Open Access   Article Go Back

A Digital Currency for Computation offloading

Farheen Sultana1 , Mohd Tajuddin2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-6 , Page no. 135-139, Jun-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i6.135139

Online published on Jun 30, 2019

Copyright © Farheen Sultana, Mohd Tajuddin . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Farheen Sultana, Mohd Tajuddin, “A Digital Currency for Computation offloading,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.135-139, 2019.

MLA Style Citation: Farheen Sultana, Mohd Tajuddin "A Digital Currency for Computation offloading." International Journal of Computer Sciences and Engineering 7.6 (2019): 135-139.

APA Style Citation: Farheen Sultana, Mohd Tajuddin, (2019). A Digital Currency for Computation offloading. International Journal of Computer Sciences and Engineering, 7(6), 135-139.

BibTex Style Citation:
@article{Sultana_2019,
author = {Farheen Sultana, Mohd Tajuddin},
title = {A Digital Currency for Computation offloading},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {135-139},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4519},
doi = {https://doi.org/10.26438/ijcse/v7i6.135139}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.135139}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4519
TI - A Digital Currency for Computation offloading
T2 - International Journal of Computer Sciences and Engineering
AU - Farheen Sultana, Mohd Tajuddin
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 135-139
IS - 6
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
433 376 downloads 210 downloads
  
  
           

Abstract

In the latest years, the analyst researchers have proposed answers for assistance phones improve execution time and decrease imperativeness use by offloading overpowering regular employment to remote components, of late, moved by the promising eventual outcomes of message sending in shrewd frameworks, various pros have proposed methods for undertaking offloading towards near to phones, delivering the Device-to-Device offloading perspective. None of these techniques, in any case, offers any instrument that considers narrow-minded customers and, specifically, that moves and settles the contribution devices who spend their benefits. In this paper, we address these issues and propose the structure of a system that incorporates a motivator conspire and a notoriety instrument. Our proposition pursues the standards of the Hidden Market Design approach, which enables clients to determine the measure of assets they are eager to forfeit while taking an interest in the offloading framework. The hidden calculation that clients don’t know about depends on an honest closeout procedure and a distributed notoriety trade conspire.

Key-Words / Index Term

Cryptocurrency,Computation offloading,Device to Device

References

[1] L. Pu, X. Chen, J. Xu, and X. Fu, “D2D fogging: An energy-efficient and incentive-aware task offloading framework via network assisted d2d collaboration,” IEEE J. sel. A. commun., vol. 34, no. 12, pp. 3887–3901, Dec. 2016
[2] X. Chen, L. Jiao, W. Li, and X. Fu, “efficient multi-user computation offloading for mobile-edge cloud computing,” IEEE/ACM Trans. Network., vol. 24, no. 5, pp. 2795–2808, Oct. 2016.
[3] V. Cardellini, et al., “A game-theoretic approach to computation of- floading in mobile cloud computing,” Math. Program., vol. 157, no. 2, pp. 421–449, 2016.
[4] X. Chen, “Decentralized computation offloading game for mobile cloud computing,” IEEE Trans. Parallel Dist. System, vol. 26, no. 4, pp. 974–983, Apr. 2015
[5] S. Zhong, J. Chen, and Y. R. Yang, “Sprite: A simple, cheat-proof, credit-based system for mobile adhoc networks,” in Proc. IEEE Conf. Comput. Commun., 2003, vol. 3, pp. 1987–1997
[6] H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, “Smart: A secure multi- layer credit-based incentive scheme for delay-tolerant networks,” IEEE Trans. Veh. Technol., vol. 58, no. 8, pp. 4628–4639, Oct. 2009
[7] B. B. Chen and M. C. Chan, “Mobicent: A credit-based incentive system for disruption tolerant network,” in Proc. IEEE Int. Conf. Comput. Commun., 2010, pp. 1
[8] H. Wu, D. Huang, S. Bouzefrane, ”Making offloading decisions resistant to network unavailability for mobile cloud collaboration”, Proc. IEEE Collaboratecom, pp. 168-177, 2013.
[9] G. Iosifidis, L. Gao, J. Huang, L. Tassiulas, ”An iterative double auc- tion mechanism for mobile data offloading”, Proc. 11th Int. Symp. Model. Optim. Mobile Ad Hoc Wireless Netw., pp. 154-161, 2013.
[10] Jia, M., Cao, J., Yang, L.: Heuristic offloading of concurrent tasks for computation-intensive applications in mobile cloud computing. In: Proceedings of IEEE INFOCOM Workshops, pp. 352–357 (2014).
[11] Y. Huang, A. Tomasic, Y. An, C. Garrod, and A. Steinfeld,“Energy efficient and accuracy aware (e2a2) location services via crowdsourc- ing,” in Proc. IEEE 9th Int. Conf. Wireless Mobile Comput. Netw. Commun., Oct. 2013