{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:10:08Z","timestamp":1755907808471,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-21-CE25-0013"],"award-info":[{"award-number":["ANR-21-CE25-0013"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1145\/3616388.3617516","type":"proceedings-article","created":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:18:07Z","timestamp":1698279487000},"page":"83-92","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Learning Optimal Edge Processing with Offloading and Energy Harvesting"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8629-6470","authenticated-orcid":false,"given":"Andrea","family":"Fox","sequence":"first","affiliation":[{"name":"University of Avignon, Avignon , France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1370-9401","authenticated-orcid":false,"given":"Francesco","family":"De Pellegrini","sequence":"additional","affiliation":[{"name":"University of Avignon, Avignon , France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2177-9979","authenticated-orcid":false,"given":"Eitan","family":"Altman","sequence":"additional","affiliation":[{"name":"INRIA, Sophia-Antipolis, France"}]}],"member":"320","published-online":{"date-parts":[[2023,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3029018"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034832.2034852"},{"volume-title":"Proc. of the Annual Allerton Conference.","author":"Arafa A.","key":"e_1_3_2_1_3_1","unstructured":"A. Arafa, R.D. Yates, and H.V. Poor. 2019. Timely cloud computing: Preemption and waiting. In Proc. of the Annual Allerton Conference."},{"volume-title":"Proc. of EWC.","author":"Barakat B.","key":"e_1_3_2_1_4_1","unstructured":"B. Barakat, H. Yassine, S. Keates, I. Wassell, and K. Arshad. 2019. How to measure the average and peak AoI in real networks. In Proc. of EWC."},{"volume-title":"Monte Carlo simulation, and queues","author":"Br\u00e9maud P.","key":"e_1_3_2_1_5_1","unstructured":"P. Br\u00e9maud. 2001. Markov chains: Gibbs fields, Monte Carlo simulation, and queues. Springer."},{"key":"e_1_3_2_1_6_1","volume-title":"Learning to minimize age of information over an unreliable channel with energy harvesting. arXiv preprint arXiv:2106.16037","author":"Ceran Elif Tugce","year":"2021","unstructured":"Elif Tugce Ceran, Deniz Gunduz, and Andras Gyorgy. 2021. Learning to minimize age of information over an unreliable channel with energy harvesting. arXiv preprint arXiv:2106.16037 (2021)."},{"volume-title":"Proc. of IEEE INFOCOM.","author":"Champati J.P.","key":"e_1_3_2_1_7_1","unstructured":"J.P. Champati, R. Avula, T.J. Oechtering, and J. Gross. 2020. On the minimum achievable AoI for general service-time distributions. In Proc. of IEEE INFOCOM."},{"volume-title":"Proc. of IEEE INFOCOM. 1--9.","author":"Chen M.-H.","key":"e_1_3_2_1_8_1","unstructured":"M.-H. Chen, B. Liang, and M. Dong. 2017. Joint offloading and resource allocation for computation and communication in mobile cloud with computing access point. In Proc. of IEEE INFOCOM. 1--9."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"X. Chen L. Jiao W. Li and X. Fu. 2015. Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE\/ACM TON 24 5 (2015).","DOI":"10.1109\/TNET.2015.2487344"},{"volume-title":"Proc. of IEEE VTC (Fall).","author":"Chen X.","key":"e_1_3_2_1_10_1","unstructured":"X. Chen, H. Zhang, C. Wu, S. Mao, Y. Ji, and M. Bennis. 2018. Performance optimization in mobile-edge computing via deep reinforcement learning. In Proc. of IEEE VTC (Fall)."},{"key":"e_1_3_2_1_11_1","unstructured":"A. Fox et al. 2023. Learning Optimal Edge Processing with Offloading and Energy Harvesting. Technical Report hal-04022507. HAL. https:\/\/hal.science\/hal04022507."},{"key":"e_1_3_2_1_12_1","volume-title":"Forecast: The Business Value of Artificial Intelligence, Worldwide","author":"Lovelock J.-D.","year":"2018","unstructured":"J.-D. Lovelock et al. 2018. Forecast: The Business Value of Artificial Intelligence, Worldwide, 2017--2025. Technical Report. Gartner Inc."},{"key":"e_1_3_2_1_13_1","article-title":"Age of Processing: Age-Driven Status Sampling and Processing Offloading for Edge-Computing-Enabled Real-Time IoT Applications","volume":"8","author":"R. Li","year":"2021","unstructured":"R. Li et al. 2021. Age of Processing: Age-Driven Status Sampling and Processing Offloading for Edge-Computing-Enabled Real-Time IoT Applications. IEEE IoT Journal 8, 19 (2021).","journal-title":"IEEE IoT Journal"},{"key":"e_1_3_2_1_14_1","first-page":"1205","article-title":"Adaptive Federated Learning in Resource Constrained Edge Computing Systems","volume":"37","author":"S. Wang","year":"2019","unstructured":"S. Wang et al. 2019. Adaptive Federated Learning in Resource Constrained Edge Computing Systems. IEEE JSAC 37, 6 (2019), 1205--1221.","journal-title":"IEEE JSAC"},{"key":"e_1_3_2_1_15_1","unstructured":"Y. C. Hu et al. 2015. Mobile edge computing: a key technology towards 5G. Technical Report ISBN No. 979--10--92620-08--5. ETSI."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"M.C. Fu and S.D. Hill. 1997. Optimization of discrete event systems via simultaneous perturbation stochastic approximation. IIE transactions 29 3 (1997) 233--243.","DOI":"10.1080\/07408179708966330"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.09.007"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323679.3326520"},{"volume-title":"Proc. of IEEE INFOCOM. IEEE, 2731--2735","author":"Kaul S.","key":"e_1_3_2_1_19_1","unstructured":"S. Kaul, R. Yates, and M. Gruteser. 2012. Real-time status: How often should one update?. In Proc. of IEEE INFOCOM. IEEE, 2731--2735."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"H.J. Kushner and D.S. Clark. 1978. Stochastic Approximation Methods for Constrained and Unconstrained Systems. Springer.","DOI":"10.1007\/978-1-4684-9352-8"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.40.11.1562"},{"volume-title":"Markov Decision Processes","author":"Puterman M.","key":"e_1_3_2_1_22_1","unstructured":"M. Puterman. 2014. Markov Decision Processes. Wiley."},{"volume-title":"Stochastic processes","author":"Ross S. M.","key":"e_1_3_2_1_23_1","unstructured":"S. M. Ross. 1996. Stochastic processes. Wiley."},{"volume-title":"Proc. of ICML. PMLR","author":"Schulman J.","key":"e_1_3_2_1_24_1","unstructured":"J. Schulman, S. Levine, P. Abbeel, M. Jordan, and P. Moritz. 2015. Trust region policy optimization. In Proc. of ICML. PMLR, 1889--1897."},{"volume-title":"Proc. of IEEE WCNCW. IEEE.","author":"Song X.","key":"e_1_3_2_1_25_1","unstructured":"X. Song, X. Qin, Y. Tao, B. Liu, and P. Zhang. 2019. Age based task scheduling and computation offloading in mobile-edge computing systems. In Proc. of IEEE WCNCW. IEEE."},{"volume-title":"Introduction to stochastic search and optimization: estimation, simulation, and control","author":"Spall J.C.","key":"e_1_3_2_1_26_1","unstructured":"J.C. Spall. 2005. Introduction to stochastic search and optimization: estimation, simulation, and control. Wiley."},{"volume-title":"Proc. of IEEE Globecom.","author":"Stamatakis G.","key":"e_1_3_2_1_27_1","unstructured":"G. Stamatakis, N. Pappas, and A. Traganitis. 2019. Control of Status Updates for Energy Harvesting Devices That Monitor Processes with Alarms. In Proc. of IEEE Globecom."},{"key":"e_1_3_2_1_28_1","unstructured":"R.S. Sutton and A.G. Barto. 2018. Reinforcement learning: An introduction. MIT press."},{"key":"e_1_3_2_1_29_1","volume-title":"Asynchronous stochastic approximation and Q-learning. Machine learning 16, 3","author":"Tsitsiklis J.N.","year":"1994","unstructured":"J.N. Tsitsiklis. 1994. Asynchronous stochastic approximation and Q-learning. Machine learning 16, 3 (1994), 185--202."},{"volume-title":"Proc. of IEEE INDIN.","author":"Wang Q.","key":"e_1_3_2_1_30_1","unstructured":"Q. Wang, H. Chen, Y. Li, Z. Pang, and B. Vucetic. 2019. Minimizing AoI for real-time monitoring in resource-constrained industrial IoT networks. In Proc. of IEEE INDIN."},{"volume-title":"Learning from Delayed Rewards. Ph. D. Dissertation","author":"Cornish Hellaby Watkins Christopher John","key":"e_1_3_2_1_31_1","unstructured":"Christopher John Cornish Hellaby Watkins. 1989. Learning from Delayed Rewards. Ph. D. Dissertation. King's College, Cambridge, UK."},{"key":"e_1_3_2_1_32_1","article-title":"Offloading and resource allocation with general task graph in mobile edge computing: A deep reinforcement learning approach","volume":"19","author":"Yan J.","year":"2020","unstructured":"J. Yan, S. Bi, and Y.J.A. Zhang. 2020. Offloading and resource allocation with general task graph in mobile edge computing: A deep reinforcement learning approach. IEEE Trans. on Wireless Communications 19, 8 (2020).","journal-title":"IEEE Trans. on Wireless Communications"},{"key":"e_1_3_2_1_33_1","article-title":"Optimal Online Sensing Scheduling for Energy Harvesting Sensors With Infinite and Finite Batteries","volume":"34","author":"Yang J.","year":"2016","unstructured":"J. Yang, X. Wu, and J. Wu. 2016. Optimal Online Sensing Scheduling for Energy Harvesting Sensors With Infinite and Finite Batteries. IEEE JSAC 34, 5 (2016).","journal-title":"IEEE JSAC"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"G. Yao A. Bedewy and N.B. Shroff. 2022. Age-optimal low-power status update over time-correlated fading channel. IEEE Trans. on Mobile Computing (2022).","DOI":"10.1109\/ISIT45174.2021.9517880"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"R. Yates Y. Sun D.R. Brown S. Kaul E. Modiano and S. Ulukus. 2021. Age of Information: An Introduction and Survey. IEEE SAC 39 5 (2021)","DOI":"10.1109\/JSAC.2021.3065072"}],"event":{"name":"MSWiM '23: Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montreal Quebec Canada","acronym":"MSWiM '23"},"container-title":["Proceedings of the Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3616388.3617516","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3616388.3617516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:52:24Z","timestamp":1755906744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3616388.3617516"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":35,"alternative-id":["10.1145\/3616388.3617516","10.1145\/3616388"],"URL":"https:\/\/doi.org\/10.1145\/3616388.3617516","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]},"assertion":[{"value":"2023-10-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}