{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:02:26Z","timestamp":1725829346294},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319237268"},{"type":"electronic","value":"9783319237275"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23727-5_16","type":"book-chapter","created":{"date-parts":[[2015,9,2]],"date-time":"2015-09-02T05:02:05Z","timestamp":1441170125000},"page":"195-211","source":"Crossref","is-referenced-by-count":1,"title":["Characterization of Cyber-Foraging Usage Contexts"],"prefix":"10.1007","author":[{"given":"Grace A.","family":"Lewis","sequence":"first","affiliation":[]},{"given":"Patricia","family":"Lago","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,22]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Balasubramanian, N., Balasubramanian, A., Venkataramani, A.: Energy consumption in mobile phones: a measurement study and implications for network applications. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2009, pp. 280\u2013293. ACM, New York (2009)","DOI":"10.1145\/1644893.1644927"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/978-3-319-09970-5_15","volume-title":"Software Architecture","author":"GA Lewis","year":"2014","unstructured":"Lewis, G.A., Lago, P., Procaccianti, G.: Architecture strategies for cyber-foraging: preliminary results from a systematic literature review. In: Avgeriou, P., Zdun, U. (eds.) ECSA 2014. LNCS, vol. 8627, pp. 154\u2013169. Springer, Heidelberg (2014)"},{"key":"16_CR3","unstructured":"Lewis, G., Lago, P.: A catalogue of architectural tactics for cyber-foraging, Tech. rep., VU University Amsterdam (2014). \n                      http:\/\/goo.gl\/rDCt3V"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Lewis, G.,Lago, P.: A catalogue of architectural tactics for cyber-foraging. In: Proceedings of the 11th International ACM Sigsoft Conference on the Quality of Software Architectures (QoSA 2015) (2015)","DOI":"10.1145\/2737182.2737188"},{"issue":"4","key":"16_CR5","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MC.2010.98","volume":"43","author":"K Kumar","year":"2010","unstructured":"Kumar, K., Lu, Y.-H.: Cloud computing for mobile users: Can offloading computation save energy? Computer 43(4), 51\u201356 (2010)","journal-title":"Computer"},{"key":"16_CR6","unstructured":"Bass, L., Clements, P., Kazman, R.: Software architecture in practice, 3rd edn. Addison-Wesley (2012)"},{"key":"16_CR7","first-page":"84106","volume":"29","author":"N Fernando","year":"2012","unstructured":"Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: A survey. Future Generation Computer Systems 29, 84106 (2012)","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/SURV.2013.070813.00285","volume":"16","author":"S Abolfazli","year":"2014","unstructured":"Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., Buyya, R.: Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys Tutorials 16(1), 337\u2013368 (2014)","journal-title":"IEEE Communications Surveys Tutorials"}],"container-title":["Lecture Notes in Computer Science","Software Architecture"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23727-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T17:10:40Z","timestamp":1559236240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23727-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319237268","9783319237275"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23727-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}