1. Ashton K.That ‘internet of things’ thing. RFID journal, 22(7), pp.97-114, 2009. 2. Atzori, L., Iera, A. and Morabito, G.The internet of things: A survey. Computer networks, 54(15), pp.2787-2805, 2010. 3. Armbrust M., Fox A., Griffith R., Joseph A.D., Katz R.H., Konwinski A., Lee G., Patterson D.A., Rabkin A., Stoica I. and Zaharia M.Above the clouds: A berkeley view of cloud computing, 17, 2009. 4. Brutlag J. Speed matters for Google web search, 2009. 5. Tran T.X., Hajisami A., Pandey P. and Pompili D.Collaborative mobile edge computing in 5G networks: New paradigms, scenarios, and challenges. IEEE Communications Magazine, 55(4), pp.54-61, 2017. 6. Taleb T., Samdanis K., Mada B., Flinck H., Dutta S. and Sabella D.On multi-access edge computing: A survey of the emerging 5G network edge cloud architecture and orchestration. IEEE Communications Surveys & Tutorials, 19(3), pp.1657-1681, 2017. 7. Satyanarayanan M., Bahl P., Caceres R. and Davies N.The case for vm-based cloudlets in mobile computing. IEEE pervasive Computing, 8(4), pp.14-23, 2009. 8. Abbas N., Zhang Y., Taherkordi A. and Skeie T.Mobile edge computing: A survey. IEEE Internet of Things Journal, 5(1), pp.450-465, 2017. 9. Sutton, R.S. and Barto, A.G.Reinforcement learning: An introduction. MIT press, 2018. 10. Vermorel, J. and Mohri, M.Multi-armed bandit algorithms and empirical evaluation. In European conference on machine learning. Springer, Berlin, Heidelberg, pp. 437-448, 2005. 11. Carpentier A., Lazaric A., Ghavamzadeh M., Munos R. and Auer P.Upper-confidence-bound algorithms for active learning in multi-armed bandits. In International Conference on Algorithmic Learning Theory. Springer, Berlin, Heidelberg, pp. 189-203, 2011. 12. Chapelle, O. and Li, L.An empirical evaluation of thompson sampling. Advances in neural information processing systems, 24, 2011. |