Fig. 14From: Data offloading in IoT environments: modeling, analysis, and verificationComputation time of the proposed schemes by varying the number of a nodes, b messages, and c nodes and messagesBack to article page