{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:53:54Z","timestamp":1743080034758,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030595050"},{"type":"electronic","value":"9783030595067"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59506-7_9","type":"book-chapter","created":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T23:07:55Z","timestamp":1602112075000},"page":"102-112","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Model-Driven Framework for Optimum Application Placement in Fog Computing Using a Machine Learning Based Approach"],"prefix":"10.1007","author":[{"given":"Madeha","family":"Arif","sequence":"first","affiliation":[]},{"given":"Farooque","family":"Azam","sequence":"additional","affiliation":[]},{"given":"Muhammad Waseem","family":"Anwar","sequence":"additional","affiliation":[]},{"given":"Yawar","family":"Rasheed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,8]]},"reference":[{"issue":"4","key":"9_CR1","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surveys Tuts. 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"5","key":"9_CR2","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin, J., et al.: A survey on Internet of Things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125\u20131142 (2017)","journal-title":"IEEE Internet Things J."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13\u201316. ACM (2012)","DOI":"10.1145\/2342509.2342513"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: FedCSIS. IEEE (2014)","DOI":"10.15439\/2014F503"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Qin, B., et al.: Design and application of fog computing model based on big data. In: 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT), pp. 93\u201397. IEEE, March 2019","DOI":"10.1109\/INFOCT.2019.8711436"},{"key":"9_CR6","unstructured":"Wang, P., Liu, S., Ye, F. and Chen, X.: A fog-based architecture and programming model for iot applications in the smart grid (2018). arXiv preprint \narXiv:1804.01239"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Dang, T.D., Hoang, D.: A data protection model for fog computing. In: 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), pp. 32\u201338. IEEE, May 2017","DOI":"10.1109\/FMEC.2017.7946404"},{"issue":"3","key":"9_CR8","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1109\/JCN.2018.000036","volume":"20","author":"B Jia","year":"2018","unstructured":"Jia, B., Hu, H., Zeng, Y., Xu, T., Yang, Y.: Double-matching resource allocation strategy in fog computing networks based on cost efficiency. J. Commun. Networks 20(3), 237\u2013246 (2018)","journal-title":"J. Commun. Networks"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Mohamed, N., Al-Jaroodi, J., Jawhar, I., Noura, H., Mahmoud, S.: UAVFog: a UAV-based fog computing for Internet of Things. In: 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), pp. 1\u20138. IEEE, August 2017","DOI":"10.1109\/UIC-ATC.2017.8397657"},{"issue":"16","key":"9_CR10","doi-asserted-by":"publisher","first-page":"e3975","DOI":"10.1002\/cpe.3975","volume":"29","author":"H Yao","year":"2017","unstructured":"Yao, H., Bai, C., Xiong, M., Zeng, D., Fu, Z.: Heterogeneous cloudlet deployment and user-cloudlet association toward cost effective fog computing. Concurr. Comput. Pract. Experience (CCPE) 29(16), e3975 (2017)","journal-title":"Concurr. Comput. Pract. Experience (CCPE)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Minh, Q.T., et al.: Toward service placement on fog computing landscape. In: 2017 4th NAFOSTED Conference on Information and Computer Science. IEEE (2017)","DOI":"10.1109\/NAFOSTED.2017.8108080"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.jpdc.2018.03.004","volume":"132","author":"R Mahmud","year":"2019","unstructured":"Mahmud, R., Srirama, S.N., Ramamohanarao, K., Buyya, R.: Quality of experience (QoE)-aware placement of applications in fog computing environments. J. Parallel Distrib. Comput. 132, 190\u2013203 (2019)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"4","key":"9_CR13","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/s11761-017-0219-8","volume":"11","author":"O Skarlat","year":"2017","unstructured":"Skarlat, O., Nardelli, M., Schulte, S., Borkowski, M., Leitner, P.: Optimized IoT service placement in the fog. SOCA 11(4), 427\u2013443 (2017). \nhttps:\/\/doi.org\/10.1007\/s11761-017-0219-8","journal-title":"SOCA"},{"issue":"4","key":"9_CR14","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1080\/17517575.2017.1304579","volume":"12","author":"S Bitam","year":"2017","unstructured":"Bitam, S., Zeadally, S., Mellouk, A.: Fog computing job scheduling optimization based on bees swarm. Enterp. Inf. Syst. (EIS) 12(4), 373\u2013397 (2017)","journal-title":"Enterp. Inf. Syst. (EIS)"},{"key":"9_CR15","first-page":"20","volume":"19","author":"S Kabirzadeh","year":"2017","unstructured":"Kabirzadeh, S., Rahbari, D., Nickray, M.: A hyper heuristic algorithm for scheduling of fog networks. Algorithms 19, 20 (2017)","journal-title":"Algorithms"},{"issue":"2","key":"9_CR16","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1007\/s11277-017-5200-5","volume":"102","author":"Y Sun","year":"2018","unstructured":"Sun, Y., Lin, F., Xu, H.: Multi-objective optimization of resource scheduling in fog computing using an improved NSGA-II. Wirel. Pers. Commun. 102(2), 1369\u20131385 (2018)","journal-title":"Wirel. Pers. Commun."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Cardellini, V., et al.: On QoS-aware scheduling of data stream applications over fog computing infrastructures. In: 2015 IEEE Symposium on Computers and Communication (ISCC). IEEE (2015)","DOI":"10.1109\/ISCC.2015.7405527"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Rasheed, Y., et al.: A model-driven approach for creating storyboards of web based user interfaces. In: Proceedings of the 2019 7th International Conference on Computer and Communications Management. ACM (2019)","DOI":"10.1145\/3348445.3348465"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Khan, J.A., Westphal, C., Ghamri-Doudane, Y.: Offloading content with self-organizing mobile fogs. In: 2017 29th International Teletraffic Congress (ITC 29). IEEE (2017)","DOI":"10.23919\/ITC.2017.8064359"},{"issue":"12","key":"9_CR20","doi-asserted-by":"publisher","first-page":"7487","DOI":"10.1007\/s13369-018-3169-3","volume":"43","author":"C Li","year":"2018","unstructured":"Li, C., Zhuang, H., Wang, Q., Zhou, X.: SSLB: selfsimilarity-based load balancing for large-scale fog computing. Arab. J. Sci. Eng. 43(12), 7487\u20137498 (2018)","journal-title":"Arab. J. Sci. Eng."},{"issue":"2","key":"9_CR21","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/CC.2016.7405730","volume":"13","author":"X He","year":"2016","unstructured":"He, X., Ren, Z., Shi, C., Fang, J.: A novel load balancing strategy of software-defined cloud\/fog networking in the internet of vehicles. China Commun. (Chinacom) 13(2), 140\u2013149 (2016)","journal-title":"China Commun. (Chinacom)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Rasheed, Y., Azam, F., Anwar, M.W.: A novel framework and tool for multi-purpose modeling of physical infrastructures. In: 12th (ICCMS 2020), Brisbane Australia (2020)","DOI":"10.1145\/3408066.3408076"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Anglano, C., Canonico, M., Guazzone, M.: Profit-aware resource management for edge computing systems. In: Proceedings of the 1st International Workshop on Edge Systems, Analytics and Networking. ACM (2018)","DOI":"10.1145\/3213344.3213349"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., et al.: Fog computing and its role in the Internet of Things. In: Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13\u201316. ACM (2012)","DOI":"10.1145\/2342509.2342513"},{"key":"9_CR25","unstructured":"Yin, Y.: Research and implementation of embedded intelligent gateway based on Internet of Things. Beijing University of Technology (2013)"},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s10617-019-09229-y","volume":"4","author":"MW Anwar","year":"2019","unstructured":"Anwar, M.W., Rashid, M., Azam, F., Kashif, M., Butt, W.H.: A model-driven framework for design and verification of embedded systems through System Verilog. Des. Autom. Embed. Syst. 4, 179\u2013223 (2019). \nhttps:\/\/doi.org\/10.1007\/s10617-019-09229-y","journal-title":"Des. Autom. Embed. Syst."},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Xu, J., Ren, S.: Online learning for offloading and auto scaling in renewable-powered mobile edge computing. In: Global Communications Conference (GLOBECOM), IEEE. IEEE (2016)","DOI":"10.1109\/GLOCOM.2016.7842069"},{"key":"9_CR28","doi-asserted-by":"publisher","first-page":"104407","DOI":"10.1109\/ACCESS.2020.2999544","volume":"8","author":"MW Anwar","year":"2020","unstructured":"Anwar, M.W., Rashid, M., Azam, F., Naeem, A., Kashif, M., Butt, W.H.: A unified model-based framework for the simplified execution of static and dynamic assertion-based verification. IEEE Access 8, 104407\u2013104431 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"9_CR29","first-page":"114","volume":"33","author":"SK Sood","year":"2017","unstructured":"Sood, S.K., Singh, K.D.: SNA based resource optimization in optical network using fog and cloud computing. Opt. Switch Netw. 33(3), 114\u2013121 (2017)","journal-title":"Opt. Switch Netw."}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59506-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,7]],"date-time":"2020-10-07T23:09:49Z","timestamp":1602112189000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-59506-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030595050","9783030595067"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59506-7_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaunas","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icist2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icist.ktu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"78","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}