Task Offloading in Edge and Cloud Computing:A Survey on Mathematical, Artificial Intelligenceand Control Theory Solutions

Firdose Saik, Marios Avgeris, Dimitrios Spatharakis, Nina Santi, Dimitrios Dechouniotis, John Violos, Aris Leivadeas, Nikolaos Athanasopoulos, Nathalie Mitton, Symeon Papavassiliou

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)


Next generation communication networks are expected to accommodate a high number of new and resource-voracious applications that can be offered to a large range of end users. Even though end devices are becoming more powerful, the available local resources cannot cope with the requirements of these applications. This has created a new challenge called task offloading, where computation intensive tasks need to be offloaded to more resource powerful remote devices. Naturally, the Cloud Computing is a well-tested infrastructure that can facilitate the task offloading. However, Cloud Computing as a centralized and distant infrastructure creates significant communication delays that cannot satisfy the requirements of the emerging delay-sensitive applications. To this end, the concept of Edge Computing has been proposed, where the Cloud Computing capabilities are repositioned closer to the end devices at the edge of the network. This paper provides a detailed survey of how the Edge and/or Cloud can be combined together to facilitate the task offloading problem. Particular emphasis is given on the mathematical, artificial intelligence and control theory optimization approaches that can be used to satisfy the various objectives, constraints and dynamic conditions of this end-to-end application execution approach. The survey concludes with identifying open challenges and future directions of the problem at hand.
Original languageEnglish
Article number 108177
Number of pages38
JournalComputer Networks
Early online date18 May 2021
Publication statusEarly online date - 18 May 2021


Dive into the research topics of 'Task Offloading in Edge and Cloud Computing:A Survey on Mathematical, Artificial Intelligenceand Control Theory Solutions'. Together they form a unique fingerprint.

Cite this