{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T11:10:35Z","timestamp":1767611435736,"version":"3.37.3"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100011033","name":"Agencia Estatal de Investigaci\u00f3n","doi-asserted-by":"publisher","award":["PID2020-118969RB-I00"],"award-info":[{"award-number":["PID2020-118969RB-I00"]}],"id":[{"id":"10.13039\/501100011033","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>IoT edge computing is a new computing paradigm \u201cin the IoT domain\u201d for performing calculations and processing at the edge of the network, closer to the user and the source of the data. This paradigm is relatively recent, and, together with cloud and fog computing, there may be some confusion about its meaning and implications. This paper aims to help practitioners and researchers better understand what the industry thinks about what IoT edge computing is, and the expected benefits and challenges associated with this paradigm. We conducted a survey using a semi-structured in-depth questionnaire to collect qualitative data from relevant stakeholders from 29 multinational companies and qualitatively analyzed these data using the <jats:italic>Constructivist Grounded Theory (Charmaz)<\/jats:italic> method. Several researchers participated in the coding process (collaborative coding). To ensure consensus on the constructs that support the theory and thus improve the rigor of qualitative research, we conducted an intercoder agreement analysis. From the analysis, we have derived a <jats:italic>substantive and analytic<\/jats:italic> theory of what companies perceive about IoT edge computing, its benefits and challenges. The theory is substantive in that the scope of validity refers to the 29 surveys processed and analytic in that it analyzes \u201cwhat is\u201d rather than explaining causality or attempting predictive generalizations. A public repository with all the data related to the information capture process and the products resulting from the analysis of this information is publicly available. This study aims to strengthen the evidence and support practitioners in making better informed decisions about why companies are adopting edge computing and the current challenges they face. Additionally, the testing theory phase shows that the results are aligned with the ISO\/IEC TR 30164 standard.<\/jats:p>","DOI":"10.1007\/s00607-022-01104-2","type":"journal-article","created":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T22:02:27Z","timestamp":1658354547000},"page":"2711-2747","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Edge computing"],"prefix":"10.1007","volume":"104","author":[{"given":"Jorge","family":"P\u00e9rez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6738-9370","authenticated-orcid":false,"given":"Jessica","family":"D\u00edaz","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Berrocal","sequence":"additional","affiliation":[]},{"given":"Ram\u00f3n","family":"L\u00f3pez-Viana","sequence":"additional","affiliation":[]},{"given":"\u00c1ngel","family":"Gonz\u00e1lez-Prieto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,20]]},"reference":[{"key":"1104_CR1","doi-asserted-by":"publisher","first-page":"100177","DOI":"10.1016\/j.iot.2020.100177","volume":"9","author":"AA Alli","year":"2020","unstructured":"Alli AA, Alam MM (2020) The fog cloud of things: A survey on concepts, architecture, standards, tools, and applications. Internet of Things 9:100177. https:\/\/doi.org\/10.1016\/j.iot.2020.100177","journal-title":"Internet of Things"},{"key":"1104_CR2","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.pmcj.2018.12.007","volume":"52","author":"P Bellavista","year":"2019","unstructured":"Bellavista P, Berrocal J, Corradi A, Das SK, Foschini L, Zanni A (2019) A survey on fog computing for the internet of things. Pervasive Mob Comput 52:71\u201399. https:\/\/doi.org\/10.1016\/j.pmcj.2018.12.007","journal-title":"Pervasive Mob Comput"},{"key":"1104_CR3","doi-asserted-by":"crossref","unstructured":"Bellavista, P., Foschini, L., Scotece, D.: Converging mobile edge computing, fog computing, and iot quality requirements. In: 2017 IEEE 5th international conference on future internet of things and cloud (FiCloud), pp 313\u2013320. IEEE (2017)","DOI":"10.1109\/FiCloud.2017.55"},{"key":"1104_CR4","doi-asserted-by":"crossref","unstructured":"Borgia, E., Bruno, R., Conti, M., Mascitti, D., Passarella, A.: Mobile edge clouds for information-centric iot services. In: 2016 IEEE symposium on computers and communication (ISCC), pp 422\u2013428. IEEE (2016)","DOI":"10.1109\/ISCC.2016.7543776"},{"key":"1104_CR5","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta A, de Donato W, Persico V, Pescap\u00e9 A (2016) Integration of Cloud computing and Internet of Things: A survey. Futur Gener Comput Syst 56:684\u2013700. https:\/\/doi.org\/10.1016\/j.future.2015.09.021","journal-title":"Futur Gener Comput Syst"},{"key":"1104_CR6","unstructured":"Charmaz K (2014) Constructing Grounded Theory, 2nd edn. Sage"},{"key":"1104_CR7","unstructured":"CISCO: Annual internet report (2018\u20132023). Tech. rep., Cisco (2020)"},{"key":"1104_CR8","volume-title":"Research design: qualitative, quantitative, and mixed methods approaches","author":"JW Creswell","year":"2018","unstructured":"Creswell JW, Creswell JD (2018) Research design: qualitative, quantitative, and mixed methods approaches, 5th edn. SAGE, Los Angeles","edition":"5"},{"key":"1104_CR9","unstructured":"Dahmen-Lhuissier, S.: ETSI - Multi-access Edge Computing - Standards for MEC (2020). https:\/\/www.etsi.org\/technologies\/multi-access-edge-computing"},{"key":"1104_CR10","doi-asserted-by":"crossref","unstructured":"D\u00edaz, J., P\u00e9rez-Mart\u00ednez, J.E., Gallardo, C., Gonz\u00e1lez-Prieto, \u00c1.: Applying inter-rater reliability and agreement in grounded theory studies in software engineering. CoRR arXiv:abs\/2107.11449 (2021)","DOI":"10.2139\/ssrn.4030264"},{"key":"1104_CR11","doi-asserted-by":"crossref","unstructured":"Dolui, K., Datta, S.K.: Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In: 2017 Global Internet of Things Summit (GIoTS), pp 1\u20136. IEEE (2017)","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"1104_CR12","doi-asserted-by":"crossref","unstructured":"Easterbrook, S., Singer, J., Storey, M.A., Damian, D.: Selecting Empirical Methods for Software Engineering Research, pp 285\u2013311. Springer London, London (2008). https:\/\/doi.org\/10.1007\/978-1-84800-044-5_11","DOI":"10.1007\/978-1-84800-044-5_11"},{"issue":"1","key":"1104_CR13","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1108\/JEIM-02-2019-0060","volume":"33","author":"K Ghaffari","year":"2019","unstructured":"Ghaffari K, Lagzian M, Kazemi M, Malekzadeh G (2019) A comprehensive framework for Internet of Things development: A grounded theory study of requirements. JEIM 33(1):23\u201350. https:\/\/doi.org\/10.1108\/JEIM-02-2019-0060","journal-title":"JEIM"},{"issue":"3","key":"1104_CR14","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.sapharm.2012.04.004","volume":"9","author":"N Gisev","year":"2013","unstructured":"Gisev N, Bell JS, Chen TF (2013) Interrater agreement and interrater reliability: key concepts, approaches, and applications. Res Social Adm Pharm 9(3):330\u2013338","journal-title":"Res Social Adm Pharm"},{"key":"1104_CR15","unstructured":"Glaser BG (2016) Stop. write! writing Grounded Theory Rev: An Int J 11 (1). Sociology Press"},{"key":"1104_CR16","volume-title":"The Discovery of Grounded Theory: Strategies for Qualitative Research","author":"B Glaser","year":"1967","unstructured":"Glaser B, Strauss AL (1967) The Discovery of Grounded Theory: Strategies for Qualitative Research. Aldine de Gryter, New York"},{"key":"1104_CR17","volume-title":"Emergence vs forcing : basics of grounded theory analysis","author":"BG Glaser","year":"1992","unstructured":"Glaser BG (1992) Emergence vs forcing\u202f: basics of grounded theory analysis. Sociology Press, Mill Valley, CA"},{"key":"1104_CR18","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez-Prieto \u00c1, Perez J, Diaz J, L\u00f3pez-Fern\u00e1ndez D (2021) Reliability in Software Engineering Qualitative Research through Inter-Coder Agreement: A guide using Krippendorff\u2019s $$\\alpha $$ & Atlas.ti. arXiv:2008.00977 [cs, stat]","DOI":"10.2139\/ssrn.4216451"},{"issue":"3","key":"1104_CR19","doi-asserted-by":"publisher","first-page":"611","DOI":"10.2307\/25148742","volume":"30","author":"S Gregor","year":"2006","unstructured":"Gregor S (2006) The nature of theory in information systems. MIS Q 30(3):611\u2013642","journal-title":"MIS Q"},{"key":"1104_CR20","unstructured":"Group, O.C.A.W., et\u00a0al.: Openfog reference architecture for fog computing. OPFRA001 20817, 162 (2017)"},{"issue":"2","key":"1104_CR21","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"TR Gruber","year":"1993","unstructured":"Gruber TR (1993) A translation approach to portable ontology specifications. Knowl Acquis 5(2):199\u2013220","journal-title":"Knowl Acquis"},{"issue":"5","key":"1104_CR22","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.ijinfomgt.2013.07.001","volume":"33","author":"P Gupta","year":"2013","unstructured":"Gupta P, Seetharaman A, Raj JR (2013) The usage and adoption of cloud computing by small and medium businesses. Int J Inf Manage 33(5):861\u2013874. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2013.07.001","journal-title":"Int J Inf Manage"},{"issue":"2","key":"1104_CR23","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.icte.2021.05.004","volume":"7","author":"H Sabireen","year":"2021","unstructured":"Sabireen H, Neelanarayanan V (2021) A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges. ICT Express 7(2):162\u2013176. https:\/\/doi.org\/10.1016\/j.icte.2021.05.004","journal-title":"ICT Express"},{"issue":"22","key":"1104_CR24","doi-asserted-by":"publisher","first-page":"6441","DOI":"10.3390\/s20226441","volume":"20","author":"S Hamdan","year":"2020","unstructured":"Hamdan S, Ayyash M, Almajali S (2020) Edge-Computing Architectures for Internet of Things Applications: A Survey. Sensors 20(22):6441. https:\/\/doi.org\/10.3390\/s20226441","journal-title":"Sensors"},{"issue":"11","key":"1104_CR25","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/MCOM.2018.1700906","volume":"56","author":"N Hassan","year":"2018","unstructured":"Hassan N, Gillani S, Ahmed E, Yaqoob I, Imran M (2018) The Role of Edge Computing in Internet of Things. IEEE Commun Mag 56(11):110\u2013115. https:\/\/doi.org\/10.1109\/MCOM.2018.1700906","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"1104_CR26","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1080\/19312450709336664","volume":"1","author":"AF Hayes","year":"2007","unstructured":"Hayes AF, Krippendorff K (2007) Answering the Call for a Standard Reliability Measure for Coding Data. Commun Methods Meas 1(1):77\u201389. https:\/\/doi.org\/10.1080\/19312450709336664","journal-title":"Commun Methods Meas"},{"key":"1104_CR27","doi-asserted-by":"publisher","first-page":"17172","DOI":"10.1109\/JIOT.2021.3077992","volume":"8","author":"JL Herrera","year":"2021","unstructured":"Herrera JL, Gal\u00e1n-Jim\u00e9nez J, Berrocal J, Murillo JM (2021) Optimizing the response time in sdn-fog environments for time-strict iot applications. IEEE Internet Things J 8:17172\u201317185","journal-title":"IEEE Internet Things J"},{"key":"1104_CR28","doi-asserted-by":"crossref","unstructured":"Iorga, M., Feldman, L., Barton, R., Martin, M.J., Goren, N.S., Mahmoudi, C.: Fog computing conceptual model (2018)","DOI":"10.6028\/NIST.SP.500-325"},{"key":"1104_CR29","unstructured":"ISO\/IEC: Iso\/iec 25010 - systems and software engineering \u2013 systems and software quality requirements and evaluation (square) \u2013 system and software quality models. Tech. rep., ISO\/IEC (2011)"},{"key":"1104_CR30","unstructured":"ISO\/IEC: Tr 30164:2020 - internet of things (iot) -edge computing. Tech. rep., ISO\/IEC (2020)"},{"key":"1104_CR31","unstructured":"Kovatsch, M., Schooler, E., Kutscher, D.: Iot edge challenges and functions draft-hong-t2trg-iot-edge-computing-05 (2020)"},{"key":"1104_CR32","doi-asserted-by":"publisher","unstructured":"Krippendorff K (2004) Reliability in Content Analysis: Some Common Misconceptions and Recommendations. Hum Commun Res 30(3):411\u2013433 https:\/\/doi.org\/10.1111\/j.1468-2958.2004.tb00738.x. http:\/\/doi.wiley.com\/10.1093\/hcr\/30.3.411","DOI":"10.1111\/j.1468-2958.2004.tb00738.x"},{"key":"1104_CR33","doi-asserted-by":"crossref","unstructured":"Lan, D., Taherkordi, A., Eliassen, F., Horn, G.: A Survey on Fog Programming: Concepts, State-of-the-Art, and Research Challenges. In: Proceedings of the 2nd International Workshop on Distributed Fog Services Design - DFSD \u201919, pp 1\u20136. ACM Press, Davis, CA, USA (2019). https:\/\/doi.org\/10.1145\/3366613.3368120","DOI":"10.1145\/3366613.3368120"},{"key":"1104_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/0147-1767(85)90062-8","volume-title":"Naturalistic inquiry","author":"YS Lincoln","year":"1985","unstructured":"Lincoln YS, Guba EG (1985) Naturalistic inquiry. Sage Publications, Beverly Hills, Calif"},{"issue":"05","key":"1104_CR35","doi-asserted-by":"publisher","first-page":"164","DOI":"10.4236\/jcc.2015.35021","volume":"3","author":"S Madakam","year":"2015","unstructured":"Madakam S, Lake V, Lake V, Lake V et al (2015) Internet of things (iot): A literature review. Journal of Computer and Communications 3(05):164","journal-title":"Journal of Computer and Communications"},{"key":"1104_CR36","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T., et\u00a0al.: The nist definition of cloud computing (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"1104_CR37","unstructured":"MKLab: Staruml. http:\/\/staruml.io\/"},{"issue":"3","key":"1104_CR38","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.1109\/COMST.2018.2814571","volume":"20","author":"M Mukherjee","year":"2018","unstructured":"Mukherjee M, Shu L, Wang D (2018) Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges. IEEE Commun. Surv. Tutorials 20(3):1826\u20131857. https:\/\/doi.org\/10.1109\/COMST.2018.2814571","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"1104_CR39","doi-asserted-by":"crossref","unstructured":"Naveen, S., Kounte, M.R.: Key Technologies and challenges in IoT Edge Computing. In: 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp 61\u201365. IEEE, Palladam, India (2019). https:\/\/doi.org\/10.1109\/I-SMAC47947.2019.9032541","DOI":"10.1109\/I-SMAC47947.2019.9032541"},{"key":"1104_CR40","unstructured":"Object Management Group: Object Constraint Language (version 2.4). https:\/\/www.omg.org\/spec\/OCL\/2.4"},{"key":"1104_CR41","unstructured":"Object Management Group: Unified Modeling Language (version 2.5). https:\/\/www.omg.org\/spec\/UML\/"},{"issue":"7","key":"1104_CR42","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MC.2015.207","volume":"48","author":"JS Preden","year":"2015","unstructured":"Preden JS, Tammem\u00e4e K, Jantsch A, Leier M, Riid A, Calis E (2015) The benefits of self-awareness and attention in fog and mist computing. Computer 48(7):37\u201345","journal-title":"Computer"},{"issue":"2","key":"1104_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3301443","volume":"19","author":"C Puliafito","year":"2019","unstructured":"Puliafito C, Mingozzi E, Longo F, Puliafito A, Rana O (2019) Fog Computing for the Internet of Things: A Survey. ACM Trans Internet Technol 19(2):1\u201341. https:\/\/doi.org\/10.1145\/3301443","journal-title":"ACM Trans Internet Technol"},{"issue":"3","key":"1104_CR44","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1007\/s00146-020-01049-0","volume":"36","author":"P Radanliev","year":"2021","unstructured":"Radanliev P, De Roure D, Van Kleek M, Santos O, Ani U (2021) Artificial intelligence in cyber physical systems. AI & Soc 36(3):783\u2013796. https:\/\/doi.org\/10.1007\/s00146-020-01049-0","journal-title":"AI & Soc"},{"issue":"2","key":"1104_CR45","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s42452-019-1931-0","volume":"2","author":"P Radanliev","year":"2020","unstructured":"Radanliev P, De Roure DC, Nurse JRC, Mantilla Montalvo R, Cannady S, Santos O, Maddox L, Burnap P, Maple C (2020) Future developments in standardisation of cyber risk in the Internet of Things (IoT). SN Appl. Sci. 2(2):169. https:\/\/doi.org\/10.1007\/s42452-019-1931-0","journal-title":"SN Appl. Sci."},{"issue":"7","key":"1104_CR46","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1109\/TSE.2018.2796554","volume":"45","author":"P Ralph","year":"2019","unstructured":"Ralph P (2019) Toward methodological guidelines for process theories and taxonomies in software engineering. IEEE Trans Software Eng 45(7):712\u2013735. https:\/\/doi.org\/10.1109\/TSE.2018.2796554","journal-title":"IEEE Trans Software Eng"},{"key":"1104_CR47","unstructured":"Ralph, P., et\u00a0al.: Empirical standards for software engineering research (2021). arXiv:2010.03525v2 [cs.SE]"},{"key":"1104_CR48","unstructured":"Rumbaugh J, Jacobson I, Booch G (2004) Unified Modeling Language Reference Manual, The, 2nd edn. Pearson Higher Education"},{"key":"1104_CR49","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M.: Mobile computing: the next decade. In: Proceedings of the 1st ACM workshop on mobile cloud computing & services: social networks and beyond, pp 1\u20136 (2010)","DOI":"10.1145\/1810931.1810936"},{"issue":"5","key":"1104_CR50","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge Computing: Vision and Challenges. IEEE Internet Things J 3(5):637\u2013646. https:\/\/doi.org\/10.1109\/JIOT.2016.2579198","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"1104_CR51","doi-asserted-by":"publisher","first-page":"2586","DOI":"10.1109\/JSAC.2017.2760478","volume":"35","author":"SN Shirazi","year":"2017","unstructured":"Shirazi SN, Gouglidis A, Farshad A, Hutchison D (2017) The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective. IEEE J. Select. Areas Commun. 35(11):2586\u20132595. https:\/\/doi.org\/10.1109\/JSAC.2017.2760478","journal-title":"IEEE J. Select. Areas Commun."},{"key":"1104_CR52","doi-asserted-by":"crossref","unstructured":"Sj\u00f8berg, D.I., Dyb\u00e5, T., Anda, B.C., Hannay, J.E.: Building theories in software engineering. In: Guide to advanced empirical software engineering, pp 312\u2013336. Springer (2008)","DOI":"10.1007\/978-1-84800-044-5_12"},{"key":"1104_CR53","doi-asserted-by":"crossref","unstructured":"Small, N., Akkermans, S., Joosen, W., Hughes, D.: Niflheim: An end-to-end middleware for applications on a multi-tier iot infrastructure. In: 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), pp 1\u20138. IEEE (2017)","DOI":"10.1109\/NCA.2017.8171356"},{"key":"1104_CR54","doi-asserted-by":"publisher","first-page":"188082","DOI":"10.1109\/ACCESS.2020.3029847","volume":"8","author":"SN Swamy","year":"2020","unstructured":"Swamy SN, Kota SR (2020) An Empirical Study on System Level Aspects of Internet of Things (IoT). IEEE Access 8:188082\u2013188134. https:\/\/doi.org\/10.1109\/ACCESS.2020.3029847","journal-title":"IEEE Access"},{"issue":"1","key":"1104_CR55","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1108\/IJLM-11-2016-0274","volume":"29","author":"M Tu","year":"2018","unstructured":"Tu M (2018) An exploratory study of Internet of Things (IoT) adoption intention in logistics and supply chain management: A mixed research approach. IJLM 29(1):131\u2013151. https:\/\/doi.org\/10.1108\/IJLM-11-2016-0274","journal-title":"IJLM"},{"issue":"8","key":"1104_CR56","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MC.2018.2888767","volume":"52","author":"M Villari","year":"2019","unstructured":"Villari M, Fazio M, Dustdar S, Rana O, Jha DN, Ranjan R (2019) Osmosis: The osmotic computing platform for microelements in the cloud, edge, and internet of things. Computer 52(8):14\u201326","journal-title":"Computer"},{"issue":"2","key":"1104_CR57","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1109\/COMST.2020.2970550","volume":"22","author":"X Wang","year":"2020","unstructured":"Wang X, Han Y, Leung VCM, Niyato D, Yan X, Chen X (2020) Convergence of Edge Computing and Deep Learning: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 22(2):869\u2013904. https:\/\/doi.org\/10.1109\/COMST.2020.2970550","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"1104_CR58","doi-asserted-by":"crossref","unstructured":"Wohlin C, Runeson P, H\u00f6st M, Ohlsson MC, Regnell B, Wessl\u00e9n A (2012) Experimentation in software engineering. Springer Science & Business Media","DOI":"10.1007\/978-3-642-29044-2"},{"key":"1104_CR59","volume-title":"Case study research and applications: design and methods","author":"RK Yin","year":"2018","unstructured":"Yin RK (2018) Case study research and applications: design and methods, 6th edn. SAGE, Los Angeles","edition":"6"},{"key":"1104_CR60","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","volume":"98","author":"A Yousefpour","year":"2019","unstructured":"Yousefpour A, Fung C, Nguyen T, Kadiyala K, Jalali F, Niakanlahiji A, Kong J, Jue JP (2019) All one needs to know about fog computing and related edge computing paradigms: A complete survey. J Syst Architect 98:289\u2013330. https:\/\/doi.org\/10.1016\/j.sysarc.2019.02.009","journal-title":"J Syst Architect"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-022-01104-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-022-01104-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-022-01104-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T01:15:26Z","timestamp":1669166126000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-022-01104-2"}},"subtitle":["A grounded theory study"],"short-title":[],"issued":{"date-parts":[[2022,7,20]]},"references-count":60,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["1104"],"URL":"https:\/\/doi.org\/10.1007\/s00607-022-01104-2","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2022,7,20]]},"assertion":[{"value":"25 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}