Security and Communication Networks / 2021 / Article / Fig 4

Research Article

Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing

Figure 4

The impact of different risk probabilities. (a) The workflow with 50 nodes. (b) The workflow with 100 nodes. (c) The workflow with 150 nodes.
(a)
(b)
(c)

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.