<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Privacy-aware Computation Offloading Method for Virtual Reality Application</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Kai</forename><surname>Peng</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">College of Engineering</orgName>
								<orgName type="institution">Huaqiao University</orgName>
								<address>
									<settlement>Quanzhou</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">College of Engineering</orgName>
								<orgName type="institution">Huaqiao University</orgName>
								<address>
									<settlement>Quanzhou</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Peichen</forename><surname>Liu</surname></persName>
							<affiliation key="aff2">
								<orgName type="department">School of Computer Science and Technology</orgName>
								<orgName type="institution">Silicon Lake College</orgName>
								<address>
									<settlement>Suzhou</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tao</forename><surname>Huang</surname></persName>
						</author>
						<title level="a" type="main">A Privacy-aware Computation Offloading Method for Virtual Reality Application</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">D70051DEC715FBAE8FE2F12DDFF3E76F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T02:59+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>L A T E X Mobile Edge Computing</term>
					<term>Virtual Reality</term>
					<term>Privacy Protection</term>
					<term>Computation Offloading</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>As a new technology, virtual reality (VR) is constantly enriching people's experience. VR application has high requirements for the performance VR devices, but the computing resources of VR devices are limited. Mobile edge computing provides an effective solution to solve the above issue by offloading VR application to edge servers (ESs) for processing. Nevertheless, the resources of ESs are limited and heterogeneous. And thus, it is necessary to consider the load balancing of ESs. In addition, user privacy protection in the process of computation offloading is another issue that needs to take into consideration. In view of this, in this paper, we investigate the computation offloading for VR applications with privacy protection. Technically, we propose a privacy-aware computation offloading method based on multi-objective optimization genetic algorithm to obtain the optimal strategy for VR application. Finally, it is shown that the proposed method is effective through extensive experiments.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>With the development of communication and networking, the number of mobile users is increasing in a staggering speed. According to Oracle, there are more than 10 billion mobile devices connected to the Internet, and that number will grow to 22 billion by 2025 <ref type="bibr" target="#b0">[1]</ref>. The explosive growth of mobile devices leads to a large request and the promising application prospect <ref type="bibr" target="#b1">[2]</ref>. New technologies are beginning to be applied to mobile devices, such as virtual reality (VR), artificial intelligence (AI) and the Internet of Vehicles (IoV) <ref type="bibr" target="#b2">[3]</ref>. Among these, as a prospective technology, VR is constantly enriching people's experience ( <ref type="bibr" target="#b3">[4]</ref>, <ref type="bibr" target="#b4">[5]</ref>). In practice, the VR applications are usually run over a wearable VR devices (VDs), which can record information about the movement and activity of VR users (VUs). Equipment manufacturers of VD usually need to consider physical size constraint, which equips with a small CPU and GPU with low-power consumption and low-capacity battery <ref type="bibr" target="#b5">[6]</ref>. However, due to VR application requires real-time processing, it will consume a lot of computing resources. This poses a big challenge to VDs.</p><p>Fortunately, mobile edge computing (MEC) is a CEUR Workshop Proceedings (CEUR-WS.org)</p><p>promising distributed computing paradigm ( <ref type="bibr" target="#b6">[7]</ref>, <ref type="bibr" target="#b7">[8]</ref>). Computation offloading of MEC has been well studied in ( <ref type="bibr" target="#b8">[9]</ref>- <ref type="bibr" target="#b9">[10]</ref>). Inspired by this, offloading the VR application to edge servers (ESs), the time and energy consumption of VD can be significantly reduced. However, computing resources of the ES are limited, it will increase the waiting time and energy consumption of VDs when the number of tasks performed exceeds computing capacity of the ES <ref type="bibr" target="#b10">[11]</ref>. Meanwhile, the resources of ESs are heterogeneous, the tasks should be reasonably distributed on ES cluster to avoid some of the ESs are overload <ref type="bibr" target="#b11">[12]</ref>. Meanwhile, when the VU interacts with the VD, the application will collect the VU's private information, such as location, posture <ref type="bibr" target="#b12">[13]</ref>. If placing data with privacy conflicts on the same ES, it is easy to cause the leakage of VU privacy information <ref type="bibr" target="#b13">[14]</ref>. Therefore, it is necessary to consider the load balancing and the privacy constraints of placement of computation offloading for VR application.</p><p>To address above issues, the computation offloading considering privacy protection for VR applications are investigated in this work. The contributions of this paper can be summarized as follows.</p><p>1) We model the computation offloading problem as a multi-objective optimization issue, where the motionto-photons latency and energy consumption of VD, as well as load balancing of ES are considered as the optimization objectives, and privacy protection is considered as a constraint.</p><p>2) A computation offloading method for VR applications based on multi-objective optimization genetic algorithm, named MCOVR, is proposed to address the above issue. 3) We conduct a large number of comparative experiments to prove that MCOVR can obtain the optimal computation offloading strategy for VR application.</p><p>The remaining of the paper is describe as follows. Firstly, section 2 describes the system model and defines the problem formulation. Secondly, section 3 introduces our proposed multi-objective computation offloading of VR application method. Then, section 4 demonstrates the experiment results. Finally, section 5 introduces the related work and section 6 describes the conclusion and the future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">System Model and Problem Formulation</head><p>In this section, the architecture of MEC-enabled VR application is firstly introduced. Then, the model of VR application is established. Finally, the system model and problem formulation are described.</p><p>The MEC-enabled VR application architecture is shown in Figure <ref type="figure" target="#fig_0">1</ref>. We assume that the cloud has infinite computing resources, and resources of ESs are finite and heterogeneous. These VR applications are executed by VDs or offloaded to the ES or to the cloud. VUs communicate with ESs via local area network (LAN) and with the cloud via wide area network (WAN).</p><p>Y is a set of VU, which is defined as Y = {1, 2, ..., y}. There are vn applications in V , which is defined as V = {v 1 , v 2 , ..., v vn }. The task length requested by the v-th application of y-th user is denoted as ly,v, and the task workload is denoted as ry,v. Let X be the set of ES, denoted as X = {1, 2, ..., x}. In each ES, the computing resources of ES are represented as a number of i virtual machine(VM) xn, represented as xn = {xn 1 , xn 2 , ..., xn i }. J is a set of computation offloading strategies, which is defined as J = {j1,1, ..., j1,v, j2,1, ..., jy,v}. And jy,v represents the offloading strategies of v-th application from y-th VU. jy,v = 0 represents that the application is run by VD, jy,v ∈ (1, 2, ..., x) indicates the application is offloaded to ES, jy,v = x + 1 represents the application is offloaded to cloud for processing.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Virtual Reality Application Model</head><p>In general, Augmented reality (AR) application can be represented as a directed acyclic graph(DAG) <ref type="bibr" target="#b14">[15]</ref>. Similarly, VR can also be represented by a DAG. As shown in Figure <ref type="figure" target="#fig_1">2</ref>, the VR model can be represented as follows. The VR application contains three independent operations, namely, rendering, calibration and processing. Thus, we use a layer containing three operations to represent each video frame, namely node. In addition, there are k video frames in a VR application, the node k represents the k−th node in application.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Motion-to-Photons Latency Model</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.1.">Executing latency</head><p>Execution latency is the time cost of processing VR applications on the three platforms, namely, VD, ESs, and cloud center. In this part, the executing time of v-th VR application of y-th user is represented as</p><formula xml:id="formula_0">S e (jy,v) = ⎧ ⎪ ⎨ ⎪ ⎩ ry,v f l jy,v = 0 ry,v fe jy,v = 1 or 2, or . . . or x ry,v fc jy,v = x + 1.</formula><p>(1)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.2.">Transmission latency</head><p>The transmission latency is related to the computation offloading strategy of the two tasks. Let P c (c ∈ {1, 2, 3}) be the flag between two strategies, which are defined as (2) According to transmission strategy P c , the transmission time S t (jy,v) of the v-th application of the y-th VU is shown as</p><formula xml:id="formula_1">P c = ⎧ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎨ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎪ ⎩</formula><formula xml:id="formula_2">S t (jy,v) = ly,v B ,<label>(3)</label></formula><p>where B represents the transmission bandwidth. The transmission bandwidth is divided into three cases which is denoted as</p><formula xml:id="formula_3">B = ⎧ ⎪ ⎨ ⎪ ⎩ ∞ P c = 1, B e P c = 2, B c P c = 3.<label>(4)</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.3.">Waiting latency</head><p>When the number of applications offloaded to the ES exceeds the number of VM xn, the newly coming tasks need to wait for the previous task to complete execution. The i-th VM in x-th ES is represented as a double-tuple xn x i = (vmwk, tnum), where vmwk represents the ith VM collection and the tnum represents the number of applications in VM. When the offloading strategy jy,v = x, ry,v is offloaded to VM of x-th ES. Then, the vmwk is updated by vmwk = vmwk + ly,v and the tnum = tnum + 1. Finally, the S w (jy,v) of v-th application from y-th VU is calculated as</p><formula xml:id="formula_4">S w (jy,v) = S e (pre(jy,v)) • ψy,v,q, (<label>5</label></formula><formula xml:id="formula_5">)</formula><p>where ψy,v,q is to determine whether ry,v needs to wait for the previous task, and the execution latency of previous task is represented as S e (pre(jy,v)).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.4.">Total latency</head><p>The total time S(jy,v) is represented as the sum of all time, including the executing latency S e (jy,v), the transmission latency S t (jy,v) , and the waiting latency S w (jy,v). The total latency is represented as S(jy,v) = S e (jy,v) + S t (jy,v) + S w (jy,v). (6)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Energy Consumption Model</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.1.">Executing energy consumption</head><p>The executing energy of MDs is related to the executing time, the executing time of v-th VR application of y-th user is represented as</p><formula xml:id="formula_6">S e (jy,v) = ⎧ ⎪ ⎨ ⎪ ⎩ ry,v f l • ℘ active jy,v = 0 ry,v fe • ℘ idle jy,v = 1 or 2, or . . . or x ry,v fc • ℘ idle jy,v = x + 1.<label>(7)</label></formula><p>where ℘ active represents active state of VD energy consumption and ℘ idle represents idle state of VD energy consumption.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.2.">Transmission energy consumption</head><p>N t () represents transmission energy consumption, which can be obtained by multiplying the transmission power by the transmission time. N t () can be calculated by</p><formula xml:id="formula_7">N t (jy,v) = S t (jy,v) • ℘ trans , (<label>8</label></formula><formula xml:id="formula_8">)</formula><p>where ℘ trans represents the energy consumption of transmission.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.3.">Waiting energy consumption</head><p>Waiting energy consumption is the energy consumption of VD when the task waits for the execution of the previous task. Waiting energy consumption is related to waiting time which can be obtained as</p><formula xml:id="formula_9">N W (jy,v) = S W (jy,v) • ℘ idle . (<label>9</label></formula><formula xml:id="formula_10">)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.4.">Total energy consumption</head><p>The total energy consumption N (jy,v) is represented as the sum of all energy consumptions which includes the executing energy consumption N e (jy,v), the transmission energy consumption N t (jy,v), and the waiting energy consumption N w (jy,v). The total energy consumption can be calculated by N (jy,v) = N e (jy,v) + N t (jy,v) + N w (jy,v). (10)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.">Load Balancing Model</head><p>The ESs are heterogeneous means that the computing resources of ESs are not equal. Therefore, the workload of ESs needs to be balanced. And, ζv is a binary number to calculate the occupation of ES, which is calculated by</p><formula xml:id="formula_11">ζv = 1, if e x is occupied 0, Otherwise.<label>(11)</label></formula><p>And, ηv is a flag to represent whether the ES is occupied, which is represented as</p><formula xml:id="formula_12">ηv = 1, if v existed in e x 0, Otherwise.<label>(12)</label></formula><p>Firstly, the number of ES that are utilized is defined as UE(j), which is represented as</p><formula xml:id="formula_13">UE(j) = V v=1 ζv. (<label>13</label></formula><formula xml:id="formula_14">)</formula><p>τ represent the amount of occupied ESs which is calculated by</p><formula xml:id="formula_15">τ = 1 o i V v=1 Y y=1 gy,v • ηv, ζv = 1 0, Otherwise.<label>(14)</label></formula><p>According to the resource utilization of each ES, the average resource utilization α(j) can be obtained by</p><formula xml:id="formula_16">α(j) = 1 μ • V v=1 τ. (<label>15</label></formula><formula xml:id="formula_17">)</formula><p>Finally, the load balancing of each ES is calculated by the squared difference between the resource utilization of each ES and the average resource utilization. The loading balancing F (J) is calculated by</p><formula xml:id="formula_18">F (j) = 1 μ • V v=1 [α(jy,v) − τ (jy,v)] 2 ).<label>(16)</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.5.">Privacy Model</head><p>As VR applications need to collect user information, VR privacy conflicts need to be considered. In this paper, we address privacy conflicts by placing applications on different ESs to avoid privacy leakage <ref type="bibr" target="#b13">[14]</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.6.">Problem Formulation</head><p>The main objectives of this study are to decrease the motion-to-photons latency and energy consumption of VDs, as well as the load balancing of ESs while preserving the VU's privacy. The problem formulations are defined as follows. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Min</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Method Design</head><p>In this section, we describe the details of our proposed multi-objective computation offloading of VR application (MCOVR). MCOVR is based on MOMBI <ref type="bibr" target="#b15">[16]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Initialization</head><p>The initialization of the algorithm includes the definition of key parameters and the generation of the initial population. Firstly, the first-generation population Z0 of size t z is generated randomly. Secondly, MCOVR defines some parameters, such as crossover probability L c , mutation probability L m , the number of iterations Dmax, and current iteration index d. Finally, the algorithm defines a size of t q achieve set Q0 that keeps the achieve solution. Moreover, tournament selection, crossover, as well as mutation is executed on Z0 to generate new population Z * 0 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Crossover and Mutation</head><p>In the crossover operation, the algorithm randomly exchanges a certain point value of two offloading strategies. Through crossover operation, the algorithm can obtain diversity solutions. In the mutation operation, mutations will slightly change certain values on the offloading strategy. And mutation operator can reduce the occurrence of local optimal and avoid early convergence.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">R2 Ranking and Reference Points</head><p>In the MCOVR, algorithm divides the population through the R2 indicator to achieve non-dominated sorting, namely, R2 ranking. In R2 indicator, the objectives are measured based on the weighted Tchebycheff method and processed by normalization. W is represented as the weight of each object, A is represented the Pareto solution set, and ϑ represents the utility functions. Therefore, the R2 indicator is defined as follows. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>R2i(A, W</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Tournament Selection</head><p>The two populations Z d and Z * d generated by the algorithm need to select the number of t z as the nextgeneration population Z d+1 , where d&lt;Dmax. In addition, based on R2 ranking of Z d , by comparing the objective function values of the two solutions and select the optimal value of the objective function as the parent solution.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.">Method Overview</head><p>This method aims to reduce the time consumption and energy consumption of VDs as well as load balancing of ESs jointly. The flow chart represents the execution sequence of our proposed MCOVR is shown in Figure <ref type="figure" target="#fig_5">3</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Experiment Evaluation</head><p>In this section, we present the experimental evaluation of our method. Firstly, the experiment setting is introduced, which includes comparative methods and key parameters. Then, the experimental results and discussion are described.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Experimental Setting</head><p>Two comparative computation offloading methods are proposed. The details of the two methods is as follows.</p><p>Benchmark: All applications are offloaded to the three platforms for processing randomly, named as Benchmark.</p><p>First Come First Service (FCFS): All applications are offloaded to the three platforms for processing orderly, named as FCFS.</p><p>The key parameter value is described in Table <ref type="table">1</ref>. We execute these offloading methods by JAVA over Win10 64 OS with 8 Intel Core i7-10850H 3.60 GHz CPU processors, Nvidia RTX2070 GPU processors, and 32GB RAM.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Experiment evaluation result and discussion</head><p>We design three different kinds of comparative experiments to verify the effectiveness of MCOVR. All the experiments are performed 10 times, and the result is the average value.</p><p>The comparison of motion-to-photons latency is presented in Figure <ref type="figure" target="#fig_7">4</ref>. Figure <ref type="figure" target="#fig_7">4</ref>(a) testifies the motion-tophotons latency of multi-VU condition. As the number of VUs increases, the difference of the latency consumed among the three methods is getting larger. Our proposed      </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Related Work</head><p>Many efforts have been make to solve the computation offloading in MEC. Bi et al. <ref type="bibr" target="#b8">[9]</ref> considered energy consumption with the maximum number of memory constraint in MEC. An efficient algorithm based on a penalty function method is proposed to handle constraint. Xu et al. <ref type="bibr" target="#b9">[10]</ref> jointly considered both IoV energy consumption and load balancing of ES problem. They proposed a genetic algorithms-based method to solve it. Feng et al. <ref type="bibr" target="#b16">[17]</ref> considered the computation performance for offloading in the wireless powered MEC. Li et al. <ref type="bibr" target="#b17">[18]</ref> studied a joint optimization problem of computation offloading and privacy preservation in the MEC system and proposed a privacy-aware online learning algorithm to solve this challenge. Ko et al. <ref type="bibr" target="#b18">[19]</ref> studied the computation offloading problem in smart cities based on the privacy entropy model. A constrained Markov decision process method is developed to solve location privacy leakage. The above-mentioned studies provided a good view of the computation offloading in MEC and inspired us to study the computation offloading of VR applications.</p><p>A few studies take into account MEC-enabled VR applications. Zhang et al. <ref type="bibr" target="#b19">[20]</ref> proposed an edge-cloud architecture of VR application that frame rendered on ES or cloud. They proposed a service placement algorithm for multi-user VR applications that makes placement decisions, based on QoS and VUs mobility patterns. Zhu et al. <ref type="bibr" target="#b20">[21]</ref> focused on dynamic rendering-module placement problem for VR streaming. To reduce such rendering latency, they proposed a prediction-based pre-rendering mechanism at the ES. In <ref type="bibr" target="#b21">[22]</ref>, the authors investigated the problem of providing service using the MEC network architecture with a frame rendering. They solved an online service placement problem by leveraging model predictive control and overcoming conflicting system objectives. In <ref type="bibr" target="#b22">[23]</ref>, the authors focused on the online offloading interactive VR application. They considered the constraints of the delay requirements, the maximum frame per second demands, the total bandwidth and rendering resources limits and proposed programming to optimize execution efficiency of VR application.</p><p>Different from the above studies, we investigates how to make privacy-aware computation offloading decisions to reduce the motion-to-photons latency and energy of VR applications and load balancing of ESs while considering VUs privacy-preserving. Correspondingly, we solve this issue using a multi-objective optimization method.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>We studied the problem of multi-objective computation offloading of VR applications. Correspondingly, we propose a method named MCOVR to minimize the motion-to-photons latency and energy consumption of VD and the load balancing of ESs jointly. We also considered privacy conflicts in VR applications and using the privacy placement model to protect user data information security. Finally, the experimental results have shown that our proposed method is effective.</p><p>In future work, we will study mobility-aware computation offloading for augmented reality applications in smart cities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Acknowledgments</head></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: MEC-Enabled VR application architecture.</figDesc><graphic coords="2,175.43,84.25,244.27,140.11" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: VR Application Model.</figDesc><graphic coords="3,173.93,84.25,247.15,73.99" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>T</head><label></label><figDesc>wo applications are executed by same platf orm c = 1, V D and ES of f loading c = 2, Cloud and other platf orms of f loading c = 3.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>NF</head><label></label><figDesc>,v); ∀j ∈ {1, 2, 3, . . . , x}. (jy,v); ∀j ∈ {1, 2, 3, . . . , x}. (20) (jy,v); ∀j ∈ {1, 2, 3, . . . , x}. (21) s.t.jy,v ∈ {0, 1, 2, ..., x + 1}.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>Equation (25), when each population is calculated by the R2 indicator, the reference point of the ϑ needs to be updated. The maximum value c max d and minimum value c min d of the objective need to be found. Through Equation (25) and reference point updating policy, the r2 ranking can be calculated as rankZ d = where f d (jy,v) represents the objective function in d-th iteration.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Flow chart of MCOVR.</figDesc><graphic coords="6,131.33,84.25,332.35,79.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head></head><label></label><figDesc>The processing frequency of MD 500MHZ The processing frequency of ES 2000MHZ-2400MHZ The processing frequency of ES 5000MHZ The bandwidth of LAN 220kb/s The bandwidth of WAN 150kb/s Number of VMs for each ES 15-20 MCOVR achieves the minimum latency consumption among the three methods. The latency consumption experimental result of the influence of different applications and different nodes are represented in Figure 4(b) and Figure 4(c). MCOVR reduces latency significantly and shows the slowest growth trend among the three methods. It can be deduced that MCOVR outperforms FCFS and Benchmark in terms of different situations. The energy consumption is obtained by Equation (a) Multi-VD experiment (b) Multi-app experiment (c) Multi-node experiment</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Comparison of the motion-to-photon latency.</figDesc><graphic coords="6,144.95,559.63,91.99,55.15" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Comparison of the energy consumption.</figDesc><graphic coords="6,358.19,373.57,91.99,57.07" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head></head><label></label><figDesc>(a) Multi-VD experiment (b) Multi-app experiment (c) Multi-node experiment</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Comparison of the load balancing.</figDesc><graphic coords="7,144.95,169.57,91.97,58.21" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>. A graph = (RW, CT ) is used to describe the privacy conflicts, where RW represents the a set of computing services and CT denotes a set of privacy conflicting relation. A pair of conflict relations (rwy, rwy * )(rwy, rwy * ∈ RW ) are used to indicate that VU information with privacy conflicts cannot be placed in the same ES. The conflict application of rwv are represented as rwv|(rwy, rwy * ) ∈ CT, y * = {1, 2, ..., Y }.<ref type="bibr" target="#b16">(17)</ref> </figDesc><table><row><cell cols="2">HS = hs1, hs2, ..., hsy(hs ∈ Y ) represents the place-</cell></row><row><cell cols="2">ment location ES for executing the applications. After-</cell></row><row><cell cols="2">wards, based on the acquired conflicting service set, the</cell></row><row><cell cols="2">placed destination hsy has a conflicting ES set, which is</cell></row><row><cell>calculated by</cell><cell></cell></row><row><cell>hy|(esx esx) ∈ rwq, x = {1, 2, ..., |rwv|}.</cell><cell>(18)</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work is supported by the National Science Foundation of China (Grant No.61902133), the Natural Science Foundation of Fujian Province (Grant No.2018J05106), the Fundamental Research Funds for the Central Universities(ZQN-817), Quanzhou Science and Technology Project(No.2020C050R).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Review of the Internet of Things for Healthcare Monitoring</title>
		<author>
			<persName><forename type="first">T</forename><surname>Mustafa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Varol</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">8th International Symposium on Digital Forensics and Security (ISDFS)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2020-06">2020. June. 2020</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Survey on network slicing for Internet of Things realization in 5G networks</title>
		<author>
			<persName><forename type="first">S</forename><surname>Wijethilaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Liyanage</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys &amp; Tutorials</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="957" to="994" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">To improve service reliability for AI-powered time-critical services using imperfect transmission in MEC: An experimental study</title>
		<author>
			<persName><forename type="first">J</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet of Things Journal</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="9357" to="9371" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Viewport-Adaptive Scalable Multi-User Virtual Reality Mobile-Edge Streaming</title>
		<author>
			<persName><forename type="first">J</forename><surname>Chakareski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Image Processing</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="6330" to="6342" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Cellular-connected wireless virtual reality: Requirements, challenges, and solutions</title>
		<author>
			<persName><forename type="first">F</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Deng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Saad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bennis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Aghvami</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Magazine</title>
		<imprint>
			<biblScope unit="volume">58</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="105" to="111" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">September). NTU Smart Edge for Wireless Virtual Reality</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">H</forename><surname>Hsu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Cheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">Y</forename><surname>Liao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">S</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">H</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">Y</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">.</forename><forename type="middle">.</forename><surname>Liao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Consumer Electronics-Taiwan (ICCE-Taiwan)</title>
				<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="1" to="2" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Edge caching and computing in 5G for mobile AR/VR and tactile internet</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sukhmani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sadeghi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Erol-Kantarci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>El Saddik</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Mul-tiMedia</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="21" to="30" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Mobile VR on edge cloud: a latency-driven design</title>
		<author>
			<persName><forename type="first">S</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Gupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hwang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Jana</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 10th ACM Multimedia Systems Conference</title>
				<meeting>the 10th ACM Multimedia Systems Conference</meeting>
		<imprint>
			<date type="published" when="2019-06">2019. June</date>
			<biblScope unit="page" from="222" to="231" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Energy-optimized Partial Computation Offloading in Mobile Edge Computing with Genetic Simulated-annealing-based Particle Swarm Optimization</title>
		<author>
			<persName><forename type="first">J</forename><surname>Bi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Duanmu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Abusorrah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet of Things Journal</title>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Multiobjective computation offloading for internet of vehicles in cloud-edge computing</title>
		<author>
			<persName><forename type="first">X</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Gu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Dai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Qi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Wireless Networks</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="1611" to="1629" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Leveraging user mobility and mobile app services behavior for optimal edge resource utilization</title>
		<author>
			<persName><forename type="first">J</forename><surname>Violos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Psomakelis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Tserpes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Aisopos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Varvarigou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Omni-Layer Intelligent Systems</title>
				<meeting>the International Conference on Omni-Layer Intelligent Systems</meeting>
		<imprint>
			<date type="published" when="2019-05">2019. May</date>
			<biblScope unit="page" from="7" to="12" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Joint optimization of resource utilization and load balance with privacy preservation for edge services in 5G networks</title>
		<author>
			<persName><forename type="first">X</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Yang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mobile Networks and Applications</title>
		<imprint>
			<biblScope unit="page" from="1" to="12" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">The convergence of virtual reality and social networks: threats to privacy and autonomy</title>
		<author>
			<persName><forename type="first">F</forename><surname>O'brolcháin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Jacquemard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Monaghan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>O'connor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Novitzky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Gordijn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science and engineering ethics</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="29" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">An IoT-oriented offloading method with privacy preservation for cloudlet-enabled wireless metropolitan area networks</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Gu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Xiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Qi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sensors</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page">3030</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Energy-Efficient Task Offloading and Resource Allocation via Deep Reinforcement Learning for Augmented Reality in Mobile Edge Networks</title>
		<author>
			<persName><forename type="first">X</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet of Things Journal</title>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">MOMBI: A new metaheuristic for many-objective optimization based on the R2 indicator</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">H</forename><surname>Gómez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">A C</forename><surname>Coello</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Congress on Evolutionary Computation</title>
		<imprint>
			<biblScope unit="page" from="2488" to="2495" />
			<date type="published" when="2013-06">2013. June. 2013</date>
		</imprint>
	</monogr>
	<note>IEEE</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Computation offloading and resource allocation for wireless powered mobile edge computing with latency constraint</title>
		<author>
			<persName><forename type="first">J</forename><surname>Feng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Pei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">R</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Chu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Shang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Wireless Communications Letters</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="1320" to="1323" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Privacy-Aware Online Task Offloading for Mobile-Edge Computing</title>
		<author>
			<persName><forename type="first">T</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Liang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Geng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Wireless Algorithms, Systems, and Applications</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020-09">2020. September</date>
			<biblScope unit="page" from="244" to="255" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">LPGA: Location Privacy-Guaranteed Offloading Algorithm in Cache-Enabled Edge Clouds</title>
		<author>
			<persName><forename type="first">H</forename><surname>Ko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pack</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Cloud Computing</title>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Towards efficient edge cloud augmentation for virtual reality mmogs</title>
		<author>
			<persName><forename type="first">W</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Raychaudhuri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Second ACM/IEEE Symposium on Edge Computing</title>
				<meeting>the Second ACM/IEEE Symposium on Edge Computing</meeting>
		<imprint>
			<date type="published" when="2017-10">2017. October</date>
			<biblScope unit="page" from="1" to="14" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Virtual reality streaming at the edge: a power perspective: poster</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Guo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wei</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 4th ACM/IEEE Symposium on Edge Computing</title>
				<meeting>the 4th ACM/IEEE Symposium on Edge Computing</meeting>
		<imprint>
			<date type="published" when="2019-11">2019. November</date>
			<biblScope unit="page" from="316" to="318" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Dynamic service placement for virtual reality group gaming on mobile edge cloudlets</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Jiao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Lin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Journal on Selected Areas in Communications</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="1881" to="1897" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Mobile Edge Resource optimization for Multiplayer Interactive Virtual Reality Game</title>
		<author>
			<persName><forename type="first">H</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Song</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Wireless Communications and Networking Conference (WCNC)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2021-03">2021. March. 2021</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
