{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:49:41Z","timestamp":1764175781498,"version":"3.43.0"},"reference-count":31,"publisher":"Emerald","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,15]]},"abstract":"<jats:sec>\n                  <jats:title>Purpose<\/jats:title>\n                  <jats:p>The purpose of this study is to solve user allocation problem in a multi-hop user allocation (MUA) environment and balance the service on servers.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Design\/methodology\/approach<\/jats:title>\n                  <jats:p>The authors choose to describe the MUA problem as a MUA game. Then, this paper proves the existence of Nash equilibrium in the game. Next, the paper proposes a game-based multi-hop user allocation (GMUA) algorithm to get the solution.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Findings<\/jats:title>\n                  <jats:p>Both convergence analysis and comparison experiments are carried out to evaluate the performance of the GMUA algorithm. The results show that the GMUA algorithm is better than other methods. And the iteration time has limitation which is related to user\u2019s number and resouce limitation.<\/jats:p>\n               <\/jats:sec>\n               <jats:sec>\n                  <jats:title>Originality\/value<\/jats:title>\n                  <jats:p>This study discusses user allocation problem in multi-hop environment. The authors prove that this problem is NP-hard. They introduce it to a potential game and propose a GMUA algorithm to solve it. The authors analyze this algorithm theoretically and experimentally.<\/jats:p>\n               <\/jats:sec>","DOI":"10.1108\/ijwis-07-2024-0190","type":"journal-article","created":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:08:53Z","timestamp":1743466133000},"page":"230-253","source":"Crossref","is-referenced-by-count":1,"title":["User allocation in multi-hop edge computing networks: a game-theoretical approach"],"prefix":"10.1108","volume":"21","author":[{"given":"Wenjie","family":"Hou","sequence":"first","affiliation":[{"name":"Beijing Information Science and Technology University \u2212 Jianxiangqiao Campus , Beijing,","place":["China"]}]},{"given":"Ying","family":"Chen","sequence":"additional","affiliation":[{"name":"Beijing Information Science and Technology University , Haidian-qu,","place":["China"]}]}],"member":"140","published-online":{"date-parts":[[2025,4,2]]},"reference":[{"key":"2025081308472045500_ref001","doi-asserted-by":"crossref","first-page":"85714","DOI":"10.1109\/ACCESS.2020.2991734","article-title":"An overview on edge computing research","volume":"8","author":"Cao","year":"2020","journal-title":"IEEE Access"},{"key":"2025081308472045500_ref002","article-title":"A multi-hop task offloading decision model in MEC-enabled internet of vehicles","author":"Chen","year":"2022","journal-title":"IEEE Internet of Things Journal."},{"issue":"5","key":"2025081308472045500_ref003","doi-asserted-by":"crossref","first-page":"2795","DOI":"10.1109\/TNET.2015.2487344","article-title":"Efficient multi-user computation offloading for mobile-edge cloud computing","volume":"24","author":"Chen","year":"2015","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"3","key":"2025081308472045500_ref004","doi-asserted-by":"crossref","first-page":"1888","DOI":"10.1109\/TCC.2020.3008448","article-title":"Interference-aware saas user allocation game for edge computing","volume":"10","author":"Cui","year":"2020","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"6","key":"2025081308472045500_ref005","doi-asserted-by":"crossref","first-page":"1503","DOI":"10.1109\/TPDS.2021.3112604","article-title":"A potential game theoretic approach to computation offloading strategy optimization in end-edge-cloud computing","volume":"33","author":"Ding","year":"2021","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"1","key":"2025081308472045500_ref006","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/TMC.2019.2892100","article-title":"Computational offloading for energy constrained devices in multi-hop cooperative networks","volume":"19","author":"Funai","year":"2019","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2025081308472045500_ref007","article-title":"Tbdb: Token bucket-based dynamic batching for resource scheduling supporting neural network inference in intelligent consumer electronics","author":"Gao","year":"2023","journal-title":"IEEE Transactions on Consumer Electronics."},{"key":"2025081308472045500_ref008","article-title":"Com-ddpg: task offloading based on multiagent reinforcement learning for information-communication-enhanced mobile edge computing in the internet of vehicles","author":"Gao","year":"2023","journal-title":"IEEE Transactions on Vehicular Technology."},{"issue":"3","key":"2025081308472045500_ref009","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1108\/IJWIS-10-2023-0184","article-title":"Web intelligence-enhanced unmanned aerial vehicle target search model based on reinforcement learning for cooperative tasks","volume":"20","author":"Gao","year":"2024","journal-title":"International Journal of Web Information Systems"},{"issue":"6","key":"2025081308472045500_ref010","doi-asserted-by":"crossref","first-page":"4977","DOI":"10.1109\/JIOT.2018.2838584","article-title":"Mobile-edge computation offloading for ultradense iot networks","volume":"5","author":"Guo","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"2025081308472045500_ref011","doi-asserted-by":"crossref","first-page":"2333","DOI":"10.1109\/TDSC.2021.3055559","article-title":"A game-theoretical approach for mitigating edge ddos attack","volume":"19","author":"He","year":"2021","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"3","key":"2025081308472045500_ref012","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TPDS.2019.2938944","article-title":"A game-theoretical approach for user allocation in edge computing environment","volume":"31","author":"He","year":"2019","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"15","key":"2025081308472045500_ref013","doi-asserted-by":"crossref","first-page":"13837","DOI":"10.1109\/JIOT.2022.3143539","article-title":"Distributed offloading in overlapping areas of mobile-edge computing for Internet of Things","volume":"9","author":"Huang","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"issue":"7","key":"2025081308472045500_ref014","doi-asserted-by":"crossref","DOI":"10.1109\/TMC.2022.3150432","article-title":"Joint task offloading and resource allocation for energy-constrained mobile edge computing","volume":"22","author":"Jiang","year":"2022","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2025081308472045500_ref015","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/978-3-030-33702-5_8","article-title":"Edge user allocation with dynamic quality of service","volume-title":"Service-Oriented Computing: 17th International Conference, ICSOC 2019, Toulouse, France, October 28\u201331, 2019, Proceedings 17","author":"Lai","year":"2019"},{"key":"2025081308472045500_ref016","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1016\/j.future.2020.06.029","article-title":"Qoe-aware user allocation in edge computing systems with dynamic qos","volume":"112","author":"Lai","year":"2020","journal-title":"Future Generation Computer Systems"},{"key":"2025081308472045500_ref017","article-title":"Eptask: Deep reinforcement learning based energy-efficient and priority-aware task scheduling for dynamic vehicular edge computing","author":"Li","year":"2023","journal-title":"IEEE Transactions on Intelligent Vehicles."},{"issue":"23","key":"2025081308472045500_ref018","doi-asserted-by":"crossref","first-page":"24009","DOI":"10.1109\/JIOT.2022.3188933","article-title":"Joint task offloading and resource allocation for cooperative mobile-edge computing under sequential task dependency","volume":"9","author":"Li","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"2025081308472045500_ref019","doi-asserted-by":"crossref","DOI":"10.1109\/TSC.2021.3131348","article-title":"Criticality-awareness edge user allocation for public safety","author":"Liu","year":"2021","journal-title":"IEEE Transactions on Services Computing."},{"issue":"4","key":"2025081308472045500_ref020","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1108\/IJWIS-02-2022-0039","article-title":"Cost research of Internet of Things service architecture for random mobile users based on edge computing","volume":"18","author":"Liu","year":"2022","journal-title":"International Journal of Web Information Systems"},{"issue":"8","key":"2025081308472045500_ref021","doi-asserted-by":"crossref","first-page":"6677","DOI":"10.1109\/JIOT.2021.3055510","article-title":"Latency optimization for computation offloading with hybrid noma\u2013oma transmission","volume":"8","author":"Liu","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"2025081308472045500_ref022","article-title":"Mobility-aware multi-hop task offloading for autonomous driving in vehicular edge computing and networks","author":"Liu","year":"2022","journal-title":"IEEE Transactions on Intelligent Transportation Systems."},{"key":"2025081308472045500_ref023","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.sysarc.2019.01.019","article-title":"Qoe-driven computation offloading for edge computing","volume":"97","author":"Luo","year":"2019","journal-title":"Journal of Systems Architecture"},{"key":"2025081308472045500_ref024","doi-asserted-by":"crossref","first-page":"5214","DOI":"10.1109\/ICC45855.2022.9838492","article-title":"Unified resource allocation framework for the edge intelligence-enabled metaverse","volume-title":"in ICC 2022-IEEE International Conference on Communications","author":"Ng","year":"2022"},{"issue":"11","key":"2025081308472045500_ref025","doi-asserted-by":"crossref","first-page":"3782","DOI":"10.1016\/j.amc.2009.11.018","article-title":"Bees algorithm for generalized assignment problem","volume":"215","author":"\u00d6zbakir","year":"2010","journal-title":"Applied Mathematics and Computation"},{"issue":"3","key":"2025081308472045500_ref026","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1108\/IJWIS-10-2023-0186","article-title":"Web-enhanced unmanned aerial vehicle target search method combining imitation learning and reinforcement learning","volume":"20","author":"Pang","year":"2024","journal-title":"International Journal of Web Information Systems"},{"key":"2025081308472045500_ref027","doi-asserted-by":"crossref","first-page":"116730","DOI":"10.1016\/j.eswa.2022.116730","article-title":"Delay-sensitive tasks offloading in multi-access edge computing","volume":"198","author":"Song","year":"2022","journal-title":"Expert Systems with Applications"},{"key":"2025081308472045500_ref028","first-page":"1","article-title":"Cybertwin assisted wireless asynchronous federated learning mechanism for edge computing","volume-title":"in 2021 IEEE Global Communications Conference (GLOBECOM)","author":"Xu","year":"2021"},{"issue":"2","key":"2025081308472045500_ref029","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MNET.2019.1800221","article-title":"Optimal edge resource allocation in iot-based smart cities","volume":"33","author":"Zhao","year":"2019","journal-title":"IEEE Network"},{"key":"2025081308472045500_ref030","article-title":"Qos-aware multi-hop task offloading in satellite-terrestrial edge networks","author":"Zhao","year":"2024","journal-title":"IEEE Internet of Things Journal."},{"issue":"7","key":"2025081308472045500_ref031","doi-asserted-by":"crossref","first-page":"4139","DOI":"10.1109\/TWC.2016.2646346","article-title":"Optimal power control in ultra-dense small cell networks: a game-theoretic approach","volume":"16","author":"Zheng","year":"2017","journal-title":"IEEE Transactions on Wireless Communications"}],"container-title":["International Journal of Web Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJWIS-07-2024-0190\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/ijwis\/article-pdf\/21\/3\/230\/10063654\/ijwis-07-2024-0190.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ijwis\/article-pdf\/21\/3\/230\/10063654\/ijwis-07-2024-0190.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T12:47:32Z","timestamp":1755089252000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ijwis\/article\/21\/3\/230\/1273633\/User-allocation-in-multi-hop-edge-computing"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,2]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5,15]]}},"URL":"https:\/\/doi.org\/10.1108\/ijwis-07-2024-0190","relation":{},"ISSN":["1744-0084","1744-0092"],"issn-type":[{"type":"print","value":"1744-0084"},{"type":"electronic","value":"1744-0092"}],"subject":[],"published":{"date-parts":[[2025,4,2]]}}}