This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

A Risk-Sensitive Task Offloading Strategy for Edge Computing in Industrial Internet of Things

X.H\fnmXiaoyu Hao    R.Z\fnmRuohai Zhao    T.Y.\fnmTao Yang    Y.H.\fnmYulin Hu    B.H\fnmBo Hu    Y.Q\fnmYuhe Qiu \orgdivDepartment of Electronics Engineering, \orgnameFudan University, \cityShanghai, \postcode200433, \cnyChina \orgdivKey Laboratory of EMW Information (MoE), \orgnameFudan University, \cityShanghai, \postcode200433, \cnyChina \orgdivISEK Research Group, \orgnameRWTH Aachen University, \cityAachen, \cnyGermany \orgdivChina Mobile (Chengdu), \orgnameInformation & Telecommunication Technology Co., Ltd., \cityChengdu, \cnyChina
Abstract

Edge computing has become one of the key enablers for ultra-reliable and low-latency communications in the industrial Internet of Things in the fifth generation communication systems, and is also a promising technology in the future sixth generation communication systems. In this work, we consider the application of edge computing to smart factories for mission-critical task offloading through wireless links. In such scenarios, although high end-to-end delays from the generation to completion of tasks happen with low probability, they may incur severe casualties and property loss, and should be seriously treated. Inspired by the risk management theory widely used in finance, we adopt the Conditional Value at Risk to capture the tail of the delay distribution. An upper bound of the Conditional Value at Risk is derived through analysis of the queues both at the devices and the edge computing servers. We aim to find out the optimal offloading policy taking into consideration both the average and the worst case delay performance of the system. Given that the formulated optimization problem is a non-convex mixed integer non-linear programming problem, a decomposition into sub-problems is performed and a two-stage heuristic algorithm is proposed. Simulation results validate our analysis and indicate that the proposed algorithm can reduce the risk in both the queuing and end-to-end delay.

Ultra-reliable and low-latency communications, Edge computing, Industrial Internet of Things, Risk management theory, Conditional Value at Risk,
keywords:
\startlocaldefs\endlocaldefs
{fmbox}\dochead

Research

{abstractbox}

1 Introduction

Intelligent factory automation is one of the typical applications envisioned in ultra-reliable and low-latency communications (URLLC) scenarios in the fifth generation (5G) and the coming sixth generation (6G) communications [1, 2]. In future smart factories, machines and sensors are seamlessly connected with each other through wireless links to conduct production tasks corporately. During the manufacturing process, a great number of operations of the machines and robots require complex control algorithms and intense data computation, such as travelling across zones to identify and pick up the objects and controlling the robotic arms to assemble components within a precise position alignment [3]. The limited built-in computing resources are not sufficient for the stringent latency requirements, so the tasks have to be offloaded to servers for processing [4]. Conventionally, the large volume of data generated at the local devices is uploaded to the cloud computing servers [5]. However, since the cloud computing servers are usually deployed remotely, the large roundtrip transmission latency as well as the possible network congestion makes it hard to meet the stringent end-to-end delay requirements of the actuators and control units in the IIoT system. To overcome these difficulties, edge computing has emerged, where the servers are placed at the edge of the network to achieve a much lower transmission and processing latency [6].

There have been literatures focusing on improving the service efficiency of the edge computing systems [7, 8, 9, 10, 11]. The authors in [7] adopt the Markov decision process (MDP) to minimize the average delay of a mobile edge computing system by deciding whether to compute locally or offload the tasks to the edge server. In [8], the authors define a delay-based Lyapunov function instead of the queue length-based one, and minimize the average delay by optimizing resource scheduling under the Lyapunov optimization framework. Three-tier multi-server mobile computing networks are investigated in [9], where a cooperative task offloading strategy is proposed based on the Alternating Direction Method of Multipliers (ADMM). In [10], an adaptive learning-based task offloading algorithm is proposed to minimize the average delay for vehicle edge computing systems. Most relatively, [11] integrates the fog computing to the cloud-based industrial Internet of Things (IIoT), where the task offloading, transmission and computing resource allocation schemes are jointly optimized to reduce the service response latency in the unreliable communication environment.

The aforementioned works have only focused on the average delay performance, neglecting the worst case performance of the edge computing system. However, in the IIoT systems, the probability of an intense delay jitter usually matters much more than the average delay, since when the delay exceeds a certain threshold, severe accidents may incur such as the deadlock of the manufacture process, the damage to the machines and even casualties. Therefore, in such scenarios, not only the average delay performance, but also the potential hazard, i.e. the risk behind the tail distribution of the delay, should be carefully investigated. There have been some preliminary works to deal with the embedded risks in the edge computing systems [12, 13, 14]. In [12], the tail distribution of the task queue under a probability constraint imposed on the excess value is characterized by the extreme value theory [15], and an offloading strategy is designed to minimize the energy consumption. The authors of [13] also apply the extreme value theory to the edge computing systems, in order to investigate the extreme event of queue length violation in the computation phase. Besides, in [14], the authors focus on a vehicular edge computing network where vehicles either fetch images from cameras or acquire synthesized images from an edge computing server. A risk-sensitive learning [16] based task fetching and offloading strategy is proposed to minimize the risk behind the end-to-end delay.

Different from the works mentioned above, we introduce the risk management theory [17], widely used in the field of finance, to the edge computing system in consideration of the uncertainty of the wireless channels. Value at risk (VaR) and Conditional Value at Risk (CVaR) are the two widely used tools to characterize risks. While VaR takes the Gaussian distribution as assumption and lacks convexity and sub-additivity, which makes it inapplicable in many cases, CVaR is a coherent risk measure of any type of probability distribution and is much easier to handle in practice. Therefore, CVaR is employed in this work to model the risk of the task completion delay in the considered edge computing-assisted IIoT system. We aim to minimize both the average delay and the CVaR by jointly designing the offloading and computing resource allocation strategy. The main contributions of this work are summarized as follows:

  • We focus on the hazard incurred by the intense delay jitter in the edge computing-assisted IIoT scenario and introduce the risk management theory to the design of the offloading and computation resource allocation strategy.

  • A cascade queuing model is constructed to describe the end-to-end delay property of the system. Due to the uncertainty of the wireless channel, the transmission time follows a general distribution, which makes the queuing model hard to analyze. By exploring the queuing theory and the risk management theory, we provide an upper bound for both the average end-to-end delay and the CVaR.

  • A low-complexity risk-sensitive task offloading strategy is proposed, where both the average performance and the risk with respect to the end-to-end delay are optimized simultaneously. The computation complexity of each procedure of the proposed algorithm is analyzed in details. Simulations under the practical wireless environment in the automated factory validate the effectiveness of the proposed strategy in controlling the risk behind the intense delay jitter.

The remainder of this paper is organized as follows. We introduce the system model and analyze both the average delay and the CVaR in Section 2. In Section 3, we formulate the offloading and computation resource allocation problem and propose a low-complexity heuristic algorithm. In Section 4, numerical results are reported with discussions. Finally, Section 5 concludes the paper.

2 System model

2.1 Edge computing system

As shown in Fig. 1, we consider an edge computing-assisted IIoT system that consists of a set of ={1,2,,M}\mathcal{M}=\{1,2,\cdots,M\} IIoT devices and a set of 𝒩={1,2,,N}\mathcal{N}=\{1,2,\cdots,N\} edge computing servers (ECS). Each IIoT device ii\in\mathcal{M} randomly generates tasks of identical size of did_{i} bits, and we assume the task arrival process follows the Possion distribution with average arrival rate λi\lambda_{i}. We denote by ωi\omega_{i} the computation intensity of the task of device ii [18], i.e. the number of CPU cycles required to process per bit data. Then, the total CPU cycles needed for a task of device ii, denoted by cic_{i}, can be calculated as ci=ωidic_{i}=\omega_{i}d_{i}.

[width=3.3in]fig1.pdf

Figure 1: System model

Owing to the insufficiency of computation capability, the IIoT devices offload their tasks to the ECSs through wireless links. Each ECS j𝒩j\in\mathcal{N} is equipped with a CPU of NjN_{j} cores, which can work simultaneously and independently. We assume that the tasks of a device can only be offloaded to one ECS, while each core only processes the tasks from the same device, which means a ECS can receive tasks from multiple devices as long as the number of devices it serves doesn’t exceed the number of the CPU cores [12]. Let 𝐗M×N=[xij]\mathbf{X}_{M\times N}=\left[x_{ij}\right] as the offloading matrix, where xij,i𝐌,j𝐍x_{ij},i\in\mathbf{M},j\in\mathbf{N} is defined as follows:

xij={1,device i offloads its tasks to ECS j,0,otherwise.x_{ij}=\begin{cases}1\ ,&\text{device $i$ offloads its tasks to ECS $j$,}\\ 0\ ,&\text{otherwise.}\end{cases} (1)

Under this definition, we can redescribe the offloading scheme in the considered system mathematically as j=1Nxij=1\sum_{j=1}^{N}{x_{ij}=1} and i=1MxijNj\sum_{i=1}^{M}{x_{ij}\leq N_{j}} for i𝐌,j𝐍\forall i\in\mathbf{M},\forall j\in\mathbf{N}.

Due to the massive deployment of devices in the complex industrial environment, it’s impractical to obtain the instantaneous channel state information (CSI) accurately and timely. Therefore, in this work, we design a task offloading strategy based on statistics of the wireless links, i.e. the distribution of the channel gain. We assume blocking-fading channels such that the channel gain remains unchanged during the execution of one task and varies independently between two executions following an identical distribution, which is known a priori. Denote by gijg_{ij} the channel gain from device ii to ECS jj, the transmission rate can be expressed as follows:

Rij=Blog2(1+gijpiN0Φij),R_{ij}=B\log_{2}{(1+\frac{g_{ij}p_{i}}{N_{0}\Phi_{ij}})}, (2)

where BB is the bandwidth, N0N_{0} is the noise power, pip_{i} is the transmit power of device ii and Φij\Phi_{ij} is the path loss from device ii to ECS jj. Without loss of generality, we assume that the noise power at each ECS is identical, and each IIoT device has an orthogonal channel with the same bandwidth BB.

2.2 Queuing model

In the considered edge computing-assisted IIoT system, there are two kinds of queues: the queue at each device and the queue at each ECS, as depicted in Fig. 2. Without loss of generality, we assume that device ii offloads its tasks to ECS jj, and denote by QijDQ^{D}_{ij} the queue formed at the device ii. The arrival process of QijDQ^{D}_{ij} follows the Poisson process, and the departure process is dependent on the transmission delay denoted by tijDt^{D}_{ij}, which is given by

tijD=diRij=diBlog2(1+gijpiN0Φij).t^{D}_{ij}=\frac{d_{i}}{R_{ij}}=\frac{d_{i}}{B\log_{2}{(1+\frac{g_{ij}p_{i}}{N_{0}\Phi_{ij}})}}. (3)

Therefore, QiDQ^{D}_{i} follows the M/G/1 model.

[width=3.3in]fig2.pdf

Figure 2: Queuing model

As for an ECS, tasks from each device connected to it form an independent queue. Denote by QijSQ^{S}_{ij} the queue of tasks offloaded from device ii to ECS jj, then the arrival process of QijSQ^{S}_{ij} is the same as the departure process of QijDQ^{D}_{ij}. We denote by the fijf_{ij} the computation frequency allocated to device ii by ECS jj, then the computation delay denoted by tijSt^{S}_{ij}, i.e. the time required to complete a task of device ii, is calculated as tijS=ci/fijt^{S}_{ij}={c_{i}}/{f_{ij}}. As a result, the service time of a task follows a deterministic distribution and thus QijSQ^{S}_{ij} follows the G/D/1 model.

Based on the queuing analysis, when device ii offloads its tasks to ECS jj, the total delay denoted by tijt_{ij} is given by

tij=WijD+tijD+WijS+tijS,t_{ij}=W^{D}_{ij}+t^{D}_{ij}+W^{S}_{ij}+t^{S}_{ij}, (4)

where WijDW^{D}_{ij} and WijSW^{S}_{ij} are the queuing delay at the device ii and the ECS jj, respectively. We ’ll analyse both the average performance and the CVaR of the total delay in the following.

2.3 Average delay

According to (4), the average delay can be calculated as follows

E[tij]=E[WijD]+E[tijD]+E[WijS]+E[tijS].E[t_{ij}]=E[W^{D}_{ij}]+E[t^{D}_{ij}]+E[W^{S}_{ij}]+E[t^{S}_{ij}]. (5)

As for the queuing delay at device ii, we denote by μij\mu_{ij} the service rate of QijDQ^{D}_{ij}, which can be calculated as the reciprocal of the average transmission time, i.e.

μij=1E[tijD]=diE[Rij],\mu_{ij}=\frac{1}{E[t^{D}_{ij}]}=\frac{d_{i}}{E[R_{ij}]}, (6)

where the expectation is taken over the probability distribution of the channel gain. According to [19], the average queuing delay at device ii can be expressed as follows

E[WijD]=λi2μij2(1ρij),E[W^{D}_{ij}]=\frac{\lambda_{i}}{2\mu^{2}_{ij}(1-\rho_{ij})}, (7)

where ρij=λi/μij\rho_{ij}=\lambda_{i}/\mu_{ij}.

To analyze the queuing delay in the G/D/1 queuing model of QijSQ^{S}_{ij}, we first give the following lemma [20].

Lemma 1.

In the G/G/1 queuing model, let λ\lambda, μ\mu and WW be the arrival rate, service rate and queuing delay, respectively, then an upper bound of the average queuing delay is given by

E[W]λ(σa2+σb2)2(1ρ),E[W]\leq\frac{\lambda({\sigma}^{2}_{a}+{\sigma}^{2}_{b})}{2(1-\rho)}, (8)

where ρ=λ/μ\rho=\lambda/\mu, σa2\sigma^{2}_{a} is the variance of the inter-arrival time, and σb2\sigma^{2}_{b} is the variance of the service time.

According to Lemma 1, we obtain the following theorem characterizing the upper bound of the average queuing delay at a ECS.

Theorem 1.

When device ii offloads its tasks to ECS jj, an upper bound of the average queuing delay at ECS jj is given by

E[WijS]λijSσijS22(1ρijS),E[W^{S}_{ij}]\leq\frac{\lambda^{S}_{ij}{\sigma^{S}_{ij}}^{2}}{2(1-\rho^{S}_{ij})}, (9)

where λijS\lambda^{S}_{ij} is the arrival rate of QijSQ^{S}_{ij}, ρijS=λijS/μij\rho^{S}_{ij}=\lambda^{S}_{ij}/\mu_{ij} is the traffic intensity and σijS2{\sigma^{S}_{ij}}^{2} is the variance of the arrival interval of tasks offloaded from device ii to ECS jj.

Proof.

G/D/1 model can be seen as a special case of G/G/1 model with the service time following a deterministic distribution, the variance of which is zero. By substituting λ=λijS\lambda=\lambda^{S}_{ij}, σa2=σijS2\sigma^{2}_{a}={\sigma^{S}_{ij}}^{2}, σb2=0\sigma^{2}_{b}=0 and ρ=ρijS\rho=\rho^{S}_{ij} into (8), we get (9) and Theorem 1 is proved. ∎

Note that, due to the cascaded structure between QijDQ^{D}_{ij} and QijSQ^{S}_{ij}, the arrival rate λijS\lambda^{S}_{ij} of QijSQ^{S}_{ij} is equal to the departure rate of QijDQ^{D}_{ij}, which can be evaluated from the analysis of the inter-departure time in [21]. Similarly, the variance of the inter-arrival time of QijSQ^{S}_{ij}, i.e. σijS2{\sigma^{S}_{ij}}^{2}, can be derived from the variance of the inter-departure time of QijDQ^{D}_{ij} as in [22].

Finally, combining (5), (6) and (9), the upper bound of the average total delay can be obtained in the following corollary.

Corollary 1.

When device ii offloads its tasks to ECS jj, an upper bound of the average total delay E[tij]E[t_{ij}] is given by

E[tij]λi2μij2(1ρij)+1μij+λijSσijS22(1ρijS)+cifij.E[t_{ij}]\leq\frac{\lambda_{i}}{2\mu^{2}_{ij}(1-\rho_{ij})}+\frac{1}{\mu_{ij}}+\frac{\lambda^{S}_{ij}{\sigma^{S}_{ij}}^{2}}{2(1-\rho^{S}_{ij})}+\frac{c_{i}}{f_{ij}}. (10)

Since each IIoT device offloads its tasks to only one ECS, for each device ii the task completion time denoted by tit_{i} can be expressed as ti=j=1Nxijtijt_{i}=\sum^{N}_{j=1}{x_{ij}t_{ij}}, and correspondingly an upper bound of the average total delay of device ii based on (10) is given by

E[ti]=j=1NxijE[tij]E[ti],E[t_{i}]=\sum^{N}_{j=1}{x_{ij}E[t_{ij}]}\leq E[t_{i}]^{\ast}, (11)

where

E[ti]=j=1Nxij(λi2μij2(1ρij)+1μij+λijSσijS22(1ρijS)+cifij).E[t_{i}]^{\ast}=\sum^{N}_{j=1}{x_{ij}\left(\frac{\lambda_{i}}{2\mu^{2}_{ij}(1-\rho_{ij})}+\frac{1}{\mu_{ij}}+\frac{\lambda^{S}_{ij}{\sigma^{S}_{ij}}^{2}}{2(1-\rho^{S}_{ij})}+\frac{c_{i}}{f_{ij}}\right)}. (12)

2.4 Risk metric for delay

Risk in the considered edge computing-assisted system is mainly reflected in the high latency happened with low probability. Specifically, we introduce CVaR as a measure of risk to characterize the tail distribution of the delay. Before we formally define CVaR, we first give the definition of VaR [23].

Definition 1.

For a random variable XX and a confidence level α(0,1)\alpha\in(0,1), the α\alpha-VaR of XX is the α\alpha-percentile of the distribution of XX, which can be expressed mathematically as follows

VaRα(X)=infγ{γ:P(X>γ)α}.{\rm VaR}_{\alpha}(X)=\inf_{\gamma}{\{\gamma:P(X>\gamma)\leq\alpha\}}. (13)

The CVaR measures the expected loss in the right tail given a particular threshold has been crossed, and can also be considered as the average of potential loss that exceed the VaR. The definition of CVaR is given as follows [24].

Definition 2.

For a random variable XX and a confidence level α(0,1)\alpha\in(0,1), the α\alpha-CVaR of XX is given by

CVaRα(X)\displaystyle{\rm CVaR}_{\alpha}(X) =E[X|X>VaRα(X)]\displaystyle=E[X|X>{\rm VaR}_{\alpha}(X)]
=11αα1VaRθ(X)𝑑θ.\displaystyle=\frac{1}{1-\alpha}\int_{\alpha}^{1}{{\rm VaR}_{\theta}(X)d\theta}. (14)

To characterize the CVaR of the total delay, we first analyze the CVaR of each part of the total delay in (4). Recall that the service process of the queue at the device follows general distribution, so it is quite difficult to directly characterize the probability distribution of the waiting time. However, in the considered IIoT scenario, it is reasonable to take the heavy traffic assumption. According to [25], the cumulative distribution function (CDF) of WijDW_{ij}^{D} can be approximated as

F(WijD)1exp[2(1ρij)λiVijWijD],F(W_{ij}^{D})\approx 1-{\rm exp}\left[{-\frac{2(1-\rho_{ij})}{\lambda_{i}V_{ij}}W_{ij}^{D}}\right], (15)

where VijV_{ij} is the variance of the service time of QijDQ_{ij}^{D}, i.e. the transmission time of a task. Based on (15), the CVaR of WijDW_{ij}^{D} can be evaluated in the following theorem.

Theorem 2.

For a confidence level α(0,1)\alpha\in(0,1), the α\alpha-CVaR of WijDW_{ij}^{D} can be expressed as

CVaRα(WijD)=λiVij2(1ρij)[1ln(1α)].{\rm CVaR}_{\alpha}(W_{ij}^{D})=\frac{\lambda_{i}V_{ij}}{2(1-\rho_{ij})}[1-\ln{(1-\alpha)}]. (16)
Proof.

According to the definition of VaR in Definition 1, we can obtain that

VaRα(WijD)\displaystyle{\rm VaR}_{\alpha}(W_{ij}^{D}) =infγ{γ:e2(1ρij)λiVijγα}\displaystyle=\inf_{\gamma}{\{\gamma:e^{-\frac{2(1-\rho_{ij})}{\lambda_{i}V_{ij}}\gamma}\leq\alpha\}}
=λiVij2(1ρij)ln(1α).\displaystyle=\frac{-\lambda_{i}V_{ij}}{2(1-\rho_{ij})}\ln{(1-\alpha)}. (17)

By substituting (2.4) to (2), the CVaR of WijDW_{ij}^{D} can be calculated as follows.

CVaRα(WijD)\displaystyle{\rm CVaR}_{\alpha}(W_{ij}^{D}) =11αα1λiVij2(1ρij)ln(1θ)𝑑θ\displaystyle=\frac{1}{1-\alpha}\int_{\alpha}^{1}{\frac{-\lambda_{i}V_{ij}}{2(1-\rho_{ij})}\ln{(1-\theta)}d\theta}
=λiVij2(1ρij)[1ln(1α)].\displaystyle=\frac{\lambda_{i}V_{ij}}{2(1-\rho_{ij})}[1-\ln{(1-\alpha)}]. (18)

As for the transmission delay tijDt_{ij}^{D}, we define a auxiliary function

ϕα(tijD,γ):=γ+11+αE[(tijDγ)+],\phi_{\alpha}(t_{ij}^{D},\gamma):=\gamma+\frac{1}{1+\alpha}E[{(t_{ij}^{D}-\gamma)}^{+}], (19)

where (x)+=max(0,x)(x)^{+}=\max{(0,x)} and the expectation is taken over the distribution of the channel gain. According to [26], the CVaR of tijDt_{ij}^{D} can finally be calculated as

CVaRα(tijD)\displaystyle{\rm CVaR}_{\alpha}(t_{ij}^{D}) =minγϕα(tijD,γ)\displaystyle=\min_{\gamma\in\mathcal{R}}{\phi_{\alpha}(t_{ij}^{D},\gamma)}
=minγ{γ+11+αE[(tijDγ)+]}\displaystyle=\min_{\gamma\in\mathcal{R}}{\{\gamma+\frac{1}{1+\alpha}E[{(t_{ij}^{D}-\gamma)}^{+}]\}} (20)

Now we turn to the queue at the ECS. Similar to (15), the CDF of WijSW_{ij}^{S} can be approximated as

F(WijD)1exp[2(1ρijS)λijSσijS2WijS],F(W_{ij}^{D})\approx 1-{\rm exp}\left[{-\frac{2(1-\rho_{ij}^{S})}{\lambda_{ij}^{S}{\sigma^{S}_{ij}}^{2}}W_{ij}^{S}}\right], (21)

and thus the CVaR of the queuing delay at the ECS can be evaluated in the following theorem.

Theorem 3.

For a confidence level α(0,1)\alpha\in(0,1), the α\alpha-CVaR of WijSW_{ij}^{S} can be expressed as

CVaRα(WijS)=λijSσijS22(1ρijS)[1ln(1α)].{\rm CVaR}_{\alpha}(W_{ij}^{S})=\frac{\lambda_{ij}^{S}{\sigma^{S}_{ij}}^{2}}{2(1-\rho_{ij}^{S})}[1-\ln{(1-\alpha)}]. (22)

The proof of Theorem 3 is similar to Theorem 2 and is omitted here for brevity.

Since we assume constant computing capability at the ECS, the CVaR of the service time of QijSQ_{ij}^{S} is at the same value as itself, i.e.

CVaRα(tijS)=cifij.{\rm CVaR}_{\alpha}(t_{ij}^{S})=\frac{c_{i}}{f_{ij}}. (23)

With the CVaR of each part of the delay involved in the task offloading, we provide an upper bound of the CVaR of the total delay in the following theorem based on the convexity and sub-additivity [27].

Theorem 4.

For a confidence level α(0,1)\alpha\in(0,1), an upper bound of the α\alpha-CVaR of tit_{i} is given by

CVaRα(ti)CVaRα(ti),{\rm CVaR}_{\alpha}(t_{i})\leq{\rm CVaR}_{\alpha}(t_{i})^{\ast}, (24)

where

CVaRα(ti)=j=1Nxij[CVaRα(WijD)+CVaRα(tijD)+CVaRα(WijS)+CVaRα(tijS)].{\rm CVaR}_{\alpha}(t_{i})^{\ast}=\sum_{j=1}^{N}x_{ij}\left[{\rm CVaR}_{\alpha}(W_{ij}^{D})+{\rm CVaR}_{\alpha}(t_{ij}^{D})+{\rm CVaR}_{\alpha}(W_{ij}^{S})+{\rm CVaR}_{\alpha}(t_{ij}^{S})\right]. (25)
Proof.

According to the convexity, the α\alpha-CVaR of tit_{i} satisfies the following Jensen inequality:

CVaRα(ti)=CVaRα(j=1Nxijtij)j=1NxijCVaRα(tij).{\rm CVaR}_{\alpha}(t_{i})={\rm CVaR}_{\alpha}(\sum_{j=1}^{N}{x_{ij}t_{ij}})\leq\sum_{j=1}^{N}{x_{ij}{\rm CVaR}_{\alpha}(t_{ij})}. (26)

Furthermore, based on (4) and the sub-additivity of the CVaR, we have the following inequality:

CVaRα(tij)CVaRα(WijD)+CVaRα(tijD)+CVaRα(WijS)+CVaRα(tijS).{\rm CVaR}_{\alpha}(t_{ij})\leq{\rm CVaR}_{\alpha}(W_{ij}^{D})+{\rm CVaR}_{\alpha}(t_{ij}^{D})+{\rm CVaR}_{\alpha}(W_{ij}^{S})+{\rm CVaR}_{\alpha}(t_{ij}^{S}). (27)

By combining (26) and (27), Theorem 4 is proved. ∎

3 Problem formulation and solution

3.1 Problem formulation

In the design of the edge computing-assisted IIoT system, not only the average latency but also risk behind the intense delay jitter should be carefully considered. Taking into account both the average delay performance and the risk, we set the objective of the task offloading problem as the weighted sum of the average delay and the CVaR, i.e. the mean-risk sum. We have shown that obtaining an explicit expression of both the two terms is often cumbersome, especially for the complex wireless environment in the automated factories. Therefore, the two upper bounds of the average total delay and the corresponding CVaR derived in the previous section are adopted instead. Furthermore, in the considered mission-critical IIoT scenario, the performance of the whole system is usually determined by the device with the worst performance. As a result, we aim to minimize the maximum mean-risk sum among all the devices, which can be described as the following optimization problem:

min𝐗,𝐟maxi\displaystyle\min_{\mathbf{X},\mathbf{f}}\max_{i\in\mathcal{M}}\quad E[ti]+βCVaRα(ti)\displaystyle E[t_{i}]^{\ast}+\beta{\rm CVaR}_{\alpha}(t_{i})^{\ast} (28)
s.t. xij{0,1},i,j𝒩,\displaystyle x_{ij}\in\{0,1\},\forall i\in\mathcal{M},\forall j\in\mathcal{N}, (28a)
j=1Nxij=1,i,\displaystyle\sum_{j=1}^{N}{x_{ij}}=1,\forall i\in\mathcal{M}, (28b)
i=1MxijNj,j𝒩,\displaystyle\sum_{i=1}^{M}{x_{ij}}\leq N_{j},\forall j\in\mathcal{N}, (28c)
i=1MfijFj,j𝒩,\displaystyle\sum_{i=1}^{M}{f_{ij}\leq F_{j}},\forall j\in\mathcal{N}, (28d)

where 𝐟=[fij],i,j𝒩\mathbf{f}=[f_{ij}],i\in\mathcal{M},j\in\mathcal{N} is the computation frequency allocation matrix, β(0,1)\beta\in(0,1) is the weight of the CVaR, also called the risk-sensitive parameter, and FjF_{j} is the overall computation frequency of ECS jj. Constraint (28b) is used to guarantee that the tasks generated by the device can only be offloaded to one ECS. Constraint (28c) and (28d) indicate that the number of devices served by a ECS should not exceed the number of its CPU cores, and the sum of the computation frequency allocated to these devices should not exceed its overall computation frequency. Substituting (12), (2.4), (2.4), (22) and (23) to (28), we find that the optimization problem is a non-convex mixed integer non-linear problem (MINLP), which is NP-hard [28]. To reduce the computation overhead, we propose a heuristic algorithm, which will be described in details in the following subsection.

3.2 Problem solving

Recall that the CVaR of the queuing delay at the device in (2.4) is in the form of an minimization problem. Since the optimization variable γ\gamma in (2.4) is independent of the optimization variables 𝐗\mathbf{X} and 𝐟\mathbf{f} in (28), we can solve (2.4) first and substitute its optimal solution to (28) for the subsequent problem solving.

To solve (2.4), we introduce an auxiliary variable zij=(tijDγ)+z_{i}j=(t_{ij}^{D}-\gamma)^{+}, and problem (2.4) can be transformed to the following problem

minγ,zij\displaystyle\min_{\gamma\in\mathcal{R},z_{ij}}\quad γ+11+αE[zij]\displaystyle\gamma+\frac{1}{1+\alpha}E[z_{ij}] (29)
s.t. zijtijDγ,\displaystyle z_{ij}\geq t_{ij}^{D}-\gamma, (29a)
zij0.\displaystyle z_{ij}\geq 0. (29b)

Problem (29) is a stochastic optimization problem with the expectation taken over the channel gain gijg_{ij}. To approximate the expectation, we sample the probability distribution of gijg_{ij} [26], and a transformed problem is obtained as follows:

minγ,𝐳𝐢𝐣\displaystyle\min_{\gamma\in\mathcal{R},\mathbf{z_{ij}}}\quad γ+11+α1Kk=1Kzijk\displaystyle\gamma+\frac{1}{1+\alpha}\frac{1}{K}\sum_{k=1}^{K}z_{ij}^{k} (30)
s.t. zijktijDγ,k𝒦,\displaystyle z_{ij}^{k}\geq t_{ij}^{D}-\gamma,\forall k\in\mathcal{K}, (30a)
zijk0,k𝒦,\displaystyle z_{ij}^{k}\geq 0,\forall k\in\mathcal{K}, (30b)

where zijk,k𝒦={1,2,,K}z_{ij}^{k},k\in\mathcal{K}=\{1,2,\cdots,K\} are the samples of zijz_{ij}. Problem (30) is a linear optimization problem, the optimal solution of which, denoted by UijU_{ij}, can be obtained from the interior point method (IPM) [29]. There are K+1K+1 variables and 2K2K constraints in problem (30), so we can solve it at the time complexity of O(((3K+1)(K+1)2+(3K+1)1.5(K+1))δ)O(((3K+1)(K+1)^{2}+(3K+1)^{1.5}(K+1))\delta), where δ\delta is the number of decoded bits [30].

With all the derived average and CVaR terms, problem (28) can be reformulated as the following optimization problem:

min𝐗,𝐟maxi\displaystyle\min_{\mathbf{X},\mathbf{f}}\max_{i\in\mathcal{M}}\quad j=1Nxij{[λi2μij2(1ρij)+1μij+λijSσijS22(1ρijS)+cifij]+\displaystyle\sum_{j=1}^{N}x_{ij}\Biggl{\{}\biggl{[}\frac{\lambda_{i}}{2\mu^{2}_{ij}(1-\rho_{ij})}+\frac{1}{\mu_{ij}}+\frac{\lambda^{S}_{ij}{\sigma^{S}_{ij}}^{2}}{2(1-\rho^{S}_{ij})}+\frac{c_{i}}{f_{ij}}\biggr{]}+
β[[λijSσijS22(1ρijS)+λiVij2(1ρij)][1ln(1α)]+Uij+cifij]}\displaystyle\beta\biggl{[}\bigl{[}\frac{\lambda_{ij}^{S}{\sigma^{S}_{ij}}^{2}}{2(1-\rho_{ij}^{S})}+\frac{\lambda_{i}V_{ij}}{2(1-\rho_{ij})}\bigr{]}[1-\ln{(1-\alpha)}]+U_{ij}+\frac{c_{i}}{f_{ij}}\biggr{]}\Biggr{\}} (31)
s.t. (28a),(28b),(28c),(28d).\displaystyle{\rm(28a),(28b),(28c),(28d)}. (31a)

It is obvious that the objective function of problem (31) contains the term xij/fijx_{ij}/f_{ij}, and thus problem (31) is still a non-convex MINLP. In order to reduce the computational complexity, we decompose the original problem into two sub-problems. First, we consider the following problem:

min𝐗maxi\displaystyle\min_{\mathbf{X}}\max_{i\in\mathcal{M}}\quad j=1NxijVij\displaystyle\sum_{j=1}^{N}x_{ij}V_{ij} (32)
s.t. (28a),(28b),(28c).\displaystyle{\rm(28a),(28b),(28c)}. (32a)

where

Vij=λi2μij2(1ρij)+1μij+β[λiVij2(1ρij)[1ln(1α)]+Uij].V_{ij}=\frac{\lambda_{i}}{2\mu^{2}_{ij}(1-\rho_{ij})}+\frac{1}{\mu_{ij}}+\beta\biggl{[}\frac{\lambda_{i}V_{ij}}{2(1-\rho_{ij})}[1-\ln{(1-\alpha)}]+U_{ij}\biggr{]}. (33)

It is worthwhile to mention that problem (32) is a convex MINLP, which can generally be solved via an outer approximation algorithm or an extended cutting plane algorithm [31]. More specifically, problem (32) is in the form of a bottleneck generalized assignment problem [32], which can be solved through the algorithm proposed in [33] at the time complexity of O(MNlogN+θ(NM+N2))O(MN\log{N}+\theta(NM+N^{2})), where θ\theta is the number of bits required to encode maxi,jVij\max_{i,j}{V_{ij}}. After solving the optimal offloading matrix for problem (32) denoted by X=[xij],i,j𝒩X^{\ast}=[x_{ij}^{\ast}],i\in\mathcal{M},j\in\mathcal{N}, we substitute XX^{\ast} to (28), and the second sub-problem can be formulated as follows:

min𝐟maxi\displaystyle\min_{\mathbf{f}}\max_{i\in\mathcal{M}}\quad j=1Nxij{[λi2μij2(1ρij)+1μij+λijSσijS22(1ρijS)+cifij]+\displaystyle\sum_{j=1}^{N}x_{ij}^{\ast}\Biggl{\{}\biggl{[}\frac{\lambda_{i}}{2\mu^{2}_{ij}(1-\rho_{ij})}+\frac{1}{\mu_{ij}}+\frac{\lambda^{S}_{ij}{\sigma^{S}_{ij}}^{2}}{2(1-\rho^{S}_{ij})}+\frac{c_{i}}{f_{ij}}\biggr{]}+
β[[λijSσijS22(1ρijS)+λiVij2(1ρij)][1ln(1α)]+Uij+cifij]}\displaystyle\beta\biggl{[}\bigl{[}\frac{\lambda_{ij}^{S}{\sigma^{S}_{ij}}^{2}}{2(1-\rho_{ij}^{S})}+\frac{\lambda_{i}V_{ij}}{2(1-\rho_{ij})}\bigr{]}[1-\ln{(1-\alpha)}]+U_{ij}+\frac{c_{i}}{f_{ij}}\biggr{]}\Biggr{\}} (34)
s.t. (28d).\displaystyle{\rm(28d)}. (34a)

Problem (34) is a non-convex optimization problem. To transform it to a convex problem, we introduce an auxiliary variable 𝐆=[1/fij],i,j𝒩\mathbf{G}=[1/f_{ij}],i\in\mathcal{M},j\in\mathcal{N}, and an optimization problem equivalent to (34) is given by

min𝐆maxi\displaystyle\min_{\mathbf{G}}\max_{i\in\mathcal{M}}\quad j=1Nxij{[λi2μij2(1ρij)+1μij+λijSσijS22(1ρijS)+ciGij]+\displaystyle\sum_{j=1}^{N}x_{ij}^{\ast}\Biggl{\{}\biggl{[}\frac{\lambda_{i}}{2\mu^{2}_{ij}(1-\rho_{ij})}+\frac{1}{\mu_{ij}}+\frac{\lambda^{S}_{ij}{\sigma^{S}_{ij}}^{2}}{2(1-\rho^{S}_{ij})}+c_{i}G_{ij}\biggr{]}+
β[[λijSσijS22(1ρijS)+λiVij2(1ρij)][1ln(1α)]+Uij+ciGij]}\displaystyle\beta\biggl{[}\bigl{[}\frac{\lambda_{ij}^{S}{\sigma^{S}_{ij}}^{2}}{2(1-\rho_{ij}^{S})}+\frac{\lambda_{i}V_{ij}}{2(1-\rho_{ij})}\bigr{]}[1-\ln{(1-\alpha)}]+U_{ij}+c_{i}G_{ij}\biggr{]}\Biggr{\}} (35)
s.t. 1FjGij1xijλijSci,i,j𝒩,\displaystyle\frac{1}{F_{j}}\leq G_{ij}\leq\frac{1}{x_{ij}^{\ast}\lambda_{ij}^{S}c_{i}},\forall i\in\mathcal{M},\forall j\in\mathcal{N}, (35a)
i=1MxijGijFj,j𝒩.\displaystyle\sum_{i=1}^{M}{\frac{x_{ij}^{\ast}}{G_{ij}}}\leq F_{j},\forall j\in\mathcal{N}. (35b)

The right side of inequality (35a) is used to maintain the stability of the queue at the ECS. Although problem (35) is a convex optimization problem, the objective function is in the form of the pointwise maximum of MM mean-risk sums. To handle this, we optimize the epigraph of problem (35) and obtain the equivalent problem as follows:

min𝐆,T\displaystyle\min_{\mathbf{G},T}\quad T\displaystyle T\quad (36)
s.t. j=1Nxij{[λi2μij2(1ρij)+1μij+λijSσijS22(1ρijS)+ciGij]+\displaystyle\sum_{j=1}^{N}x_{ij}^{\ast}\Biggl{\{}\biggl{[}\frac{\lambda_{i}}{2\mu^{2}_{ij}(1-\rho_{ij})}+\frac{1}{\mu_{ij}}+\frac{\lambda^{S}_{ij}{\sigma^{S}_{ij}}^{2}}{2(1-\rho^{S}_{ij})}+c_{i}G_{ij}\biggr{]}+
β[[λijSσijS22(1ρijS)+λiVij2(1ρij)][1ln(1α)]+Uij+ciGij]}T,i,\displaystyle\beta\biggl{[}\bigl{[}\frac{\lambda_{ij}^{S}{\sigma^{S}_{ij}}^{2}}{2(1-\rho_{ij}^{S})}+\frac{\lambda_{i}V_{ij}}{2(1-\rho_{ij})}\bigr{]}[1-\ln{(1-\alpha)}]+U_{ij}+c_{i}G_{ij}\biggr{]}\Biggr{\}}\leq T,\forall i\in\mathcal{M}, (36a)
(35a),(35b).\displaystyle{\rm(35a),(35b)}. (36b)

Problem (36) is a convex non-linear optimization problem, which can be solved by various algorithms such as IPM. Constraint (36a), (35a) and (35b) consists of MM, i=1Mj=1Nxij\sum_{i=1}^{M}{\sum_{j=1}^{N}{x_{ij}^{\ast}}} and NN individual constraints, respectively. As a result, problem (36) has LM+N+i=1Mj=1NxijL\triangleq M+N+\sum_{i=1}^{M}{\sum_{j=1}^{N}{x_{ij}^{\ast}}} constraints in all. According to [34], we can find an ϵ\epsilon-optimal solution to problem (36) in O(κLlnLμ0ϵ)O(\kappa\sqrt{L}\ln{\frac{L\mu_{0}}{\epsilon}}) Newton iterations through the logarithmic barrier method [35], where κ\kappa is the self-concordance factor, μ0\mu_{0} is the initial barrier value and ϵ\epsilon is the accuracy parameter. Till now, both the offloading matrix 𝐗\mathbf{X} and the frequency allocation matrix 𝐟\mathbf{f} have been solved.

4 Results and discussion

In this section, we evaluate the proposed strategy through numerical results. We consider a typical use case in the edge computing-assisted IIoT system, i.e. the video-operated remote control use case, with a typical latency requirement of 10-100 ms and payload size of 15-150 kbytes [36]. In the simulation, we consider 8 IIoT devices offload their tasks to 2 ECSs. Without loss of generality, we set the data size to 0.5 Mbits, i.e. 62.5 kbytes, and the task computation intensity to 15 cycles/bit for each task of each device. Each ECS is equipped with a four-core CPU. The task arrival rate of each device, i.e. the parameter of the Poisson process, is set to be uniformly distributed in (10,30)(10,30). The bandwidth of each wireless channel is 10 MHz, and the transmission power, noise power at the receiver and the path loss are all set to be identical for each device at 30 dBm, 10910^{-9} W and 70 dB, respectively. To characterize the fading channel in the practical automated factory, we set the channel distribution as a mixture of Rayleigh and log-normal distribution, which has been confirmed by the measurements in the real industrial environment [37]. The parameter of the Rayleigh distribution is set to be uniformly distributed in (0.5,1)(0.5,1) for each IIoT-ECS pair, and correspondingly, the two parameters of the log-normal distribution are set to be uniformly distributed in (1,2)(1,2) and (0,4)(0,4) respectively. Finally, we set the confidence level to α=0.99\alpha=0.99.

Our proposed strategy considers both the queuing effect and the risk behind the total delay, and thus is denoted by queuing-based and risk-sensitive (Q-R) strategy in the following simulations. To evaluate the performance of the Q-R, we compare it with the following five strategies: i) the queuing-based and risk-sensitive optimal (Q-R-Opt) strategy, i.e. the globally optimal solution to problem (28); ii) the queuing-based and non-risk-sensitive (Q-NR) strategy, which considers the queuing effect but only optimizes the average delay performance, i.e. the weight of the CVaR is set to β=0\beta=0; iii) the queuing-based and non-risk-sensitive optimal (Q-NR-Opt) strategy, i.e. the globally optimal solution that corresponds to the Q-NR case; iv) the non-queuing-based and risk-sensitive (NQ-R) strategy, which takes into account both the average delay and the CVaR, but does not consider the queuing effect; v) the non-queuing-based and non-risk-sensitive (NQ-NR), which considers neither the queuing effect nor the risk. In the following simulations, we set the weight of the CVaR to β=2\beta=2 for risk-sensitive strategies.

[width=3.3in]fig3_revised

Figure 3: CCDF of the total delay

We first investigate the complementary cumulative distribution function (CCDF) of the total delay under the six offloading strategies, since the CVaR captures the tail information of the delay distribution. As presented in Fig. 3, for the probability of ultra-high delay, the curve of Q-R, Q-R-Opt and NQ-R are all lower than their corresponding non-risk-sensitive strategies. This implies that by adding the CVaR to the optimization objective, the risk of high delay can be greatly reduced. On the other hand, we can see that for any value of the total delay, the CCDF under NQ-R and NQ-NR is greater than that under Q-R, Q-R-Opt, Q-NR and Q-NR-Opt, which means the non-queuing strategies are more likely to arise a higher delay. This is reasonable, since the non-queuing strategies neglect the queuing effect in the strategy design, which leads to a higher queuing delay. Furthermore, the curve of Q-R is close to that of Q-R-Opt and has nearly the same trend, which indicates that the proposed algorithm achieves near-optimal performance with a great reduction in computation complexity.

[width=3.3in]fig4_revised

Figure 4: Average total delay versus the computation frequency

[width=3.3in]fig5_revised

Figure 5: 99th percentile of the total delay versus the computation frequency

In Fig. 4 and Fig. 5, we compare how the delay performance evolves with the computation frequency of the ECS under the six strategies. Specifically, Fig.4 investigates relationship between the average delay and the computation frequency, and Fig. 5 focus on the 99th percentile of the total delay. It can be seen that with the increasing computation frequency, the average total delay and the 99th percentile decreases for all the six strategies. The reason is that the higher the computation frequency, the more computation resources allocated to the IIoT devices and thus the lower the computation delay. Furthermore, note that the delay doesn’t descend much when computation frequency is relatively high. This is because for high computation frequency, both the computation delay and the queuing delay at the ECS is relatively low, and thus the total delay is mainly dependent on the queuing delay at the devices. We can also see that the queuing strategies outperforms the corresponding non-queuing strategies for both the average performance and the 99th percentile, which verifies the significance of the queuing analysis again. More importantly, the two figures verify the near-optimality of the proposed algorithm, and jointly indicate that the risk-sensitive strategies achieve nearly the same average total delay as the non-risk-sensitive ones, but greatly reduce the 99th percentile of the total delay by incorporating the risk to the design of offloading strategy. In other words, the intense delay jitter can be effectively controlled under the risk-sensitive strategies only at the price of very little degradation on the average performance.

[width=3.3in]fig6

Figure 6: Delay performance versus the task size where the computation frequency is 10 GHz

Finally, we investigate the effect of the task size on both the average delay and the 99th percentile under the Q-R and Q-NR strategies. As shown in Fig. 6, the 99th percentile is higher than the average total delay for both strategies, since the former characterize the worst case delay. With the increase of the task size, both the average delay and the 99th percentile increase under both strategies. This is due to the fact that a larger task size lead to the higher transmission and computation delay. Furthermore, the 99th percentile of Q-R is always lower than that of Q-NR, while the two curves of the average delay almost coincide with each other. Note that the average delay under the Q-NR strategy is the lower bound of that under the Q-R. This implies that Q-R achieves nearly the same average performance as the Q-NR while simultaneously improving the worst case performance with respect to the total delay.

5 Conclusions

In this work, we introduce the risk management theory to design of the edge computing-assisted IIoT system. We explore the queuing theory and the properties of the CVaR to capture the tail distribution of the end-to-end delay, and provide two upper bounds of the average total delay and the CVaR. A joint task offloading and computation resource allocation problem is formulated to simultaneously minimize the average total delay and the risk. Since the problem is a non-convex MINLP, we decompose it into two sub-problems and design a two-stage heuristic algorithm. The computation complexity of each procedure of the proposed algorithm has been analyzed. Finally, simulations are performed under the practical channel model in the automated factories, and the results verify that the proposed strategy can effectively control the risk of intense delay jitter while guaranteeing the average delay performance.

Acknowledgements

Not applicable

Funding

This work was supported by the Shanghai Municipal Natural Science Foundation (No. 19ZR1404700). This work was also supported in part by the National Science Foundation of China under Grants 71731004.

Abbreviations

URLLC: Ultra-reliable low-latency communications; 5G: fifth generation; 6G: sixth generation; MDP: Markov decision process; ADMM: Alternating Direction Method of Multipliers; IIoT: Industrial Internet of Things; VaR: Value at Risk; CVaR: Conditional Value at Risk; ECS: Edge computing server; CDF: Cumulative distribution function; MINLP: Mixed integer non-linear problem; IPM: Interior point method; Q-R: Queuing-based and risk-sensitive; Q-NR: Queuing-based and non-risk-sensitive; Q-R-Opt: Queuing-based and risk-sensitive optimal; Q-NR-Opt: Queuing-based and non-risk-sensitive optimal; NQ-R: Non-queuing-based and risk-sensitive; NQ-NR: Non-queuing-based and non-risk-sensitive; CCDF: Complementary cumulative distribution function

Availability of data and materials

Not applicable

Ethics approval and consent to participate

Not applicable

Competing interests

The authors declare that they have no competing interests.

Consent for publication

Not applicable

Authors’ contributions

All the authors contributed to the system design, queuing and CVaR analysis, strategy design, simulations and the writing of this paper. All authors read and approved the final manuscript.

Authors’ information

Not applicable

References

  • [1] Gu, Z., She, C., Hardjawana, W., Lumb, S., McKechnie, D., Essery, T., Vucetic, B.: Knowledge-assisted deep reinforcement learning in 5g scheduler design: From theoretical framework to implementation. arXiv preprint arXiv:2009.08346 (2020)
  • [2] She, C., Sun, C., Gu, Z., Li, Y., Yang, C., Poor, H.V., Vucetic, B.: A tutorial of ultra-reliable and low-latency communications in 6g: Integrating theoretical knowledge into deep learning. arXiv preprint arXiv:2009.06010 (2020)
  • [3] Wan, J., Yang, J., Wang, Z., Hua, Q.: Artificial intelligence for cloud-assisted smart factory. IEEE Access 6, 55419–55430 (2018)
  • [4] Elbamby, M.S., Perfecto, C., Liu, C., Park, J., Samarakoon, S., Chen, X., Bennis, M.: Wireless edge computing with latency and reliability guarantees. Proceedings of the IEEE 107(8), 1717–1737 (2019)
  • [5] Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing, a Practical Approach. McGraw-Hill, Inc., USA (2009)
  • [6] Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: Vision and challenges. IEEE Internet of Things Journal 3(5), 637–646 (2016). doi:10.1109/JIOT.2016.2579198
  • [7] Liu, J., Mao, Y., Zhang, J., Letaief, K.B.: Delay-optimal computation task scheduling for mobile-edge computing systems. In: 2016 IEEE International Symposium on Information Theory (ISIT), pp. 1451–1455 (2016)
  • [8] Zhang, Y., Du, P., Wang, J., Ba, T., Ding, R., Xin, N.: Resource scheduling for delay minimization in multi-server cellular edge computing systems. IEEE Access 7, 86265–86273 (2019)
  • [9] Wang, Y., Tao, X., Zhang, X., Zhang, P., Hou, Y.T.: Cooperative task offloading in three-tier mobile computing networks: An admm framework. IEEE Transactions on Vehicular Technology 68(3), 2763–2776 (2019). doi:10.1109/TVT.2019.2892176
  • [10] Sun, Y., Guo, X., Song, J., Zhou, S., Jiang, Z., Liu, X., Niu, Z.: Adaptive learning-based task offloading for vehicular edge computing systems. IEEE Transactions on Vehicular Technology 68(4), 3061–3074 (2019)
  • [11] Shi, C., Ren, Z., Yang, K., Chen, C., Zhang, H., Xiao, Y., Hou, X.: Ultra-low latency cloud-fog computing for industrial internet of things. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6 (2018)
  • [12] Liu, C., Bennis, M., Debbah, M., Poor, H.V.: Dynamic task offloading and resource allocation for ultra-reliable low-latency edge computing. IEEE Transactions on Communications 67(6), 4132–4150 (2019)
  • [13] Zhu, Y., Hu, Y., Yang, T., Schmeink, A.: Reliability-optimal offloading in multi-server edge computing networks with transmissions carried by finite blocklength codes. In: 2019 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1–6 (2019). doi:10.1109/ICCW.2019.8757175
  • [14] Batewela, S., Liu, C., Bennis, M., Suraweera, H.A., Hong, C.S.: Risk-sensitive task fetching and offloading for vehicular edge computing. IEEE Communications Letters 24(3), 617–621 (2020). doi:10.1109/LCOMM.2019.2960777
  • [15] De Haan, L., Ferreira, A.: Extreme Value Theory: an Introduction. Springer, New York (2007)
  • [16] Mihatsch, O., Neuneier, R.: Risk-sensitive reinforcement learning. Machine learning 49(2-3), 267–290 (2002)
  • [17] Hessami, A.G. (ed.): Perspectives on Risk, Assessment and Management Paradigms. Books, vol. 5615. IntechOpen, London (2019). doi:10.5772/intechopen.77127. https://ideas.repec.org/b/ito/pbooks/5615.html
  • [18] You, C., Huang, K., Chae, H., Kim, B.: Energy-efficient resource allocation for mobile-edge computation offloading. IEEE Transactions on Wireless Communications 16(3), 1397–1411 (2017). doi:10.1109/TWC.2016.2633522
  • [19] Bertsekas, D.P., Gallager, R.G., Humblet, P.: Data Networks vol. 2. Prentice-Hall International, New Jersey (1992)
  • [20] Kleinrock, L.: Queueing Systems, Volume 2: Computer Applications vol. 66. wiley, New York (1976)
  • [21] Bertsimas, D.J., Nakazato, D.: The departure process from a gi/g/1 queue and its applications to the analysis of tandem queues (1990)
  • [22] Yeh, P.-C., Chang, J.-F.: Characterizing the departure process of a single server queue from the embedded markov renewal process at departures. Queueing systems 35(1-4), 381–395 (2000)
  • [23] Jorion, P.: Value at risk (2000)
  • [24] Acerbi, C., Tasche, D.: On the coherence of expected shortfall. Journal of Banking & Finance 26(7), 1487–1503 (2002)
  • [25] Kingman, J.F.: On queues in heavy traffic. Journal of the Royal Statistical Society: Series B (Methodological) 24(2), 383–392 (1962)
  • [26] Rockafellar, R.T., Uryasev, S., et al.: Optimization of conditional value-at-risk. Journal of risk 2, 21–42 (2000)
  • [27] Pflug, G.C.: Some remarks on the value-at-risk and the conditional value-at-risk. In: Probabilistic Constrained Optimization, pp. 272–281. Springer, Boston, MA (2000)
  • [28] Bertsimas, D., Tsitsiklis, J.N.: Introduction to Linear Optimization vol. 6. Athena Scientific, Belmont, MA (1997)
  • [29] Boyd, S., Boyd, S.P., Vandenberghe, L.: Convex Optimization. Cambridge university press, UK (2004)
  • [30] Vaidya, P.M.: An algorithm for linear programming which requires o (((m+ n) n 2+(m+ n) 1.5 n) l) arithmetic operations. Mathematical Programming 47(1-3), 175–201 (1990)
  • [31] Kronqvist, J., Bernal, D.E., Lundell, A., Grossmann, I.E.: A review and comparison of solvers for convex minlp. Optimization and Engineering 20(2), 397–455 (2019)
  • [32] Mazzola, J., Neebe, A.: Bottleneck generalized assignment problems. Engineering Costs and Production Economics 14(1), 61–65 (1988)
  • [33] Martello, S., Toth, P.: The bottleneck generalized assignment problem. European journal of operational research 83(3), 621–638 (1995)
  • [34] Den Hertog, D.: Interior Point Approach to Linear, Quadratic and Convex Programming: Algorithms and Complexity vol. 277. Springer, Dordrecht (2012)
  • [35] Den Hertog, D., Roos, C., Terlaky, T.: On the classical logarithmic barrier function method for a class of smooth convex programming problems. Journal of Optimization Theory and Applications 73(1), 1–25 (1992)
  • [36] Yang, J., Ai, B., You, I., Imran, M., Wang, L., Guan, K., He, D., Zhong, Z., Keusgen, W.: Ultra-reliable communications for industrial internet of things: Design considerations and channel modeling. IEEE Network 33(4), 104–111 (2019). doi:10.1109/MNET.2019.1800455
  • [37] Olofsson, T., Ahlen, A., Gidlund, M.: Modeling of the fading statistics of wireless sensor network channels in industrial environments. IEEE Transactions on Signal Processing 64(12), 3021–3034 (2016)