{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:54:44Z","timestamp":1751604884590,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030675493"},{"type":"electronic","value":"9783030675509"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-67550-9_13","type":"book-chapter","created":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T12:02:51Z","timestamp":1611057771000},"page":"195-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Intelligent Agent-Based Industrial IoT Framework for Time-Critical Data Stream Processing"],"prefix":"10.1007","author":[{"given":"Ines","family":"Gharbi","sequence":"first","affiliation":[]},{"given":"Kamel","family":"Barkaoui","sequence":"additional","affiliation":[]},{"given":"Ben Ahmed","family":"Samir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,20]]},"reference":[{"issue":"10","key":"13_CR1","doi-asserted-by":"publisher","first-page":"4674","DOI":"10.1109\/TII.2018.2855198","volume":"14","author":"M Aazam","year":"2018","unstructured":"Aazam, M., Zeadally, S., Harras, K.A.: Deploying fog computing in industrial internet of things and industry 4.0. IEEE Trans. Ind. Inform. 14(10), 4674\u20134682 (2018)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.3390\/electronics9091347","volume":"9","author":"F Alkhabbas","year":"2020","unstructured":"Alkhabbas, F., Spalazzese, R., Davidsson, P.: An agent-based approach to realize emergent configurations in the internet of things. Electronics 9, 1347 (2020). https:\/\/doi.org\/10.3390\/electronics9091347","journal-title":"Electronics"},{"issue":"7","key":"13_CR3","doi-asserted-by":"publisher","first-page":"1853","DOI":"10.3390\/s20071853","volume":"20","author":"AA Mutlag","year":"2020","unstructured":"Mutlag, A.A., et al.: MAFC: multi-agent fog computing model for healthcare critical tasks management. Sensors 20(7), 1853 (2020)","journal-title":"Sensors"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Auliva, R.S., Sheu, R., Liang, D., Wang, W.: IIoT testbed: a DDS-based emulation tool for industrial IoT applications. In: 2018 International Conference on System Science and Engineering (ICSSE), pp. 1\u20134 (2018)","DOI":"10.1109\/ICSSE.2018.8520091"},{"key":"13_CR5","doi-asserted-by":"publisher","unstructured":"Barkaoui, K., Ayed, R.B.: Uniform verification of workflow soundness. Trans. Inst. Measur. Control 33(1), 133\u2013148 (2011). https:\/\/doi.org\/10.1177\/0142331208095676. https:\/\/doi.org\/10.1177\/0142331208095676","DOI":"10.1177\/0142331208095676"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-01364-5_2","volume-title":"Web Services and Formal Methods","author":"K Barkaoui","year":"2009","unstructured":"Barkaoui, K., Boucheneb, H., Hicheur, A.: Modelling and analysis of time-constrained flexible workflows with time recursive ecatnets. In: Bruni, R., Wolf, K. (eds.) Web Services and Formal Methods, pp. 19\u201336. Springer, Berlin, Heidelberg (2009)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Baumg\u00e4rtel, H., Verbeet, R.: Service and agent based system architectures for industrie 4.0 systems. In: NOMS 2020\u20132020 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20136 (2020)","DOI":"10.1109\/NOMS47738.2020.9110406"},{"key":"13_CR8","doi-asserted-by":"publisher","unstructured":"Caiza, G., Saeteros, M., O\u00f1ate, W., Garcia, M.V.: Fog computing at industrial level, architecture, latency, energy, and security: a review. Heliyon 6(4), e03706 (2020). https:\/\/doi.org\/10.1016\/j.heliyon.2020.e03706. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S240584402030551X","DOI":"10.1016\/j.heliyon.2020.e03706"},{"key":"13_CR9","doi-asserted-by":"publisher","unstructured":"Foukalas, F.: Cognitive IoT platform for fog computing industrial applications. Comput. Electr. Eng. 87, 106770 (2020). https:\/\/doi.org\/10.1016\/j.compeleceng.2020.106770. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S004579062030625X","DOI":"10.1016\/j.compeleceng.2020.106770"},{"key":"13_CR10","doi-asserted-by":"publisher","unstructured":"Garc\u00eda Coria, J.A., Castellanos-Garz\u00f3n, J.A., Corchado, J.M.: Intelligent business processes composition based on multi-agent systems. Expert Syst. Appl. 41(4, Part 1), 1189\u20131205 (2014). https:\/\/doi.org\/10.1016\/j.eswa.2013.08.003. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0957417413006143","DOI":"10.1016\/j.eswa.2013.08.003"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-319-39595-1_14","volume-title":"Smart Cities","author":"A Giordano","year":"2016","unstructured":"Giordano, A., Spezzano, G., Vinci, A.: Smart agents and fog computing for smart city applications. In: Alba, E., Chicano, F., Luque, G. (eds.) Smart Cities, pp. 137\u2013146. Springer International Publishing, Cham (2016)"},{"issue":"9","key":"13_CR12","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/3409977","volume":"63","author":"S Greengard","year":"2020","unstructured":"Greengard, S.: Ai on edge. Commun. ACM 63(9), 18\u201320 (2020)","journal-title":"Commun. ACM"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Guth, J., Breitenb\u00fccher, U., Falkenthal, M., Leymann, F., Reinfurt, L.: Comparison of IoT platform architectures: a field study based on a reference architecture. In: 2016 Cloudification of the Internet of Things (CIoT), pp. 1\u20136, November 2016. DOIurl10.1109\/CIOT.2016.7872918","DOI":"10.1109\/CIOT.2016.7872918"},{"key":"13_CR14","unstructured":"King, M.: The business value of industrial IoT. LHP Engineering Solutions, p. 40 (2017). https:\/\/cdn2.hubspot.net\/hubfs\/2512687\/LHP%20Data%20Analytics%20-%20Business%20Value%20of%20IIoT%20-%20Automation%20Alley%2007122017.pdf?t=1500039830918"},{"key":"13_CR15","unstructured":"Lin, S.W., et al.: The industrial internet of things volume g1: reference architecture, industrial internet consortium. In: The Industrial Internet of Things Volume G1: Reference Architecture, Industrial Internet Consortium, pp. 117\u2013122 (2017). IIC:PUB:G1:V1.80:20170131. www.iiconsortium.org\/IIC_PUB_G1_V1.80_2017-01-31.pdf"},{"key":"13_CR16","unstructured":"Lu, Y.: Industry 4.0: a survey on technologies, applications and open research issues. J. Ind. Inf. Integr. 6, 1\u201310 (2017). DOIurl10.1016\/j.jii.2017.04.005. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2452414X17300043"},{"key":"13_CR17","doi-asserted-by":"publisher","unstructured":"Nyarko, E.K., Scitovski, R.: Solving the parameter identification problem of mathematical models using genetic algorithms. Appl. Math. Comput. 153(3), 651\u2013658 (2004). https:\/\/doi.org\/10.1016\/S0096-3003(03)00661-1. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0096300303006611","DOI":"10.1016\/S0096-3003(03)00661-1"},{"key":"13_CR18","doi-asserted-by":"publisher","first-page":"1660","DOI":"10.1109\/ACCESS.2015.2389854","volume":"2","author":"C Perera","year":"2014","unstructured":"Perera, C., Liu, C.H., Jayawardena, S., Chen, M.: A survey on internet of things from industrial market perspective. IEEE Access 2, 1660\u20131679 (2014). https:\/\/doi.org\/10.1109\/ACCESS.2015.2389854","journal-title":"IEEE Access"},{"key":"13_CR19","unstructured":"Puri, K.: Industrial internet of things (IIoT) - conceptual architecture, July 2016. https:\/\/www.infosysblogs.com\/data-analytics\/2016\/07\/industrial_internet_of_things_.html"},{"issue":"2","key":"13_CR20","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/EMR.2020.2992606","volume":"48","author":"D Sinha","year":"2020","unstructured":"Sinha, D., Roy, R.: Reviewing cyber-physical system as a part of smart factory in industry 4.0. IEEE Eng. Manage. Rev. 48(2), 103\u2013117 (2020)","journal-title":"IEEE Eng. Manage. Rev."},{"key":"13_CR21","doi-asserted-by":"publisher","unstructured":"Stojmenovic, I.: Fog computing: a cloud to the ground support for smart things and machine-to-machine networks. In: 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC), pp. 117\u2013122, November 2014. https:\/\/doi.org\/10.1109\/ATNAC.2014.7020884","DOI":"10.1109\/ATNAC.2014.7020884"},{"key":"13_CR22","doi-asserted-by":"publisher","unstructured":"Stout, W.M.S.: Toward a multi-agent system architecture for insight cybersecurity in cyber-physical networks. In: 2018 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20135, October 2018. https:\/\/doi.org\/10.1109\/CCST.2018.8585632","DOI":"10.1109\/CCST.2018.8585632"},{"key":"13_CR23","doi-asserted-by":"publisher","unstructured":"Tsinarakis, G.J., Spanoudakis, P.S., Arabatzis, G., Tsourveloudis, N.C., Doitsidis, L.: Implementation of a petri-net based digital twin for the development procedure of an electric vehicle. In: 2020 28th Mediterranean Conference on Control and Automation (MED), pp. 862\u2013867, September 2020. https:\/\/doi.org\/10.1109\/MED48518.2020.9182784","DOI":"10.1109\/MED48518.2020.9182784"},{"issue":"9","key":"13_CR24","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MCOM.2018.1701140","volume":"56","author":"R Yu","year":"2018","unstructured":"Yu, R., Xue, G., Kilari, V.T., Zhang, X.: The fog of things paradigm: road toward on-demand internet of things. IEEE Commun. Mag. 56(9), 48\u201354 (2018). https:\/\/doi.org\/10.1109\/MCOM.2018.1701140","journal-title":"IEEE Commun. Mag."}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-67550-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T12:17:49Z","timestamp":1611058669000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-67550-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030675493","9783030675509"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-67550-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"20 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MSPN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile, Secure, and Programmable Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mspn2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mspn2020.roc.cnam.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}