Skip to main content
Log in

CoTask: Correlation-aware task offloading in edge computing

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

In this paper, we first study the problem of Correlation-aware Task computation offloading (CoTask) in mobile edge computing. Specifically, considering the correlation among multiple computation tasks, we study how to determine a joint task offloading decision and resource allocation strategy under the constraints of feasible offloading decisions and edge servers’ computation capacity, such that the overall task latency is minimized. Before addressing the challenging CoTask problem, we first investigate the case without considering task correlation, namely, NonCoTask. We prove that, NonCoTask with two combinatorial integer-continuous optimization variables (i.e., integral offloading decision variable and continuous resource allocation variable) can be equivalently solved by solving a 0-1 integer programming problem with respect to the offloading decision variable only, while the closed-form optimal resource allocation can be efficiently obtained under any given offloading decision. The 0-1 integer programming problem further falls into the realm of minimizing a supermodular set function with a matroid base constraint. We then propose a performance-guaranteed algorithm for NonCoTask. Next, we rigorously analyze the performance gap between CoTask and NonCoTask, and develop a correlation-aware offloading decision and resource allocation algorithm with theoretic performance guarantee for CoTask, via a correlation-aware exchange search based on the solution to NonCoTask. Extensive evaluation results show that our proposed algorithm outperforms several state-of-the-art algorithms as well as their enhanced counterparts with correlation in terms of overall task latency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Ageev, A., Sviridenko, M.: An 0.828-approximation algorithm for the uncapacitated facility location problem. Discrete Applied Mathematics 93(2), 149–156 (1999). https://doi.org/10.1016/S0166-218X(99)00103-1

    Article  MathSciNet  MATH  Google Scholar 

  2. Al-Shuwaili, A., Simeone, O.: Energy-efficient resource allocation for mobile edge computing-based augmented reality applications. IEEE Wireless Communications Letters 6(3), 398–401 (2017). https://doi.org/10.1109/LWC.2017.2696539

    Article  Google Scholar 

  3. Al-Shuwaili, A., Simeone, O., Bagheri, A., Scutari, G.: Joint uplink/downlink optimization for backhaul-limited mobile cloud computing with user scheduling. IEEE Transactions on Signal and Information Processing over Networks 3(4), 787–802 (2017). https://doi.org/10.1109/TSIPN.2017.2668142

    Article  MathSciNet  Google Scholar 

  4. Baidya, S., Chen, Y., Levorato, M.: ebpf-based content and computation-aware communication for real-time edge computing. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 865–870 (2018). https://doi.org/10.1109/INFCOMW.2018.8407006

  5. Cao, X., Wang, F., Xu, J., Zhang, R., Cui, S.: Joint computation and communication cooperation for energy-efficient mobile edge computing. IEEE Internet of Things Journal 6(3), 4188–4200 (2019). https://doi.org/10.1109/JIOT.2018.2875246

    Article  Google Scholar 

  6. Chen, M., Hao, Y.: Task offloading for mobile edge computing in software defined ultra-dense network. IEEE Journal on Selected Areas in Communications 36(3), 587–597 (2018). https://doi.org/10.1109/JSAC.2018.2815360

    Article  Google Scholar 

  7. Chen, M., Hao, Y., Hu, L., Hossain, M.S., Ghoneim, A.: Edge-cocaco: Toward joint optimization of computation, caching, and communication on edge cloud. IEEE Wireless Communications 25(3), 21–27 (2018). https://doi.org/10.1109/MWC.2018.1700308

    Article  Google Scholar 

  8. Chen, M., Guo, S., Liu, K., Liao, X., Xiao, B.: Robust computation offloading and resource scheduling in cloudlet-based mobile cloud computing. IEEE Transactions on Mobile Computing 20(5), 2025–2040 (2021). https://doi.org/10.1109/TMC.2020.2973993

    Article  Google Scholar 

  9. Chen, M.H., Dong, M., Liang, B.: Joint offloading decision and resource allocation for mobile cloud with computing access point. In: 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp 3516–3520 (2016). https://doi.org/10.1109/ICASSP.2016.7472331

  10. Chen, M.H., Liang, B., Dong, M.: Joint offloading and resource allocation for computation and communication in mobile cloud with computing access point. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1–9 (2017). https://doi.org/10.1109/INFOCOM.2017.8057150

  11. Chen, X., Jiao, L., Li, W., Fu, X.: Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Transactions on Networking 24(5), 2795–2808 (2016). https://doi.org/10.1109/TNET.2015.2487344

    Article  Google Scholar 

  12. Cheng, K., Teng, Y., Sun, W., Liu, A., Wang, X.: Energy-efficient joint offloading and wireless resource allocation strategy in multi-mec server systems. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6 (2018). https://doi.org/10.1109/ICC.2018.8422877

  13. Cheng, Z., Li, P., Wang, J., Guo, S.: Just-in-time code offloading for wearable computing. IEEE Transactions on Emerging Topics in Computing 3(1), 74–83 (2015). https://doi.org/10.1109/TETC.2014.2387688

    Article  Google Scholar 

  14. Cui, Y., He, W., Ni, C., Guo, C., Liu, Z.: Energy-efficient resource allocation for cache-assisted mobile edge computing. In: 2017 IEEE 42nd Conference on Local Computer Networks (LCN), pp. 640–648 (2017). https://doi.org/10.1109/LCN.2017.112

  15. Dai, Y., Xu, D., Maharjan, S., Zhang, Y.: Joint computation offloading and user association in multi-task mobile edge computing. IEEE Transactions on Vehicular Technology 67(12), 12313–12325 (2018). https://doi.org/10.1109/TVT.2018.2876804

    Article  Google Scholar 

  16. Dai, Y., Xu, D., Maharjan, S., Zhang, Y.: Joint offloading and resource allocation in vehicular edge computing and networks. In: 2018 IEEE Global Communications Conference (GLOBECOM), pp. 1–7 (2018). https://doi.org/10.1109/GLOCOM.2018.8648004

  17. Goemans, M.X., Williamson, D.P.: Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming. J ACM 42(6), 1115–1145 (1995). https://doi.org/10.1145/227683.227684

    Article  MathSciNet  MATH  Google Scholar 

  18. Hu, Y.C., Patel, M., Sabella, D., Sprecher, N., Young, V.: Mobile edge computing-a key technology towards 5g. ETSI white paper 11(11), 1–16 (2015)

    Google Scholar 

  19. Islam, A., Debnath, A., Ghose, M., Chakraborty, S.: A survey on task offloading in multi-access edge computing. Journal of Systems Architecture 118, 102225 (2021). https://doi.org/10.1016/j.sysarc.2021.102225

    Article  Google Scholar 

  20. Lee, J., Mirrokni, V.S., Nagarajan, V., Sviridenko, M.: Maximizing nonmonotone submodular functions under matroid or knapsack constraints. SIAM Journal on Discrete Mathematics 23(4), 2053–2078 (2010). https://doi.org/10.1137/090750020

    Article  MathSciNet  MATH  Google Scholar 

  21. Li, N., Martinez-Ortega, J.F., Rubio, G.: Distributed joint offloading decision and resource allocation for multi-user mobile edge computing: A game theory approach. (2018) arxiv:1805.02182

  22. Li, Y., Gao, W.: Muvr: Supporting multi-user mobile virtual reality with resource constrained edge cloud. In: 2018 IEEE/ACM Symposium on Edge Computing (SEC), pp. 1–16 (2018). https://doi.org/10.1109/SEC.2018.00008

  23. Liu, C.F., Bennis, M., Debbah, M., Poor, H.V.: Dynamic task offloading and resource allocation for ultra-reliable low-latency edge computing. IEEE Transactions on Communications 67(6), 4132–4150 (2019). https://doi.org/10.1109/TCOMM.2019.2898573

    Article  Google Scholar 

  24. Lyu, X., Tian, H., Ni, W., Zhang, Y., Zhang, P., Liu, R.P.: Energy-efficient admission of delay-sensitive tasks for mobile edge computing. IEEE Transactions on Communications 66(6), 2603–2616 (2018). https://doi.org/10.1109/TCOMM.2018.2799937

    Article  Google Scholar 

  25. Mach, P., Becvar, Z.: Mobile edge computing: A survey on architecture and computation offloading. IEEE Communications Surveys Tutorials 19(3), 1628–1656 (2017). https://doi.org/10.1109/COMST.2017.2682318

    Article  Google Scholar 

  26. Mao, Y., You, C., Zhang, J., Huang, K., Letaief, K.B.: A survey on mobile edge computing: The communication perspective. (2017) arxiv:1701.01090

  27. Mao, Y., You, C., Zhang, J., Huang, K., Letaief, K.B.: A survey on mobile edge computing: The communication perspective. IEEE Communications Surveys Tutorials 19(4), 2322–2358 (2017). https://doi.org/10.1109/COMST.2017.2745201

    Article  Google Scholar 

  28. Mao, Y., Zhang, J., Letaief, K.B.: Joint task offloading scheduling and transmit power allocation for mobile-edge computing systems. In: 2017 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6 (2017). https://doi.org/10.1109/WCNC.2017.7925615

  29. Mao, Y., Zhang, J., Song, S.H., Letaief, K.B.: Stochastic joint radio and computational resource management for multi-user mobile-edge computing systems. IEEE Transactions on Wireless Communications 16(9), 5994–6009 (2017). https://doi.org/10.1109/TWC.2017.2717986

    Article  Google Scholar 

  30. Miettinen, A.P., Nurminen, J.K.: Energy efficiency of mobile clients in cloud computing. In: Proc. USENIX Workshop on Hot Topics in Cloud Computing (HotCloud), vol. 10, p. 19 (2010)

  31. Nemhauser, G., Wolsey, L., Fisher, M.: An analysis of approximations for maximizing submodular set functions-i. Mathematical Programming 14, 265–294 (1978). https://doi.org/10.1007/BF01588971

    Article  MathSciNet  MATH  Google Scholar 

  32. Oxley, J.: Matroid Theory. Oxford University Press (1992)

  33. Qu, Y., Dai, H., Wang, H., Dong, C., Wu, F., Guo, S.: Service provisioning for uav-enabled mobile edge computing. IEEE Journal on Selected Areas in Communications 39(11), 3287–3305 (2021). https://doi.org/10.1109/JSAC.2021.3088660

    Article  Google Scholar 

  34. Ren, J., Yu, G., Cai, Y., He, Y.: Latency optimization for resource allocation in mobile-edge computation offloading. IEEE Transactions on Wireless Communications 17(8), 5506–5519 (2018). https://doi.org/10.1109/TWC.2018.2845360

    Article  Google Scholar 

  35. Sardellitti, S., Scutari, G., Barbarossa, S.: Joint optimization of radio and computational resources for multicell mobile-edge computing. IEEE Transactions on Signal and Information Processing over Networks 1(2), 89–103 (2015). https://doi.org/10.1109/TSIPN.2015.2448520

    Article  MathSciNet  Google Scholar 

  36. Simsek, M., Aijaz, A., Dohler, M., Sachs, J., Fettweis, G.: 5g-enabled tactile internet. IEEE Journal on Selected Areas in Communications 34(3), 460–473 (2016). https://doi.org/10.1109/JSAC.2016.2525398

    Article  Google Scholar 

  37. Sun, Y., Zhou, S., Xu, J.: Emm: Energy-aware mobility management for mobile edge computing in ultra dense networks. IEEE Journal on Selected Areas in Communications 35(11), 2637–2646 (2017). https://doi.org/10.1109/JSAC.2017.2760160

    Article  Google Scholar 

  38. Sundar, S., Liang, B.: Offloading dependent tasks with communication delay and deadline constraint. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, pp. 37–45 (2018). https://doi.org/10.1109/INFOCOM.2018.8486305

  39. Tran, T.X., Pompili, D.: Adaptive bitrate video caching and processing in mobile-edge computing networks. IEEE Transactions on Mobile Computing 18(9), 1965–1978 (2019). https://doi.org/10.1109/TMC.2018.2871147

    Article  Google Scholar 

  40. Tran, T.X., Pompili, D.: Joint task offloading and resource allocation for multi-server mobile-edge computing networks. IEEE Transactions on Vehicular Technology 68(1), 856–868 (2019). https://doi.org/10.1109/TVT.2018.2881191

    Article  Google Scholar 

  41. Wang, J., Ding, G., Wu, Q., Shen, L., Song, F.: Spatial-temporal spectrum hole discovery: A hybrid spectrum sensing and geolocation database framework. Chinese Science Bulletin 59, 1896–1902 (2014)

    Article  Google Scholar 

  42. Xing, H., Liu, L., Xu, J., Nallanathan, A.: Joint task assignment and wireless resource allocation for cooperative mobile-edge computing. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6 (2018). https://doi.org/10.1109/ICC.2018.8422777

  43. Xu, D., Li, Y., Chen, X., Li, J., Hui, P., Chen, S., Crowcroft, J.: A survey of opportunistic offloading. IEEE Communications Surveys Tutorials 20(3), 2198–2236 (2018). https://doi.org/10.1109/COMST.2018.2808242

    Article  Google Scholar 

  44. Xu, Y., Anpalagan, A., Wu, Q., Shen, L., Gao, Z., Wang, J.: Decision-theoretic distributed channel selection for opportunistic spectrum access: Stragies, challenges and solutions. IEEE Communications Survey and Tutorials 15(4), 1689–1713 (2013). https://doi.org/10.1109/SURV.2013.030713.00189

    Article  Google Scholar 

  45. Yan, J., Bi, S., Zhang, Y.J., Tao, M.: Optimal task offloading and resource allocation in mobile-edge computing with inter-user task dependency. IEEE Transactions on Wireless Communications 19(1), 235–250 (2020). https://doi.org/10.1109/TWC.2019.2943563

    Article  Google Scholar 

  46. Yang, L., Cao, J., Cheng, H., Ji, Y.: Multi-user computation partitioning for latency sensitive mobile cloud applications. IEEE Transactions on Computers 64(8), 2253–2266 (2015). https://doi.org/10.1109/TC.2014.2366735

    Article  MathSciNet  MATH  Google Scholar 

  47. Zarandi, S., Tabassum, H.: Delay minimization in sliced multi-cell mobile edge computing (mec) systems. IEEE Communications Letters 25(6), 1964–1968 (2021). https://doi.org/10.1109/LCOMM.2021.3051558

    Article  Google Scholar 

  48. Zhao, M., Yu, J.J., Li, W.T., Liu, D., Yao, S., Feng, W., She, C., Quek, T.Q.S.: Energy-aware task offloading and resource allocation for time-sensitive services in mobile edge computing systems. IEEE Transactions on Vehicular Technology 70(10), 10925–10940 (2021). https://doi.org/10.1109/TVT.2021.3108508

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported in part by the National Key R&D Program of China No. 2018YFB1800801, in part by the National Natural Science Foundation of China under Grant No. 61931011, Grant No. 62072303, Grant No. 61872178, in part by National Postdoctoral Program for Innovative Talents of China No. BX20190202, in part by the Open Project Program of the Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space No. KF20202105.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haipeng Dai.

Additional information

This article belongs to the Topical Collection: Special Issue on Resource Management at the Edge for Future Web, Mobile and IoT Applications

Guest Editors: Qiang He, Fang Dong, Chenshu Wu, and Yun Yang.

Appendix

Appendix

1.1 Appendix A: Proof of Lemma 2

Proof

Recall that \(\varOmega (\mathbf {Z})\) is the objective function in NonCoTask-\(\mathbf {Z}\). Let \(\mathbf {Z}^*:=\{z^*_{ij}\}\) be an optimal solution of NonCoTask-\(\mathbf {Z}\) and \(\tilde{\mathbf {F}}:=\{\tilde{f}_{ij}\}\) is obtained by (4). The feasibility of \((\mathbf {Z}^*, \tilde{\mathbf {F}})\) is not difficult to verify. In the following, we prove that for any feasible solution of NonCoTask, \((\mathbf {Z}, \mathbf {F})\), \(\varPhi (\mathbf {Z}^*, \tilde{\mathbf {F}}) \le \varPhi (\mathbf {Z}, \mathbf {F})\) holds. According to (5) and the definition of \(\varOmega (\mathbf {Z})\), we have \(\varPhi (\mathbf {Z}, \tilde{\mathbf {F}})=\varOmega (\mathbf {Z})\) and \(\varPhi (\mathbf {Z}^*, \tilde{\mathbf {F}})=\varOmega (\mathbf {Z}^*)\). By definition, \(\varOmega (\mathbf {Z}^*) \le \varOmega (\mathbf {Z})\) holds for any feasible solution of NonCoTask-\(\mathbf {Z}\) (i.e., \(\mathbf {Z}\)). Then, we obtain \(\varPhi (\mathbf {Z}^*, \tilde{\mathbf {F}})=\varOmega (\mathbf {Z}^*)\le \varOmega (\mathbf {Z})=\varPhi (\mathbf {Z}, \tilde{\mathbf {F}})\le \varPhi (\mathbf {Z}, \mathbf {F}),\) where the last inequality works due to the optimality of \(\tilde{\mathbf {F}}\). Accordingly, \(\varPhi (\mathbf {Z}^*, \tilde{\mathbf {F}})\le \varPhi (\mathbf {Z}, \mathbf {F})\) is established for any \((\mathbf {Z}, \mathbf {F})\), which validates the optimality of \((\mathbf {Z}^*, \tilde{\mathbf {F}})\). Therefore, any optimal solution of NonCoTask-\(\mathbf {Z}\) combined with \(\mathbf {F}\) derived from (4) is an optimal solution of NonCoTask.

Next, we prove that for any optimal solution of NonCoTask, e.g., \((\mathbf {Z}^*, \mathbf {F}^*)\), \(\mathbf {Z}^*\) is an optimal solution of NonCoTask-\(\mathbf {Z}\) and \(\mathbf {F}^*\) satisfies (4). The feasibility of \(\mathbf {Z}^*\) for NonCoTask-\(\mathbf {Z}\) is not hard to verify. For any feasible solution \(\mathbf {Z}\) of NonCoTask-\(\mathbf {Z}\), it naturally satisfies constraint (1) in NonCoTask, which implies that \((\mathbf {Z}, \mathbf {F}^*)\) is feasible for NonCoTask. Be definition, \(\varPhi (\mathbf {Z}^*, \mathbf {F}^*) \le \varPhi (\mathbf {Z}, \mathbf {F}^*)\) holds. Since \(\varPhi (\mathbf {Z}^*, \mathbf {F}^*)=\varOmega (\mathbf {Z}^*)\) and \(\varPhi (\mathbf {Z}, \mathbf {F}^*)=\varOmega (\mathbf {Z})\) hold, we have \(\varOmega (\mathbf {Z}^*)=\varPhi (\mathbf {Z}^*, \mathbf {F}^*)\le \varPhi (\mathbf {Z}, \mathbf {F}^*)=\varOmega (\mathbf {Z}),\) which leads to \(\varOmega (\mathbf {Z}^*)\le \varOmega (\mathbf {Z})\). The optimality of \(\mathbf {Z}^*\) is thus established.

Moreover, since (4) means that \(\mathbf {F}^*\) is an optimal solution of NonCoTask under a given \(\mathbf {Z}\), proving that \(\mathbf {F}^*\) satisfies (4) is equivalent to proving that \(\mathbf {F}^*\) is an optimal solution of NonCoTask under given \(\mathbf {Z}^*\). For any \(\mathbf {F}\) satisfying (2) and (3), \((\mathbf {Z}^*, \mathbf {F})\) is feasible for NonCoTask and \(\varPhi (\mathbf {Z}^*, \mathbf {F}^*)\le \varPhi (\mathbf {Z}^*, \mathbf {F})\) thus holds. Then, \(\mathbf {F}^*\) is an optimal solution of NonCoTask under given \(\mathbf {Z}^*\). Lastly, based on the above proofs, it is easy to validate the equivalence of the optimal values of NonCoTask and NonCoTask-\(\mathbf {Z}\). This lemma thus holds.

1.2 Appendix B: Proof of Lemma 4

Proof

First, the nonempty property of \(\mathcal {I}\) is obvious due to \(N\ge 2\) and \(M\ge 2\). Second, if \(A\subseteq B\in \mathcal {I}\), then \(A\in \mathcal {I}\). If not, there exists at least two different elements \(u_1, u_2\in A\) are adjacent. Since \(A\subseteq B\) holds, \(u_1, u_2\in B\), which contradicts \(B\in \mathcal {I}\). Thus, the monotone property is proven. Last, suppose \(A, B\in \mathcal {I}\) and \(|A|<|B|\). If there does not exist an \(u\in B\) such that \(A\cup \{u\}\in \mathcal {I}\), then for any element \(u\in B\), \(A\cup \{u\}\notin \mathcal {I}\). Since \(A\in \mathcal {I}\), every element in B is adjacent with some element in A. Due to \(|A|<|B|\), there exist at least two elements \(u_1, u_2\in B\) adjacent with the same element \(w\in A\), which means that \(u_1\) and \(u_2\) are also adjacent with each other. This obviously contradicts with \(B\in \mathcal {I}\). Therefore, \(\mathfrak {M}:=\{U, \mathcal {I}\}\) is a matroid.

According to the construction of \(\mathfrak {M}\), it is not hard to obtain that the size of the matroid \(\mathfrak {M}\) is N, since there are N tasks. Denote \(\mathcal {B}(\mathfrak {M})\) be the set of bases of \(\mathfrak {M}\). Next, we prove that the constraint of NonCoTask-\(\mathbf {Z}\) is equivalent to finding a set \(S\in U\) such that \(S\in \mathcal {B}(\mathfrak {M})\). In light of the relationship among U, \(\mathcal {G}\), and \(\mathcal {I}\), \(\sum _{j=1}^M z_{ij}=1\) with \(z_{ij}\in \{0,1\}\) means finding a vertex from the adjacent vertices associated with task i in \(\mathcal {G}\). Since any two vertices associated with different tasks are nonadjacent in \(\mathcal {G}\), the constraint of NonCoTask-\(\mathbf {Z}\) actually requires N nonadjacent vertices in \(\mathcal {G}\), which constitutes a base of \(\mathfrak {M}\). The lemma is thus proved.

1.3 Appendix C: Proof of Lemma 5

Proof

We first prove that \(\hat{\varPhi }(\mathbf {Z},\mathbf {F}) \le \varPhi (\mathbf {Z},\mathbf {F})\) holds by construction. Recall that in NonCoTask, the optimization of both offloading decision \(\mathbf {Z}\) and computation resource allocation \(\mathbf {F}\) for each task is unaware of the task correlation and all tasks are executed independently. We divide it into two cases, according to the task correlation under the offloading decision \(\mathbf {Z}\). One case is that no correlation precisely exists for all tasks offloaded to any server under \(\mathbf {Z}\). In this case, CoTask is equivalent to NonCoTask, which results in \(\hat{\varPhi }(\mathbf {Z}, \mathbf {F}) = \varPhi (\mathbf {Z}, \mathbf {F})\).

The other case is that there exist at least two correlated tasks offloaded to one of the edge servers under \(\mathbf {Z}\). Without loss of generality, suppose tasks \(i_1\), \(i_2\in \mathcal {N}\), whose workloads are \(w_{i_1}\) and \(w_{i_2}\), respectively, are correlated with a common workload \(\varDelta w_k\) (group index \(k=g(i_1)=g(i_2)\)) and offloaded to server \(j\in \mathcal {M}\). Assume that they are allocated \(f_{i_1j}\) and \(f_{i_2j}\) fractions of the processing power \(C_j\) in NonCoTask, respectively. Then, the overall latency of these two tasks in NonCoTask is \(t_{NC}(i_1, i_2) = \frac{w_{i_1}}{f_{i_1j}C_j} + \frac{w_{i_2}}{f_{i_2j}C_j}.\) We now construct a feasible computation resource allocation \(\hat{F}'\) to CoTask under \(\mathbf {Z}\), with a smaller overall latency than \(t_{NC}(i_1, i_2)\). We consider the computation resource allocation between task \(i_1\) and \(i_2\) only, while the setting for other tasks remains unchanged. Hence, we only compare the overall latency of task \(i_1\) and \(i_2\) with and without task correlation. The overall latency of task \(i_1\) and \(i_2\) in CoTask is \(t_{C}(i_1, i_2) = \frac{2\varDelta w_k}{(f_{i_1j}+f_{i_2j})C_j} + \frac{w_{i_1}-\varDelta w_k}{f_{i_1j}C_j} + \frac{w_{i_2}-\varDelta w_k}{f_{i_2j}C_j}.\) Since \(\frac{\varDelta w_k}{(f_{i_1j}+f_{i_2j})C_j} < \frac{\varDelta w_k}{f_{i_1j}}\) and \(\frac{\varDelta w_k}{(f_{i_1j}+f_{i_2j})C_j} < \frac{\varDelta w_k}{f_{i_2j}}\), we then have \(t_{C}(i_1, i_2) < t_{NC}(i_1, i_2)\) holds, which results in \(\hat{\varPhi }(\mathbf {Z}, \mathbf {F}) < \varPhi (\mathbf {Z}, \mathbf {F})\).

Next, we prove that \((1-\lambda )\varPhi (\mathbf {Z},\mathbf {F}) \le \hat{\varPhi }(\mathbf {Z},\mathbf {F})\) holds by

$$\begin{aligned} \hat{\varPhi }(\mathbf {Z},\mathbf {F})= & {} \sum \limits _{i=1}^N\sum \limits _{j=1}^M \left[ z_{ij} \frac{d_i}{B_j\log (1+\eta _{ij})}\sum \limits _{\hat{i}=1}^N z_{\hat{i}j} +\right. \nonumber \\&\quad \quad \quad \left. z_{ij} \left( \frac{\varDelta w_{g(i)}}{\sum _{i^{\prime }=1|g(i^{\prime })=g(i)}^N f_{i^{\prime }j} C_j} + \frac{w_{i} - \varDelta w_{g(i)}}{f_{ij} C_j}\right) \right] \nonumber \\\ge & {} \sum \limits _{i=1}^N\sum \limits _{j=1}^M \left[ z_{ij} \frac{d_i}{B_j\log (1+\eta _{ij})}\sum \limits _{\hat{i}=1}^N z_{\hat{i}j} + z_{ij} \frac{w_{i} - \varDelta w_{g(i)}}{f_{ij} C_j}\right] \end{aligned}$$
(13)
$$\begin{aligned}\ge & {} \sum \limits _{i=1}^N\sum \limits _{j=1}^M \left[ z_{ij} \frac{d_i}{B_j\log (1+\eta _{ij})}\sum \limits _{\hat{i}=1}^N z_{\hat{i}j} + z_{ij} \frac{(1-\lambda )w_i}{f_{ij} C_j}\right] \\= & {} (1-\lambda )\varPhi (\mathbf {Z},\mathbf {F}) + \lambda \sum \limits _{i=1}^N\sum \limits _{j=1}^M z_{ij}\frac{d_i}{B_j\log (1+\eta _{ij})}\sum \limits _{\hat{i}=1}^N z_{\hat{i}j}\nonumber \\\ge & {} (1-\lambda )\varPhi (\mathbf {Z},\mathbf {F}), \end{aligned}$$
(14)

where (12), (13), and (14) are due to \(\varDelta w_{g(i)}\ge 0\), \(\varDelta w_{g(i)} \le \lambda w_i\), and \(\lambda z_{ij}\frac{d_i}{B_j\log (1+\eta _{ij})}\sum _{\hat{i}=1}^N z_{\hat{i}j} \ge 0\), respectively.

1.4 Appendix D: Proof of Theorem 3

Proof

Let \(\mathbf {Z}^0\) and \(\mathbf {F}^0\) be the offloading decision and computation resource allocation derived in step 1 and step 2 in Algorithm 2, respectively. To avoid repetition, the feasibility of \((\mathbf {Z}^0, \mathbf {F}^0)\), \((\hat{\mathbf {Z}}, \hat{\mathbf {F}})\) for both CoTask and NonCoTask is not described again. Based on the previous analysis, we have

$$\begin{aligned} \hat{\varPhi }(\mathbf {Z}^0, \mathbf {F}^0)&\le \varPhi (\mathbf {Z}^0, \mathbf {F}^0)\end{aligned}$$
(15)
$$\begin{aligned}&\le \left( \frac{1}{6}-\varepsilon \right) \varPhi (\mathbf {Z}^*, \mathbf {F}^*) + \left( \frac{5}{6}+\varepsilon \right) H_{\max }\end{aligned}$$
(16)
$$\begin{aligned}&\le \left( \frac{1}{6}-\varepsilon \right) \frac{1}{1-\lambda }\hat{\varPhi }(\hat{\mathbf {Z}}^*, \hat{\mathbf {F}}^*) + \left( \frac{5}{6}+\varepsilon \right) H_{\max }, \end{aligned}$$
(17)

where (15), (16), and (17) are due to Lemma 5, Theorem 2, and Lemma 6, respectively. Moreover, since in Algorithm 2, we always search a better solution of CoTask than \((\mathbf {Z}^0, \mathbf {F}^0)\), we have \(\hat{\varPhi }(\hat{\mathbf {Z}}, \hat{\mathbf {F}})\le \hat{\varPhi }(\mathbf {Z}^0, \mathbf {F}^0)\), which results in the performance bound as in the theorem. As to the time complexity, compared with Algorithm 1, steps 4-19 need extra \(O(N^2M^2)\) operations. According to Theorem 2, the time complexity of Algorithm 2 is \(O\left( \frac{1}{\varepsilon }N^4M^4\log (NM-N)+NM+N^2M^2\right) =O\left( \frac{1}{\varepsilon }N^4M^4\log (NM-N)+N^2M^2\right)\).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Qu, Y., Dai, H., Wang, L. et al. CoTask: Correlation-aware task offloading in edge computing. World Wide Web 25, 2185–2213 (2022). https://doi.org/10.1007/s11280-022-01047-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-022-01047-w

Keywords

Navigation