Computer Science ›› 2023, Vol. 50 ›› Issue (2): 13-22.doi: 10.11896/jsjkx.221100134
• Edge Intelligent Collaboration Technology and Frontier Applications • Previous Articles Next Articles
Yifei ZOU1, Senmao QI1, Cong'an XU2,3, Dongxiao YU1
CLC Number:
[1]CAI Z,SHI T.Distributed Query Processing in the Edge Assisted IoT Data Monitoring System[J].IEEE Internet of Things Journal,2021,8(16):12679-12693. [2]ZHU T,SHI T,LI J,et al.Task Scheduling in Deadline-Aware Mobile Edge Computing Systems[J].IEEE Internet of Things Journal,2019,6(3):4854-4866. [3]YU L,SHEN H,CAI Z,et al.Towards Bandwidth Guaranteefor Virtual Clusters under Demand Uncertainty in Multi-tenant Clouds[J].IEEE Transactions on Parallel and Distributed Systems,2018,29(2):450-465. [4]DENG S,ZHAO H,FANG W,et al.Edge intelligence:The confluence of edge computing and artificial intelligence[J].IEEE Internet of Things Journal,2020,7(8):7457-7469. [5]KAUR M,MUNJAL A.Data aggregation algorithms for wireless sensor network:a review[J].Ad Hoc Networks,2020,100:102083. [6]SUMALEE A,HO H W.Smarter and more connected:Futureintelligent transportation system[J].Iatss Research,2018,42(2):67-71. [7]RANDHAWA S,JAIN S.Dahda:dynamic adaptive hierarchical data aggregation for clustered wireless sensor networks[J].Wireless Personal Communications,2017,97(4):6369-6399. [8]GUPTA G P,MISRA M,GARG K.Towards scalable and load-balanced mobile agents-based data aggregation for wireless sensor networks[J].Computers & Electrical Engineering,2017,64:262-276. [9]EL FISSAOUI M,BENI-HSSANE A,SAADI M.Mobile agent protocol-based energy aware data aggregation for wireless sensor networks[C]//Procedia computer science.2017:25-32. [10][10] LEI Y,QIN H,CHEN W,et al.Secure Data AggregationScheme Based on Dynamic Multi-cluster Key Management Mo-del[J].Computer Science,2011,38(9):36-40. [11]YU D,ZOU Y,XU M,et al.Competitive age of information in dynamic iot networks[J].IEEE Internet of Things Journal,2020,8(20):15160-15169. [12]YU D,ZOU Y,ZHANG Y,et al.An exact implementation of the abstract mac layer via carrier sensing in dynamic networks[J].IEEE/ACM Transactions on Networking,2021,29(3):994-1007. [13]RICHA A,SCHEIDELER C,SCHMID S,et al.An efficient and fair mac protocol robust to reactive interference[J].IEEE/ACM Transactions on Networking,2012,21(3):760-771. [14]XU H,HUANG L,ZHANG Y,et al.Energy-efficient cooperative data aggregation for wireless sensor networks[J].Journal of Parallel and Distributed Computing,2010,70(9):953-961. [15]XIAO S,LI B,YUAN X.Maximizing precision for energy-efficient data aggregation in wireless sensor networks with lossy links[J].Ad Hoc Networks,2015,26:103-113. [16]NIKNAM S,DHILLON H S,REED J H.Federated learning for wireless communications:Motivation,opportunities,and challenges[J].IEEE Communications Magazine,2020,58(6):46-51. [17]LI F,YU D,YANG H,et al.Multi-armed-bandit-based spec-trum scheduling algorithms in wireless networks:A survey[J].IEEE Wireless Communications,2020,27(1):24-30. [18]CHEN S,WANG X,ZHOU P,et al.Heterogeneous semi-asynchronous federated learning in internet of things:A multi-armed bandit approach[J].IEEE Transactions on Emerging Topics in Computational Intelligence,2022,6(5):1113-1124. [19]XIA W,QUEK T Q,GUO K,et al.Multi-armed bandit-based client scheduling for federated learning[J].IEEE Transactions on Wireless Communications,2020,19(11):7108-7123. [20]DHAND G,TYAGI S.Data aggregation techniques in wsn:Survey[J].Procedia Computer Science,2016,92:378-384. [21]GHATE V V,VIJAYAKUMAR V.Machine learning for data aggregation in wsn:A survey[J].International Journal of Pure and Applied Mathematics,2018,118(24):1-12. [22]DONG H,WEI S,LIU X,et al.A Survey of Routing Methods for Wireless Sensor Networks Oriented to Environment Awareness[J].Computer Science,2018,45(1):14-22. [23]FENG H Y,ZHOU L,DING Q L.Data Aggregation Algorithm for Wireless Sensor Networks Based on Data Stream and Network Coding[J].Computer Science,2015,42(5):136-140. [24]XU D,LI T,LI Y,et al.Edge intelligence:Architectures,challenges,and applications[J].arXiv:2003.12172,2020. [25]ABBASI-DARESARI S,ABOUEI J.Toward cluster-basedweighted compressive data aggregation in wireless sensor networks[J].Ad Hoc Networks,2016,36:368-385. [26]RAZZAQ M,KWON G R,SHIN S.Energy efficient dijkstra-based weighted sum minimization routing protocol for wsn[C]//2018 Third International Conference on Fog and Mobile Edge Computing(FMEC).IEEE,2018:246-251. [27]ZHANG X,TAO L,YAN F,et al.Shortest-latency opportunistic routing in asynchronous wireless sensor networks with independent duty-cycling[J].IEEE Transactions on Mobile Computing,2019,19(3):711-723. [28]YANG L,ZOU Y,XU M,et al.Distributedconsensus for blockchains in internet-of-things networks[J].Tsinghua Science and Technology,2022,27(5):817-831. [29]ZOU Y,XU M,YU J,et al.A fast consensus forpermissioned wireless blockchains[J].IEEE Internet of Things Journal,2021. [30]CHEN Y,SUN X,JIN Y.Communication-efficient federateddeeplearning with layerwise asynchronous model update and temporallyweighted aggregation[J].IEEE Transactions on Neural Networks Andlearning Systems,2019,31(10):4229-4238. [31]MA Z,ZHAO M,CAI X,et al.Fast-convergent federated lear-ning with class-weighted aggregation[J].Journal of Systems Architecture,2021,117:102125-102131. [32]ALEXANDRU A B,PAPPAS G J.Private weighted sum aggregationfor distributed control systems[J].IFAC-Papers OnLine,2020,53(2):11081-11088. [33]ADACHI R,YAMASHITA Y,KOBAYASHI K.Distributedestimationbased on weighted data aggregation over delayed sensor networks[J].IFAC Journal of Systems and Control,2020,14:100109-100115. [34]KULESHOV V,PRECUP D.Algorithms for multi-armed bandit problems[J].arXiv:1402.6028,2014. |
[1] | WANG Xiangwei, HAN Rui, Chi Harold LIU. Hierarchical Memory Pool Based Edge Semi-supervised Continual Learning Method [J]. Computer Science, 2023, 50(2): 23-31. |
[2] | LI Xiaohuan, CHEN Bitao, KANG Jiawen, YE Jin. Coalition Game-assisted Joint Resource Optimization for Digital Twin-assisted Edge Intelligence [J]. Computer Science, 2023, 50(2): 42-49. |
[3] | LIU Xing-guang, ZHOU Li, LIU Yan, ZHANG Xiao-ying, TAN Xiang, WEI Ji-bo. Construction and Distribution Method of REM Based on Edge Intelligence [J]. Computer Science, 2022, 49(9): 236-241. |
[4] | LIN Bao-ling, JIA Ri-heng, LIN Fei-long, ZHENG Zhong-long, LI Ming-lu. Multi-armed Bandit Model Based on Time-variant Budgets [J]. Computer Science, 2022, 49(11A): 210800212-6. |
[5] | HU Zhao-xia, HU Hai-zhou, JIANG Cong-fengand WAN Jian. Workload Characteristics Based Performance Optimization for Edge Intelligence [J]. Computer Science, 2022, 49(11): 266-276. |
[6] | KONG Fang, LI Qi-zhi, LI Shuai. Survey on Online Influence Maximization [J]. Computer Science, 2020, 47(5): 7-13. |
[7] | SHI Jing, ZHENG Jia-li, YUAN Yuan, WANG Zhe, LI Li. RFID Multi-reader Channel Resources Allocation Algorithm Based on Whittle Index [J]. Computer Science, 2019, 46(10): 122-127. |
[8] | LI Jun-fan, LIAO Shi-zhong. Adversarial Multi-armed Bandit Model with Online Kernel Selection [J]. Computer Science, 2019, 46(1): 57-63. |
|