{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:17:56Z","timestamp":1743085076648,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242640"},{"type":"electronic","value":"9783030242657"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24265-7_26","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:03:34Z","timestamp":1563404614000},"page":"299-308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Task Scheduling Algorithm Based on Campus Cloud Platform"],"prefix":"10.1007","author":[{"given":"Zuo-cong","family":"Chen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","volume":"47","author":"IAT Hashem","year":"2015","unstructured":"Hashem, I.A.T., Yaqoob, I., Anuar, N.B., et al.: The rise of \u201cbig data\u201d on cloud computing: review and open research issues. Inf. Syst. 47, 98\u2013115 (2015)","journal-title":"Inf. Syst."},{"key":"26_CR2","volume-title":"Cloud Computing: Implementation, Management, and Security","author":"JW Rittinghouse","year":"2016","unstructured":"Rittinghouse, J.W., Ransome, J.F.: Cloud Computing: Implementation, Management, and Security. CRC Press, Boca Raton (2016)"},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., De Donato, W., Persico, V., et al.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684\u2013700 (2016)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"26_CR4","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1109\/TII.2014.2306383","volume":"10","author":"F Tao","year":"2014","unstructured":"Tao, F., Cheng, Y., Da Xu, L., et al.: CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system. IEEE Trans. Ind. Inform. 10(2), 1435\u20131442 (2014)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"1","key":"26_CR5","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1109\/SURV.2013.050113.00090","volume":"16","author":"Z Sanaei","year":"2014","unstructured":"Sanaei, Z., Abolfazli, S., Gani, A., et al.: Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Commun. Surv. Tutor. 16(1), 369\u2013392 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.jnca.2015.05.016","volume":"59","author":"K Gai","year":"2016","unstructured":"Gai, K., Qiu, M., Zhao, H., et al.: Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. J. Netw. Comput. Appl. 59, 46\u201354 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1016\/j.future.2015.08.006","volume":"56","author":"M Abdullahi","year":"2016","unstructured":"Abdullahi, M., Ngadi, M.A.: Symbiotic organism Search optimization based task scheduling in cloud computing environment. Future Gener. Comput. Syst. 56, 640\u2013650 (2016)","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"26_CR8","doi-asserted-by":"publisher","first-page":"44","DOI":"10.7763\/IJMO.2015.V5.434","volume":"5","author":"NJ Navimipour","year":"2015","unstructured":"Navimipour, N.J., Milani, F.S.: Task scheduling in the cloud computing based on the cuckoo search algorithm. Int. J. Model. Optim. 5(1), 44 (2015)","journal-title":"Int. J. Model. Optim."},{"issue":"6","key":"26_CR9","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1002\/dac.2743","volume":"28","author":"F Guo","year":"2015","unstructured":"Guo, F., Yu, L., Tian, S., et al.: A workflow task scheduling algorithm based on the resources\u2019 fuzzy clustering in cloud computing environment. Int. J. Commun. Syst. 28(6), 1053\u20131067 (2015)","journal-title":"Int. J. Commun. Syst."},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Wang, T., Liu, Z., Chen, Y., et al.: Load balancing task scheduling based on genetic algorithm in cloud computing. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 146\u2013152. IEEE (2014)","DOI":"10.1109\/DASC.2014.35"},{"issue":"1","key":"26_CR11","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/JSYST.2015.2442994","volume":"11","author":"Y Li","year":"2017","unstructured":"Li, Y., Chen, M., Dai, W., et al.: Energy optimization with dynamic task scheduling mobile cloud computing. IEEE Syst. J. 11(1), 96\u2013105 (2017)","journal-title":"IEEE Syst. J."},{"key":"26_CR12","unstructured":"Li, Z.Y., Yun, Q.S.: On the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing. Comput. Mater. Continua 55(3), 523\u2013539 (2018)"},{"issue":"1","key":"26_CR13","first-page":"95","volume":"55","author":"RC Jie","year":"2018","unstructured":"Jie, R.C., Ruo, M.X., et al.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput. Mater. Continua 55(1), 95\u2013119 (2018)","journal-title":"Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24265-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T16:17:40Z","timestamp":1594311460000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24265-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242640","9783030242657"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24265-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}