{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:27Z","timestamp":1742913987414,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811575297"},{"type":"electronic","value":"9789811575303"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-7530-3_40","type":"book-chapter","created":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T15:50:27Z","timestamp":1597333827000},"page":"529-540","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Evolutionary Task Offloading Schema for Edge Computing"],"prefix":"10.1007","author":[{"given":"Pei","family":"Sun","sequence":"first","affiliation":[]},{"given":"Baojing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shaocong","family":"Han","sequence":"additional","affiliation":[]},{"given":"Huizhong","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Zhenwei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,14]]},"reference":[{"issue":"1","key":"40_CR1","first-page":"23","volume":"18","author":"K Peng","year":"2017","unstructured":"Peng, K., Lin, R., Huang, B., Zou, H., Yang, F.: Link importance evaluation of data center network based on maximum flow. J. Internet Technol. 18(1), 23\u201331 (2017)","journal-title":"J. Internet Technol."},{"issue":"8","key":"40_CR2","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MCOM.2017.1601162","volume":"55","author":"W Quan","year":"2017","unstructured":"Quan, W., Liu, Y., Zhang, H., Yu, S.: Enhancing crowd collaborations for software defined vehicular networks. IEEE Commun. Mag. 55(8), 80\u201386 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"40_CR3","first-page":"1","volume":"1","author":"L Qi","year":"2015","unstructured":"Qi, L., Dou, W., Zhou, Y., Yu, J., Hu, C.: A context-aware service evaluation approach over big data for cloud applications. IEEE Trans. Cloud Comput. 1, 1 (2015)","journal-title":"IEEE Trans. Cloud Comput."},{"doi-asserted-by":"crossref","unstructured":"Li, W., Xia, Y., Zhou, M., Sun, X., Zhu, Q.: Fluctuation-aware and predictive workflow scheduling in cost-effective Infrastructure-as-a-Service clouds. IEEE Access (2018)","key":"40_CR4","DOI":"10.1109\/ACCESS.2018.2869827"},{"key":"40_CR5","first-page":"1","volume":"2017","author":"X Xu","year":"2017","unstructured":"Xu, X., Zhao, X., Ruan, F., et al.: Data placement for privacy-aware applications over big data in hybrid clouds. Secur. Commun. Netw. 2017, 1\u201315 (2017)","journal-title":"Secur. Commun. Netw."},{"unstructured":"Qi, L., Xu, X., Zhang, X., et al.: Structural balance theory-based e-commerce recommendation over big rating data. IEEE Trans. Big Data (2016)","key":"40_CR6"},{"key":"40_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-642-33065-0_17","volume-title":"Algorithms and Architectures for Parallel Processing","author":"K Peng","year":"2012","unstructured":"Peng, K., Zou, H., Lin, R., Yang, F.: Small business-oriented index construction of cloud data. In: Xiang, Y., Stojmenovic, I., Apduhan, B.O., Wang, G., Nakano, K., Zomaya, A. (eds.) ICA3PP 2012. LNCS, vol. 7440, pp. 156\u2013165. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33065-0_17"},{"issue":"3","key":"40_CR8","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/MCOM.2018.1700303","volume":"56","author":"T Wang","year":"2018","unstructured":"Wang, T., Bhuiyan, M.Z.A., Wang, G., Rahman, M.A., Wu, J., Cao, J.: Big data reduction for a smart citys critical infrastructural health monitoring. IEEE Commun. Mag. 56(3), 128\u2013133 (2018)","journal-title":"IEEE Commun. Mag."},{"unstructured":"Xiang, H., Xu, X., Zheng, H., et al.: An adaptive cloudlet placement method for mobile applications over GPS big data. In: Proceedings of the Global Communications Conference (GLOBECOM, 2016), pp. 1\u20136. IEEE (2016)","key":"40_CR9"},{"issue":"11","key":"40_CR10","doi-asserted-by":"publisher","first-page":"10372","DOI":"10.1109\/TVT.2017.2740218","volume":"66","author":"H Zhou","year":"2017","unstructured":"Zhou, H., Leung, V.C.M., Zhu, C., Xu, S., Fan, J.: Predicting temporal social contact patterns for data forwarding in opportunistic mobile networks. IEEE Trans. Veh. Technol. 66(11), 10372\u201310383 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"40_CR11","doi-asserted-by":"publisher","first-page":"11897","DOI":"10.1109\/ACCESS.2018.2810267","volume":"6","author":"K Peng","year":"2018","unstructured":"Peng, K., Leung, V.C.M., Huang, Q.: Clustering approach based on mini batch Kmeans for intrusion detection system over big data. IEEE Access 6, 11897\u201311906 (2018)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Zhang, K., et al.: Energy-efficient offloading for mobile edge computing in 5G heterogeneous networks. IEEE Access 4(c), 5896\u20135907 (2016)","key":"40_CR12","DOI":"10.1109\/ACCESS.2016.2597169"},{"key":"40_CR13","doi-asserted-by":"publisher","first-page":"11255","DOI":"10.1109\/ACCESS.2017.2710056","volume":"5","author":"P Zhao","year":"2017","unstructured":"Zhao, P., Tian, H., Qin, C., Nie, G.: Energy-saving offloading by jointly allocating radio and computational resources for mobile edge computing. IEEE Access 5, 11255\u201311268 (2017)","journal-title":"IEEE Access"},{"unstructured":"Zhang, J., et al.: Energy-latency trade-off for energy-aware offloading in mobile edge computing networks. IEEE Internet Things J. 4662(c), 1\u201313 (2017)","key":"40_CR14"},{"issue":"March","key":"40_CR15","doi-asserted-by":"publisher","first-page":"11365","DOI":"10.1109\/ACCESS.2018.2805798","volume":"6","author":"Y Hao","year":"2018","unstructured":"Hao, Y., Chen, M., Hu, L., Hossain, M.S., Ghoneim, A.: Energy efficient task caching and offloading for mobile edge computing. IEEE Access 6(March), 11365\u201311373 (2018)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Zhang, G., Zhang, W., Cao, Y., Li, D., Wang, L.: Energy-delay tradeoff for dynamic offloading in mobile-edge computing system with energy harvesting devices. IEEE Trans. Ind. Inform. 3203(c), 1 (2018)","key":"40_CR16","DOI":"10.1109\/TII.2018.2843365"},{"issue":"3","key":"40_CR17","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1109\/TWC.2016.2633522","volume":"16","author":"C You","year":"2017","unstructured":"You, C., Huang, K., Chae, H., Kim, B.H.: Energy-efficient resource allocation for mobile-edge computation offloading. IEEE Trans. Wirel. Commun. 16(3), 1397\u20131411 (2017)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"40_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2018.2876146","volume":"7","author":"S Li","year":"2019","unstructured":"Li, S., Zhang, Z., Zhang, P., Qin, X., Tao, Y., Liu, L.: Energy-aware mobile edge computation offloading for IoT over heterogenous networks. IEEE Access 7, 1 (2019)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Fan, W., Liu, Y., Tang, B., Wu, F., Wang, Z.: Computation offloading based on cooperations of mobile edge computing-enabled base stations. IEEE Access 6(X), 22622\u201322633 (2017)","key":"40_CR19","DOI":"10.1109\/ACCESS.2017.2787737"},{"doi-asserted-by":"crossref","unstructured":"Guo, F., Zhang, H., Ji, H., Li, X., Leung, V.C.: An efficient computation offloading management scheme in the densely deployed small cell networks with mobile edge computing. IEEE\/ACM Trans. Netw. 1\u201314 (2018)","key":"40_CR20","DOI":"10.1109\/TNET.2018.2873002"},{"doi-asserted-by":"crossref","unstructured":"Dai, Y., Xu, D., Maharjan, S., Zhang, Y.: Joint computation offloading and user association in multi-task mobile edge computing. IEEE Trans. Veh. Technol. 9545(c), 1\u201313 (2018)","key":"40_CR21","DOI":"10.1109\/TVT.2018.2876804"},{"key":"40_CR22","doi-asserted-by":"publisher","first-page":"3302","DOI":"10.1109\/ACCESS.2017.2649098","volume":"5","author":"TX Tran","year":"2017","unstructured":"Tran, T.X., Pompili, D.: Joint task offloading and resource allocation for multi-server mobile-edge computing networks. IEEE Access 5, 3302\u20133312 (2017)","journal-title":"IEEE Access"},{"issue":"8","key":"40_CR23","first-page":"3571","volume":"65","author":"TQ Dinh","year":"2017","unstructured":"Dinh, T.Q., Tang, J., La, Q.D., Quek, T.Q.: Offloading in mobile edge computing: task allocation and computational frequency scaling. IEEE Trans. Commun. 65(8), 3571\u20133584 (2017)","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"40_CR24","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/JSAC.2018.2815360","volume":"36","author":"M Chen","year":"2018","unstructured":"Chen, M., Hao, Y.: Task offloading for mobile edge computing in software defined ultra-dense network. IEEE J. Sel. Areas Commun. 36(3), 587\u2013597 (2018)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"40_CR25","doi-asserted-by":"publisher","first-page":"43327","DOI":"10.1109\/ACCESS.2018.2857726","volume":"6","author":"EE Ugwuanyi","year":"2018","unstructured":"Ugwuanyi, E.E., Ghosh, S., Iqbal, M., Dagiuklas, T.: Reliable resource provisioning using bankers\u2019 deadlock avoidance algorithm in MEC for industrial IoT. IEEE Access 6, 43327\u201343335 (2018)","journal-title":"IEEE Access"},{"issue":"6","key":"40_CR26","doi-asserted-by":"publisher","first-page":"1446","DOI":"10.3390\/s19061446","volume":"19","author":"L Huang","year":"2019","unstructured":"Huang, L., Feng, X., Zhang, L., Qian, L., Wu, Y.: Multi-server multi-user multi-task computation offloading for mobile edge computing networks. Sensors 19(6), 1446 (2019)","journal-title":"Sensors"},{"doi-asserted-by":"crossref","unstructured":"Li, K.: Computation offloading strategy optimization with multiple heterogeneous servers in mobile edge computing. IEEE Trans. Sustain. Comput. XX, 1 (2019)","key":"40_CR27","DOI":"10.1109\/TSUSC.2019.2904680"},{"issue":"8","key":"40_CR28","doi-asserted-by":"publisher","first-page":"5506","DOI":"10.1109\/TWC.2018.2845360","volume":"17","author":"J Ren","year":"2018","unstructured":"Ren, J., Yu, G., Cai, Y., He, Y.: Latency optimization for resource allocation in mobile-edge computation offloading. IEEE Trans. Wirel. Commun. 17(8), 5506\u20135519 (2018)","journal-title":"IEEE Trans. Wirel. Commun."},{"doi-asserted-by":"publisher","unstructured":"Han, Z., Gu, Y., Saad, W.: Matching Theory for Wireless Networks. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-56252-0","key":"40_CR29","DOI":"10.1007\/978-3-319-56252-0"},{"doi-asserted-by":"crossref","unstructured":"Bastug, E.; Bennis, M.; Kountouris, M. Cache-enabled small cell networks: modeling and tradeoffs. In: Proceedings of the 2014 11th International Symposium on Wireless Communications Systems (ISWCS), Barcelona, Spain, 26\u201329 August 2014","key":"40_CR30","DOI":"10.1109\/ISWCS.2014.6933434"},{"doi-asserted-by":"crossref","unstructured":"Blasco, P., Gunduz, D.: Learning-based optimization of cache content in a small cell base station. In: Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 10\u201314 July 2014, pp. 1897\u20131903 (2014)","key":"40_CR31","DOI":"10.1109\/ICC.2014.6883600"},{"key":"40_CR32","doi-asserted-by":"publisher","first-page":"2025","DOI":"10.1109\/JSAC.2017.2720818","volume":"35","author":"N Giatsoglou","year":"2017","unstructured":"Giatsoglou, N., Ntontin, K., Kartsakli, E., Antonopoulos, A., Verikoukis, C.V.: D2D-aware device caching in MmWave-cellular networks. IEEE J. Sel. Area. Commun. 35, 2025\u20132037 (2017)","journal-title":"IEEE J. Sel. Area. Commun."},{"key":"40_CR33","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/JIOT.2017.2776252","volume":"5","author":"Y Shi","year":"2018","unstructured":"Shi, Y., Chen, S., Xu, X.: MAGA: a mobility-aware computation offloading decision for distributed mobile cloud computing. IEEE Internet Things J. 5, 164\u2013174 (2018)","journal-title":"IEEE Internet Things J."},{"key":"40_CR34","doi-asserted-by":"publisher","first-page":"3317","DOI":"10.1109\/TPDS.2014.2381640","volume":"26","author":"S Deng","year":"2015","unstructured":"Deng, S., Huang, L., Taheri, J., Zomaya, A.Y.: Computation offloading for service workflow in mobile cloud computing. IEEE Trans. Parallel Distrib. Syst. 26, 3317\u20133329 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-7530-3_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,6]],"date-time":"2022-11-06T21:21:12Z","timestamp":1667769672000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-7530-3_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811575297","9789811575303"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-7530-3_40","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OJS\/PKP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"251","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}