{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:13:16Z","timestamp":1743027196808,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030688837"},{"type":"electronic","value":"9783030688844"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68884-4_37","type":"book-chapter","created":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:29:09Z","timestamp":1612826949000},"page":"444-453","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Deep Learning-Based Dew Computing with Novel Offloading Strategy"],"prefix":"10.1007","author":[{"given":"Md Noman Bin","family":"Khalid","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,7]]},"reference":[{"issue":"5","key":"37_CR1","first-page":"1412","volume":"5","author":"P Kukreja","year":"2016","unstructured":"Kukreja, P., Sharma, D.: A detail review on cloud, fog and dew computing. Int. J. Sci. Eng. Technol. Res. (IJSETR) 5(5), 1412\u20131420 (2016)","journal-title":"Int. J. Sci. Eng. Technol. Res. (IJSETR)"},{"key":"37_CR2","unstructured":"Pan, Y., Thulasiraman, P., Wang, Y.: Overview of cloudlet, fog computing, edge computing, and dew computing. In: Proceedings of the 3rd International Workshop on Dew Computing, pp. 20\u201323 (2018)"},{"issue":"1","key":"37_CR3","first-page":"1","volume":"3","author":"Y Wang","year":"2016","unstructured":"Wang, Y.: Definition and categorization of dew computing. Open J. Cloud Comput. (OJCC) 3(1), 1\u20137 (2016)","journal-title":"Open J. Cloud Comput. (OJCC)"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. NIST Special Publication 800-145 (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"issue":"1","key":"37_CR5","first-page":"16","volume":"2","author":"K Skala","year":"2015","unstructured":"Skala, K., Davidovic, D., Afgan, E., Sovic, I., Sojat, Z.: Scalable distributed computing hierarchy: cloud, fog and dew computing. Open J. Cloud Comput. 2(1), 16\u201324 (2015)","journal-title":"Open J. Cloud Comput."},{"key":"37_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-94890-4_1","volume-title":"Fog Computing","author":"Z Mahmood","year":"2018","unstructured":"Mahmood, Z., Ramachandran, M.: Fog computing: concepts, principles and related paradigms. In: Mahmood, Z. (ed.) Fog Computing, pp. 3\u201321. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94890-4_1"},{"key":"37_CR7","unstructured":"Loncar, P.: Data-intensive computing paradigms for big data. In: Annals of DAAAM and Proceedings of the International DAAAM Symposium, vol. 29, no. 1, pp. 1010\u20131018 (2018)"},{"issue":"3","key":"37_CR8","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1504\/IJCC.2015.071717","volume":"4","author":"Y Wang","year":"2015","unstructured":"Wang, Y.: Cloud-dew architecture. Int. J. Cloud Comput. 4(3), 199 (2015)","journal-title":"Int. J. Cloud Comput."},{"issue":"4","key":"37_CR9","doi-asserted-by":"publisher","first-page":"835","DOI":"10.3390\/s19040835","volume":"19","author":"J Kang","year":"2019","unstructured":"Kang, J., Eom, D.S.: Offloading and transmission strategies for IoT edge devices and networks. Sensors (Switzerland) 19(4), 835 (2019)","journal-title":"Sensors (Switzerland)"},{"key":"37_CR10","doi-asserted-by":"publisher","first-page":"67734","DOI":"10.1109\/ACCESS.2019.2918585","volume":"7","author":"X Xu","year":"2019","unstructured":"Xu, X., Li, D., Dai, Z., Li, S., Chen, X.: A heuristic offloading method for deep learning edge services in 5G networks. IEEE Access 7, 67734\u201367744 (2019)","journal-title":"IEEE Access"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Huang, Y., Ma, X., Fan, X., Liu, J., Gong, W.: When deep learning meets edge computing. In: IEEE 25th International Conference on Network Protocols (ICNP), vol. 1, pp. 1\u20132 (2017)","DOI":"10.1109\/ICNP.2017.8117585"},{"issue":"4","key":"37_CR12","first-page":"30","volume":"15","author":"Y Wang","year":"2017","unstructured":"Wang, Y., Skala, K., Rindos, A., Gusev, M., Yang, S., Pan, Y.: Dew computing and transition of internet computing paradigms. ZTE Commun. 15(4), 30\u201337 (2017)","journal-title":"ZTE Commun."},{"key":"37_CR13","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: 3rd International Conference on Learning Representations (ICLR), p. 14 (2015)"},{"issue":"4","key":"37_CR14","first-page":"14","volume":"14","author":"Y Pan","year":"2017","unstructured":"Pan, Y., Luo, G.: ZTE communications special issue on cloud computing, fog computing, and dew computing. ZTE Commun. 14(4), 14\u201315 (2017)","journal-title":"ZTE Commun."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68884-4_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:49:48Z","timestamp":1612828188000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68884-4_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688837","9783030688844"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68884-4_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spaccs2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}