À propos de cet article

Citez

1. Mukherjee, S., C. Beard. A Frameworkfor Ultra-Reliable Low Latency Mission-Critical Communication. – In: Proc. of Wireless Telecommunications Symposium (WTS’17), Chicago, IL, 2017, pp. 1-5.10.1109/WTS.2017.7943546Search in Google Scholar

2. Petrov, V., etal. Achieving End-to-End Reliabilityof Mission-Critical Trafficin Softwarized 5G Networks. – IEEE Journalon Selected Areasin Communications, Vol. 36, March 2018, No 3, pp. 485-501.10.1109/JSAC.2018.2815419Search in Google Scholar

3. Khoshnevisan, M., V. Joseph, P. Gupta, F. Meshkati, R. Prakash, P. Tinnakornsrisuphap. 5G Industrial Networkswith CoMPfor URLLCand Time Sensitive Network Architecture. – IEEE Journalon Selected Areasin Communications, Vol. 37, April 2019, No 4, pp. 947-959.10.1109/JSAC.2019.2898744Search in Google Scholar

4. Porambage, P., J. Okwuibe, M. Liyanage, M. Ylianttila, T. Taleb. Surveyon Multi-Access Edge Computingfor Internetof Things Realization. – IEEE Communications Surveys & Tutorials, Vol. 20, Fourthquarter 2018, No 4, pp. 2961-2991.10.1109/COMST.2018.2849509Search in Google Scholar

5. Bekkouche, O., T. Taleb, M. Bagaa. – UAVs Traffic Control Basedon Multi-Access Edge Computing. – In: Proc. of IEEE Global Communications Conference (GLOBECOM’18), Abu Dhabi, United Arab Emirates, 2018, pp. 1-6.10.1109/GLOCOM.2018.8647421Search in Google Scholar

6. Markakis, E. K., etal. Efficient Next Generation Emergency Communicationsover Multi-Access Edge Computing. – IEEE Communications Magazine, Vol. 55, November 2017, No 11, pp. 92-97.10.1109/MCOM.2017.1700345Search in Google Scholar

7. Yang, J., X. Ji. An Improved Inter-Domain Handover Scheme Basedon Bidirectional Cooperative Relay. – Cyberneticsand Information Technologies, Vol. 13, 2013, No 4, pp.127-138.10.2478/cait-2013-0059Search in Google Scholar

8. Kumar, S. A., P. Ilango, G. H. Dinesh. A Modified LEACH Protocolfor Increasing Lifetimeofthe Wireless Sensor Network. – Cyberneticsand Information Technologies, Vol. 16, 2016, No 3, pp. 154-164.10.1515/cait-2016-0040Search in Google Scholar

9. Sharma, S., etal. Secure Authentication Protocolfor 5G Enabled IoT Network. – In: Proc. of 5th International Conferenceon Parallel, Distributedand Grid Computing (PDGC’18), Solan Himachal Pradesh, India, 2018, pp. 621-626.10.1109/PDGC.2018.8745799Search in Google Scholar

10. Jover, R. P. The Current Stateof Affairsin 5G Securityandthe Remaining Security Challenges. – arXiv:1904.08394c2 [cs. CR\ 18 April 2019, pp. 1-8. https://arxiv.org/pdf/1904.08394.pdfSearch in Google Scholar

11. 3GPP TS 29.199-4 3rd Generation Partnership Project. Technical Specification Group Core Networkand Terminals. Open Service Access (OSA). Parlay X Web Services. Part 4: Short Messaging Release 9, V9.0.0, 2009.Search in Google Scholar

12. Guist, F., etal. MEC Deploymentsin 4Gand Evolutiontowards 5G. – ETSI White Paper, No 24, 2018.Search in Google Scholar

13. Kekki, S., etal. MECin 5G Networks. ETSI White Paper, No 28, 2018.Search in Google Scholar

14. ETSI GS MEC 003 Mobile Edge Computing (MEC). Frameworkand Reference Architecture, V1.1.1, 2016.Search in Google Scholar

15. 3GPP TR 22.824 Technical Specification Group Servicesand System Aspects. Feasibility Studyon 5G Message Servicefor MIoT. Stage 1, Release 16, V16.0.0, 2018.Search in Google Scholar

16. 3GPP TS 38.413 Technical Specification Group Radio Access Networks. NG-RAN. NG Application Protocol (NGAP), Release 18, V15.2.0, 2018.Search in Google Scholar

17. Zhang, K., T. Liu, D. Cheng. Observabilityof Finite Labeled Transition Systems. – IEEE Transactionson Automatic Control, Vol. 63, June 2018, No 6, pp. 1501-1512.10.1109/TAC.2017.2749380Search in Google Scholar

18. Beek, M. H., F. Damiani, S. Gnesi, F. Mazzanti, L. Paolini. Onthe Expressivenessof Modal Transition Systemswith Variability Constraints. – Scienceof Computer Programming, Vol. 169, 2019, pp. 1-17. 10.1016/j.scico.2018.09.006.10.1016/j.scico.2018.09.006Search in Google Scholar

19. Escrig, D. de F., J. J. A. Keiren, T. A. C. Willemse. Gamesfor Bisimulationsand Abstraction. – Local Methodsin Computer Science, Vol. 13, 2017, Issue 4:15, pp.1-40.Search in Google Scholar

20. Yang, X., J. Katoen, H. Lin, G. Liu, H. Wu. Branching Bisimulationand Concurrent Object Verification. – In: Proc. of 48th Annual IEEE/IFIP International Conferenceon Dependable Systemsand Networks (DSN), Luxembourg City, 2018, pp. 267-278.10.1109/DSN.2018.00037Search in Google Scholar

21. Gibson-Robinson, T., P. Armstrong, A. Boulgakov, A. W. Roscoe. FDR3: A Parallel Refinement Checkerfor CSP. – International Journalon Software Toolsfor Technology Transfer. Vol. 2, 2016, Issue 18, pp. 149-167.10.1007/s10009-015-0377-ySearch in Google Scholar

22. ETSI GS MEC-IEG 006 Mobile Edge Computing. Market Acceleration. MEC Metrics Best Practiceand Guidelines, V1.1.1, 2017.Search in Google Scholar

23. ITU-R M.2410-0 Minimum Requirements Relatedto Technical Performancefor IMT-2020 Radio Interface(S), 2017.Search in Google Scholar

24. Bertenyi, B., etal. 5G NR Radio Interface. – Journalof ICT Standardization, Vol. 6, May 2018, Issue 1&2, pp. 31-58.Search in Google Scholar

25. Cattaneo, G., F. Giust, C. Meani, D. Munaretto, P. Paglierani. Deploying CPU-Intensive Applicationson MECin NFV Systems: The Immersive Video Use Case. – Computers, Vol. 55, 2018, Issue 7, pp.1-20. DOI:10.3390/computers7040055.10.3390/computers7040055Open DOISearch in Google Scholar

26. Filippou, M. C., D. Sabella, V. Riccobene. Flexible MEC Service Consumptionthrough Edge Host Zoningin 5G Networks. – Cornell University, Computer Science, Distributed, Paralleland Cluster Computing, 2019, arXiv:1903.01794 [cs. DC].10.1109/WCNCW.2019.8902852Search in Google Scholar

27. Liu, J., G. Shou, Y. Liu, Y. Hu, Z. Guo. Performance Evaluationof Integrated Multi-Access Edge Computingand Fiber-Wireless Access Networks. – IEEE Access, Vol. 6, 2018, pp. 30269-30279.10.1109/ACCESS.2018.2833619Search in Google Scholar

eISSN:
1314-4081
Langue:
Anglais
Périodicité:
4 fois par an
Sujets de la revue:
Computer Sciences, Information Technology