Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.


Download BibTeX


Green Time-Critical Fog Communication and Computing


[ 1 ] Instytut Radiokomunikacji, Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ 2 ] Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ P ] employee | [ SzD ] doctoral school student

Scientific discipline (Law 2.0)

[2.3] Information and communication technology

Year of publication


Published in

IEEE Communications Magazine

Journal year: 2023 | Journal volume: vol. 61 | Journal number: iss. 12

Article type

scientific article

Publication language


  • Task analysis
  • Wireless communication
  • Cloud computing
  • Energy efficiency
  • Energy consumption
  • Supercomputers
  • Optimization

EN Fog computing allows computationally-heavy problems with tight time constraints to be solved even if end devices have limited computational resources and latency induced by cloud computing is too high. How can energy consumed by fog computing be saved while obeying latency constraints and considering not only computations but also transmission through wireless and wired links? This work examines the latency and energy consumption sources in fog networks and discusses models describing these costs for various technologies. Next, resource allocation strategies are discussed considering the various degrees of freedom available in such a complex system, and their influence on energy consumption and latency. Finally, a vision for a future distributed, AI-driven resources allocation strategy is presented and justified.

Pages (from - to)

40 - 45




License type

CC BY (attribution alone)

Open Access Mode

czasopismo hybrydowe

Open Access Text Version

final published version

Date of Open Access to the publication

at the time of publication

Ministry points / journal


Impact Factor

11,2 [List 2022]

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.