{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:21:29Z","timestamp":1742912489267,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030507183"},{"type":"electronic","value":"9783030507190"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50719-0_9","type":"book-chapter","created":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T23:09:17Z","timestamp":1592435357000},"page":"101-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Reliability Analysis of a Multipath Transport System in Fog Computing"],"prefix":"10.1007","author":[{"given":"Udo R.","family":"Krieger","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2936-7642","authenticated-orcid":false,"given":"Natalia M.","family":"Markovich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,18]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Aazam, M., Huh, E.-N.: Fog computing and smart gateway based communication for cloud of things. In: 2014 International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, Spain, 27\u201329 August, pp. 464\u2013470 (2014)","DOI":"10.1109\/FiCloud.2014.83"},{"issue":"4","key":"9_CR2","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., et al.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/978-3-642-20757-0_35","volume-title":"NETWORKING 2011","author":"S Barr\u00e9","year":"2011","unstructured":"Barr\u00e9, S., Paasch, C., Bonaventure, O.: MultiPath TCP: from theory to practice. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds.) NETWORKING 2011. LNCS, vol. 6640, pp. 444\u2013457. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20757-0_35"},{"key":"9_CR4","volume-title":"Nonnegative Matrices in the Mathematical Sciences","author":"A Berman","year":"1979","unstructured":"Berman, A., Plemmons, R.J.: Nonnegative Matrices in the Mathematical Sciences. Academic Press, New York (1979)"},{"key":"9_CR5","unstructured":"Bonaventure, O., et al.: Multipath QUIC. In: CoNEXT 2017, Seoul\/Incheon, South Korea, 12\u201315 December (2017). See also https:\/\/multipath-quic.org\/"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Chakravarthy, S. R.: Markovian Arrival Processes. In: Wiley Encyclopedia of Operations Research and Management Science (2011)","DOI":"10.1002\/9780470400531.eorms0499"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Cech, H., Gro\u00dfmann, M., Krieger, U.R.: A fog computing architecture to share sensor data by means of blockchain functionality. In: IEEE International Conference on Fog Computing, Prague, Czech Republic, 24\u201326 June (2019)","DOI":"10.1109\/ICFC.2019.00013"},{"issue":"6","key":"9_CR8","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang, M., Zhang, T.: Fog and IoT: an overview of research opportunities. IEEE Internet Things J. 3(6), 854\u2013864 (2016)","journal-title":"IEEE Internet Things J."},{"key":"9_CR9","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-319-60447-3_6","volume-title":"Innovations for Community Services","author":"A Eiermann","year":"2017","unstructured":"Eiermann, A., Renner, M., Gro\u00dfmann, M., Krieger, U.R.: On a fog computing platform built on ARM architectures by Docker container technology. In: Eichler, G., Erfurth, C., Fahrnberger, G. (eds.) I4CS 2017. CCIS, vol. 717, pp. 71\u201386. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60447-3_6"},{"issue":"2","key":"9_CR10","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/0166-5316(93)90035-S","volume":"18","author":"W Fischer","year":"1993","unstructured":"Fischer, W., Meier-Hellstern, K.: The Markov-modulated Poisson process (MMPP) cookbook. Perform. Eval. 18(2), 149\u2013171 (1993)","journal-title":"Perform. Eval."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Gro\u00dfmann, M., Ioannidis, C.: Continuous integration of applications for ONOS. In: 5th IEEE Conference on Network Softwarization (NetSoft 2019), Paris, France, 24\u201328 June (2019)","DOI":"10.1109\/NETSOFT.2019.8806696"},{"key":"9_CR12","volume-title":"Orchestrating Docker","author":"S Holla","year":"2015","unstructured":"Holla, S.: Orchestrating Docker. Packt Publishing Ltd., Birmingham (2015)"},{"issue":"1(48)","key":"9_CR13","first-page":"39","volume":"13","author":"D Kozyrev","year":"2018","unstructured":"Kozyrev, D., Rykov, V., Kolev, N.: Reliability function of renewable system with Marshall-Olkin failure model. Reliab. Theory Appl. 13(1(48)), 39\u201346 (2018)","journal-title":"Reliab. Theory Appl."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Kozyrev, D., et al.: Mobility-centric analysis of communication offloading for heterogeneous Internet of Things devices. Wireless Commun. Mob. Comput. 2018 (2018). Article ID 3761075","DOI":"10.1155\/2018\/3761075"},{"issue":"9","key":"9_CR15","doi-asserted-by":"publisher","first-page":"1630","DOI":"10.1109\/49.62851","volume":"8","author":"UR Krieger","year":"1990","unstructured":"Krieger, U.R., M\u00fcller-Clostermann, B., Sczittnick, M.: Modeling and analysis of communication systems based on computational methods for Markov chains. IEEE J. Sel. Areas Commun. 8(9), 1630\u20131648 (1990)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9_CR16","first-page":"303","volume-title":"Numerical Solution of Markov Chains","author":"UR Krieger","year":"1990","unstructured":"Krieger, U.R.: Analysis of a loss system with mutual overflow in a Markovian environment. In: Stewart, W. (ed.) Numerical Solution of Markov Chains, pp. 303\u2013328. Marcel Dekker, New York (1990)"},{"issue":"224","key":"9_CR17","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/0024-3795(95)00166-O","volume":"223","author":"UR Krieger","year":"1995","unstructured":"Krieger, U.R.: On a two-level multigrid solution method for finite Markov chains. Linear Algebra Appl. 223(224), 415\u2013438 (1995)","journal-title":"Linear Algebra Appl."},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/978-1-4615-2241-6_23","volume-title":"Computations with Markov Chains","author":"UR Krieger","year":"1995","unstructured":"Krieger, U.R.: Numerical solution of large finite Markov chains by algebraic multigrid techniques. In: Stewart, W. (ed.) Computations with Markov Chains, pp. 403\u2013424. Kluwer Academic Publishers, Boston (1995). https:\/\/doi.org\/10.1007\/978-1-4615-2241-6_23"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-030-36614-8_23","volume-title":"Distributed Computer and Communication Networks","author":"UR Krieger","year":"2019","unstructured":"Krieger, U.R., Markovich, N.: Modeling and reliability analysis of a redundant transport system in a Markovian environment. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. LNCS, vol. 11965, pp. 302\u2013314. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36614-8_23"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/MCOM.2017.1600156CM","volume":"55","author":"BP Rimal","year":"2017","unstructured":"Rimal, B.P., Van, D.P., Maier, M.: Mobile edge computing empowered fiber-wireless access networks in the 5G era. IEEE Commun. Mag. 55, 192\u2013200 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-319-71504-9_19","volume-title":"Analytical and Computational Methods in Probability Theory","author":"VV Rykov","year":"2017","unstructured":"Rykov, V.V., Kozyrev, D.V.: Analysis of renewable reliability systems by markovization method. In: Rykov, V.V., Singpurwalla, N.D., Zubkov, A.M. (eds.) ACMPT 2017. LNCS, vol. 10684, pp. 210\u2013220. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71504-9_19"},{"key":"9_CR22","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-99447-5_20","volume-title":"Distributed Computer and Communication Networks","author":"V Rykov","year":"2018","unstructured":"Rykov, V., Zaripova, E., Ivanova, N., Shorgin, S.: On sensitivity analysis of steady state probabilities of double redundant renewable system with Marshall-Olkin failure model. In: Vishnevskiy, V.M., Kozyrev, D.V. (eds.) DCCN 2018. CCIS, vol. 919, pp. 234\u2013245. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99447-5_20"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-030-36614-8_18","volume-title":"Distributed Computer and Communication Networks","author":"V Rykov","year":"2019","unstructured":"Rykov, V., Dimitrov, B.: Renewal redundant systems under the Marshall-Olkin failure model. Sensitivity analysis. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. LNCS, vol. 11965, pp. 234\u2013248. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36614-8_18"},{"key":"9_CR24","volume-title":"Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud","author":"W Stallings","year":"2016","unstructured":"Stallings, W.: Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud. Pearson, Indianapolis (2016)"},{"key":"9_CR25","doi-asserted-by":"publisher","DOI":"10.1515\/9781400832811","volume-title":"Probability, Markov Chains, Queues, and Simulation","author":"WJ Stewart","year":"2009","unstructured":"Stewart, W.J.: Probability, Markov Chains, Queues, and Simulation. Princeton University Press, Princeton (2009)"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Ziegler, H.M., et al.: Integration of fog computing and blockchain technology using the plasma framework. In: Proceedings of the EEE International Conference on Blockchain and Cryptocurrency (ICBC 2019), May 2019, Seoul, South Korea (2019)","DOI":"10.1109\/BLOC.2019.8751308"}],"container-title":["Communications in Computer and Information Science","Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50719-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T11:36:31Z","timestamp":1710243391000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50719-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030507183","9783030507190"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50719-0_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gda\u0144sk","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cn2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cn.polsl.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"eConf","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}