{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T13:30:11Z","timestamp":1770989411656,"version":"3.50.1"},"reference-count":29,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072187, 61872084"],"award-info":[{"award-number":["62072187, 61872084"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guangdong Major Project of Basic and Applied Basic Research","award":["2019B030302002"],"award-info":[{"award-number":["2019B030302002"]}]},{"name":"Guangzhou Science and Technology Program","award":["202007040002"],"award-info":[{"award-number":["202007040002"]}]},{"name":"Guangzhou Development Zone Science and Technology","award":["2020GH10"],"award-info":[{"award-number":["2020GH10"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2022,2,28]]},"abstract":"<jats:p>\n            In addition to the stationary\n            <jats:bold>mobile edge computing (MEC)<\/jats:bold>\n            servers, a few MEC surrogates that possess a certain mobility and computation capacity, e.g., flying\n            <jats:bold>unmanned aerial vehicles (UAVs)<\/jats:bold>\n            and private vehicles, have risen as powerful counterparts for service provision. In this article, we design a two-stage online scheduling scheme, targeting computation offloading in a UAV-assisted MEC system. On our stage-one formulation, an online scheduling framework is proposed for dynamic adjustment of mobile users' CPU frequency and their transmission power, aiming at producing a socially beneficial solution to users. But the major impediment during our investigation lies in that users might not unconditionally follow the scheduling decision released by servers as a result of their individual rationality. In this regard, we formulate each step of online scheduling on stage one into a non-cooperative game with potential competition over the limited radio resource. As a solution, a centralized online scheduling algorithm, called ONCCO, is proposed, which significantly promotes social benefit on the basis of the users' individual rationality. On our stage-two formulation, we are working towards the optimization of UAV computation resource provision, aiming at minimizing the energy consumption of UAVs during such a process, and correspondingly, another algorithm, called WS-UAV, is given as a solution. Finally, extensive experiments via numerical simulation are conducted for an evaluation purpose, by which we show that our proposed algorithms achieve satisfying performance enhancement in terms of energy conservation and sustainable service provision.\n          <\/jats:p>","DOI":"10.1145\/3430503","type":"journal-article","created":{"date-parts":[[2021,10,16]],"date-time":"2021-10-16T00:44:52Z","timestamp":1634345092000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Energy-Efficient Computation Offloading for UAV-Assisted MEC: A Two-Stage Optimization Scheme"],"prefix":"10.1145","volume":"22","author":[{"given":"Weiwei","family":"Lin","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"given":"Tiansheng","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"given":"Fang","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"given":"Xiumin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"given":"Ching-Hsien","family":"Hsu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, Asia University and Department of Medical Research, China Medical University Hospital, China Medical University, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2021,10,15]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2018.8445936"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.12.022"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2013.32"},{"key":"e_1_2_1_4_1","volume-title":"The energy impact of security mechanisms in modern mobile devices. Network Security","author":"Caviglione Luca","year":"2012","unstructured":"Luca Caviglione and Alessio Merlo . 2012. The energy impact of security mechanisms in modern mobile devices. Network Security ( 2012 ), 2, 11\u201314. DOI:https:\/\/doi.org\/10.1016\/S1353-4858(12)70015-6 10.1016\/S1353-4858(12)70015-6 Luca Caviglione and Alessio Merlo. 2012. The energy impact of security mechanisms in modern mobile devices. Network Security (2012), 2, 11\u201314. DOI:https:\/\/doi.org\/10.1016\/S1353-4858(12)70015-6"},{"key":"e_1_2_1_5_1","volume-title":"Multi-user multi-task computation offloading in green mobile edge cloud computing","author":"Chen Weiwei","year":"2018","unstructured":"Weiwei Chen , Dong Wang , and Keqin Li. 2018. Multi-user multi-task computation offloading in green mobile edge cloud computing . IEEE Transactions on Services Computing ( 2018 ). Weiwei Chen, Dong Wang, and Keqin Li. 2018. Multi-user multi-task computation offloading in green mobile edge cloud computing. IEEE Transactions on Services Computing (2018)."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2316834"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2811942"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2706308"},{"key":"e_1_2_1_10_1","volume-title":"A game theoretic approach to computation offloading strategy optimization for non-cooperative users in mobile edge computing","author":"Keqin Li.","year":"2018","unstructured":"Keqin Li. 2018. A game theoretic approach to computation offloading strategy optimization for non-cooperative users in mobile edge computing . IEEE Transactions on Sustainable Computing ( 2018 ). Keqin Li. 2018. A game theoretic approach to computation offloading strategy optimization for non-cooperative users in mobile edge computing. IEEE Transactions on Sustainable Computing (2018)."},{"key":"#cr-split#-e_1_2_1_11_1.1","doi-asserted-by":"crossref","unstructured":"R. Li Z. Zhou X. Chen and Q. Ling. 2019. Resource Price-Aware Offloading for Edge-Cloud Collaboration: A Two-Timescale Online Control Approach. IEEE Transactions on Cloud Computing (2019) 1-1. DOI:https:\/\/doi.org\/10.1109\/TCC.2019.2937928 10.1109\/TCC.2019.2937928","DOI":"10.1109\/TCC.2019.2937928"},{"key":"#cr-split#-e_1_2_1_11_1.2","doi-asserted-by":"crossref","unstructured":"R. Li Z. Zhou X. Chen and Q. Ling. 2019. Resource Price-Aware Offloading for Edge-Cloud Collaboration: A Two-Timescale Online Control Approach. IEEE Transactions on Cloud Computing (2019) 1-1. DOI:https:\/\/doi.org\/10.1109\/TCC.2019.2937928","DOI":"10.1109\/TCC.2019.2937928"},{"key":"e_1_2_1_12_1","volume-title":"Graves","author":"Little John D. C.","year":"2008","unstructured":"John D. C. Little and Stephen C . Graves . 2008 . Little's law. In Building Intuition. Springer , 81\u2013100. John D. C. Little and Stephen C. Graves. 2008. Little's law. In Building Intuition. Springer, 81\u2013100."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.05.005"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8253967"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996483"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2902318"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1941130"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2872436"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"J. Ben Rosen. 1964. Existence and uniqueness of equilibrium points for concave n-person games. (1964).  J. Ben Rosen. 1964. Existence and uniqueness of equilibrium points for concave n-person games. (1964).","DOI":"10.2307\/1911749"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2832124"},{"key":"e_1_2_1_21_1","first-page":"4268","article-title":"Mobile-edge computing: Partial computation offloading using dynamic voltage scaling","volume":"64","author":"Wang Yanting","year":"2016","unstructured":"Yanting Wang , Min Sheng , Xijun Wang , Liang Wang , and Jiandong Li . 2016 . Mobile-edge computing: Partial computation offloading using dynamic voltage scaling . IEEE Transactions on Communications 64 , 10 (2016), 4268 \u2013 4282 . Yanting Wang, Min Sheng, Xijun Wang, Liang Wang, and Jiandong Li. 2016. Mobile-edge computing: Partial computation offloading using dynamic voltage scaling. IEEE Transactions on Communications 64, 10 (2016), 4268\u20134282.","journal-title":"IEEE Transactions on Communications"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2789293"},{"key":"e_1_2_1_23_1","volume-title":"Developing Offloading-enabled Application Development Frameworks for Android Mobile Devices. In 2018 IEEE 20th International Conference on High Performance Computing and Communications","author":"Xia Hui","unstructured":"Hui Xia , Ligang He , Bin Wang , Cheng Chang , Xie Han , and Carsten Maple . 2018. Developing Offloading-enabled Application Development Frameworks for Android Mobile Devices. In 2018 IEEE 20th International Conference on High Performance Computing and Communications ; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS). IEEE , 416\u2013421. Hui Xia, Ligang He, Bin Wang, Cheng Chang, Xie Han, and Carsten Maple. 2018. Developing Offloading-enabled Application Development Frameworks for Android Mobile Devices. In 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS). IEEE, 416\u2013421."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2633522"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2890133"},{"key":"e_1_2_1_26_1","volume-title":"Energy-latency tradeoff for computation offloading in UAV-assisted multi-accessedge computing System","author":"Zhang Kaiyuan","year":"2020","unstructured":"Kaiyuan Zhang , Xiaolin Gui , Dewang Ren , and Defu Li. 2020. Energy-latency tradeoff for computation offloading in UAV-assisted multi-accessedge computing System . IEEE Internet of Things Journal ( 2020 ). Kaiyuan Zhang, Xiaolin Gui, Dewang Ren, and Defu Li. 2020. Energy-latency tradeoff for computation offloading in UAV-assisted multi-accessedge computing System. IEEE Internet of Things Journal (2020)."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2864426"},{"key":"e_1_2_1_28_1","volume-title":"On-demand Privacy Preservation for Cost-Efficient Edge Intelligence Model Training","author":"Zhou Zhi","unstructured":"Zhi Zhou and Xu Chen . 2019. On-demand Privacy Preservation for Cost-Efficient Edge Intelligence Model Training . In Provable Security, Ron Steinfeld and Tsz Hon Yuen (Eds.). Vol. 11821 . Springer International Publishing , Cham , 321\u2013329. DOI:https:\/\/doi.org\/10.1007\/978-3-030-31919-9_19 10.1007\/978-3-030-31919-9_19 Zhi Zhou and Xu Chen. 2019. On-demand Privacy Preservation for Cost-Efficient Edge Intelligence Model Training. In Provable Security, Ron Steinfeld and Tsz Hon Yuen (Eds.). Vol. 11821. Springer International Publishing, Cham, 321\u2013329. DOI:https:\/\/doi.org\/10.1007\/978-3-030-31919-9_19"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430503","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3430503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:57Z","timestamp":1750199937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,15]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2,28]]}},"alternative-id":["10.1145\/3430503"],"URL":"https:\/\/doi.org\/10.1145\/3430503","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,15]]},"assertion":[{"value":"2020-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}