Research Article
Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing
Figure 6
The performance of different risk coefficients. (a) The workflow with 50 nodes. (b) The workflow with 100 nodes. (c) The workflow with 150 nodes.
(a) |
(b) |
(c) |