id author title date pages extension mime words sentences flesch summary cache txt work_jhs2l6kn55h5fbtcefmjli5asy Luo Pei A Study of Edge Computing Offloading Based on Security 2020 6 .pdf application/pdf 3618 447 61 A Study of Edge Computing Offloading Based on Security study a mobile edge computing model based on energy constraint, focus on an edge computing offload scheme based of user equipments during computing offload in the edge In mobile edge computing (MEC) systems, be achieved by offloading compute tasks to a wellresourced edge cloud. optimize the energy consumption of the execution task, designs a secure computational offloading method, the compute tasks of the user terminal to the cloud service, Performing computational offload tasks in MEC not offload in mobile edge computing, which has great Security-based mobile edge computing network architecture offloads the task to the edge server, =0 denotes during the detection of offloading computational tasks, In the security-based computing offload scenario, scheme than for an optimized energy-based offload Security-based computing offload Mobile-Edge Computing with Energy Harvesting Devices[J]. Offloading for Mobile-Edge Cloud Computing[J].IEEE/ACM Offload delay based on optimized energy consumption ./cache/work_jhs2l6kn55h5fbtcefmjli5asy.pdf ./txt/work_jhs2l6kn55h5fbtcefmjli5asy.txt