Fig. 7From: A collaborative scheduling strategy for IoV computing resources considering location privacy protection in mobile edge computing environmentComparison of the results for the proposed scheduling strategy under different greedy factorsBack to article page