Towards Modeling User Behavior in Multi-access Edge Computing
Abstract
References
Index Terms
- Towards Modeling User Behavior in Multi-access Edge Computing
Recommendations
AKMA for Secure Multi-access Edge Computing Mobility in 5G
Computational Science and Its Applications – ICCSA 2022 WorkshopsAbstractMulti-Access Edge Computing (MEC) extends the cloud computing capabilities to the edge of the 5G network. The current 3rd Generation Partnership Project (3GPP) and European Telecommunications Standard Institute (ETSI) specifications about MEC ...
Edge computing in the ePC: a reality check
SEC '17: Proceedings of the Second ACM/IEEE Symposium on Edge ComputingMobile Edge Computing (MEC) has received much attention from the research community in recent years. A significant part of the published work has studied the telecom-centric MEC architecture, which assumes that the computing resource is located at the ...
Towards end-to-end application slicing in Multi-access Edge Computing systems: Architecture discussion and proof-of-concept
AbstractNetwork slicing is one of the most critical 5G pillars. It allows for sharing a 5G infrastructure among different tenants leading to improved service customisation and increased operators’ revenues. Concurrently, introducing the Multi-...
Highlights- MEC and network slicing are two of the most critical 5G pillars.
- End-to-end ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
- Research
- Refereed limited
Conference
Acceptance Rates
Upcoming Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 74Total Downloads
- Downloads (Last 12 months)17
- Downloads (Last 6 weeks)3
Other Metrics
Citations
Cited By
View allView Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format