1109\/ACCESS.2018.2872750","volume":"6","author":"R Yadav","year":"2018","unstructured":"Yadav, R., Zhang, W., Kaiwartya, O., Singh, P. R., Elgendy, I. A., & Tian, Y.-C. (2018). Adaptive energy-aware algorithms for minimizing energy consumption and sla violation in cloud computing. IEEE Access, 6, 55923\u201355936.","journal-title":"IEEE Access"},{"issue":"4","key":"2554_CR56","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1109\/TMM.2018.2870521","volume":"21","author":"P Yang","year":"2019","unstructured":"Yang, P., Zhang, N., Zhang, S., Yu, L., Zhang, J., & Shen, X. (2019). Content popularity prediction towards location-aware mobile edge caching. IEEE Transactions on Multimedia, 21(4), 915\u2013929.","journal-title":"IEEE Transactions on Multimedia"},{"issue":"1","key":"2554_CR57","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/TMC.2019.2891736","volume":"19","author":"C Yi","year":"2020","unstructured":"Yi, C., Cai, J., & Su, Z. (2020). A multi-user mobile computation offloading and transmission scheduling mechanism for delay-sensitive applications. IEEE Transactions on Mobile Computing, 19(1), 29\u201343.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"1","key":"2554_CR58","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/TWC.2014.2331051","volume":"14","author":"W Zhang","year":"2014","unstructured":"Zhang, W., Wen, Y., & Wu, D. O. (2014). Collaborative task execution in mobile cloud computing under a stochastic wireless channel. IEEE Transactions on Wireless Communications, 14(1), 81\u201393.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2554_CR59","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3042433","author":"W-Z Zhang","year":"2020","unstructured":"Zhang, W.-Z., Elgendy, I.\u00a0A., Hammad, M., Iliyasu, A. M., Du, X., Guizani, M., et al. (2020). Secure and optimized load balancing for multi-tier IoT and edge-cloud computing systems. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2020.3042433","journal-title":"IEEE Internet of Things Journal"},{"issue":"6","key":"2554_CR60","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MNET.2018.1800109","volume":"32","author":"H Zhu","year":"2018","unstructured":"Zhu, H., Cao, Y., Wang, W., Jiang, T., & Jin, S. (2018). Deep reinforcement learning for mobile edge caching: Review, new features, and open issues. IEEE Network, 32(6), 50\u201357.","journal-title":"IEEE Network"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02554-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-021-02554-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02554-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T07:39:39Z","timestamp":1619077179000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-021-02554-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,9]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["2554"],"URL":"https:\/\/doi.org\/10.1007\/s11276-021-02554-w","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,9]]},"assertion":[{"value":"18 January 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}