Security and Communication Networks / 2021 / Article / Fig 4

Research Article

Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing

Figure 4

The impact of different risk probabilities. (a) The workflow with 50 nodes. (b) The workflow with 100 nodes. (c) The workflow with 150 nodes.

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.