{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T19:42:42Z","timestamp":1772307762273,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-025-05289-x","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T12:25:08Z","timestamp":1750076708000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Tiny machine learning models for autonomous workload distribution across cloud-edge computing continuum"],"prefix":"10.1007","volume":"28","author":[{"given":"Mohammad R.","family":"Pour-Hosseini","sequence":"first","affiliation":[]},{"given":"Mahdi","family":"Abbasi","sequence":"additional","affiliation":[]},{"given":"Atefeh","family":"Salimi","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Elmroth","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Haghighi","sequence":"additional","affiliation":[]},{"given":"Parham","family":"Moradi","sequence":"additional","affiliation":[]},{"given":"Bahman","family":"Javadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,16]]},"reference":[{"key":"5289_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100656","volume":"53","author":"P Peng","year":"2024","unstructured":"Peng, P., et al.: A survey on computation offloading in edge systems: from the perspective of deep reinforcement learning approaches. Comput. Sci. Rev. 53, 100656 (2024)","journal-title":"Comput. Sci. Rev."},{"key":"5289_CR2","doi-asserted-by":"crossref","unstructured":"Lin, S., Lin, W., Wu, W., Chen, H., Yang, J.: SparseTSF: modeling long-term time series forecasting with *1k* parameters. In: Presented at the Proceedings of the 41st International Conference on Machine Learning, Proceedings of Machine Learning Research (2024) [Online]. https:\/\/proceedings.mlr.press\/v235\/lin24n.html","DOI":"10.1109\/TPAMI.2025.3602445"},{"issue":"4","key":"5289_CR3","doi-asserted-by":"publisher","first-page":"3643","DOI":"10.1109\/TCC.2023.3308927","volume":"11","author":"W Lin","year":"2023","unstructured":"Lin, W., Luo, X., Li, C., Liang, J., Wu, G., Li, K.: An energy-efficient tuning method for cloud servers combining DVFS and parameter optimization. IEEE Trans. Cloud Comput. 11(4), 3643\u20133655 (2023). https:\/\/doi.org\/10.1109\/TCC.2023.3308927","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"4","key":"5289_CR4","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"5289_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2016.2615180","volume":"4","author":"AH Ngu","year":"2016","unstructured":"Ngu, A.H., Gutierrez, M., Metsis, V., Nepal, S., Sheng, Q.Z.: IoT middleware: a survey on issues and enabling technologies. IEEE Internet Things J. 4(1), 1\u201320 (2016)","journal-title":"IEEE Internet Things J."},{"key":"5289_CR6","doi-asserted-by":"crossref","unstructured":"Shah, S.H., Yaqoob, I.: A survey: internet of Things (IOT) technologies, applications and challenges. In: 2016 IEEE Smart Energy Grid Engineering (SEGE), pp. 381\u2013385 (2016)","DOI":"10.1109\/SEGE.2016.7589556"},{"issue":"3","key":"5289_CR7","doi-asserted-by":"publisher","first-page":"927","DOI":"10.3390\/s22030927","volume":"22","author":"A Ometov","year":"2022","unstructured":"Ometov, A., Molua, O.L., Komarov, M., Nurmi, J.: A survey of security in cloud, edge, and fog computing. Sensors 22(3), 927 (2022)","journal-title":"Sensors"},{"issue":"18","key":"5289_CR8","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1002\/wcm.1203","volume":"13","author":"HT Dinh","year":"2013","unstructured":"Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. Wirel. Commun. Mob. Comput. 13(18), 1587\u20131611 (2013)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"5289_CR9","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Natarajan, P., Zhu, J.: Fog computing: a platform for internet of things and analytics. In: Big Data and Internet of Things: A Roadmap for Smart Environments, pp. 169\u2013186 (2014)","DOI":"10.1007\/978-3-319-05029-4_7"},{"issue":"5","key":"5289_CR10","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637\u2013646 (2016)","journal-title":"IEEE Internet Things J."},{"key":"5289_CR11","doi-asserted-by":"crossref","unstructured":"Kaur, G., Batth, R.S.: Edge computing: classification, applications, and challenges. In: 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), pp. 254\u2013259. IEEE (2021)","DOI":"10.1109\/ICIEM51511.2021.9445331"},{"key":"5289_CR12","unstructured":"Dennis, D.K., et al.: EdgeML: machine learning for resource-constrained edge devices (2020). https:\/\/github.com\/Microsoft\/EdgeML"},{"issue":"5","key":"5289_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3326066","volume":"52","author":"C-H Hong","year":"2019","unstructured":"Hong, C.-H., Varghese, B.: Resource management in fog\/edge computing: a survey on architectures, infrastructure, and algorithms. ACM Comput. Surv. (CSUR) 52(5), 1\u201337 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"3","key":"5289_CR14","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/TCCN.2017.2725277","volume":"3","author":"J Xu","year":"2017","unstructured":"Xu, J., Chen, L., Ren, S.: Online learning for offloading and autoscaling in energy harvesting mobile edge computing. IEEE Trans. Cogn. Commun. Netw. 3(3), 361\u2013373 (2017)","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"5289_CR15","doi-asserted-by":"publisher","unstructured":"Kanapram, D., Lamanna, G., Repetto, M.: Exploring the trade-off between performance and energy consumption in cloud infrastructures. In: 2017 2nd International Conference on Fog and Mobile Edge Computing (FMEC), 8\u201311 May 2017, pp. 121\u2013126. https:\/\/doi.org\/10.1109\/FMEC.2017.7946418","DOI":"10.1109\/FMEC.2017.7946418"},{"issue":"12","key":"5289_CR16","doi-asserted-by":"publisher","first-page":"10605","DOI":"10.1109\/JIOT.2023.3242613","volume":"10","author":"J Zhang","year":"2023","unstructured":"Zhang, J., He, X., Dai, H.: Blind post-decision state-based reinforcement learning for intelligent IoT. IEEE Internet Things J. 10(12), 10605\u201310620 (2023)","journal-title":"IEEE Internet Things J."},{"key":"5289_CR17","doi-asserted-by":"crossref","unstructured":"Wu, H., Chen, L., Shen, C., Wen, W., Xu, J.: Online geographical load balancing for energy-harvesting mobile edge computing. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICC.2018.8422299"},{"key":"5289_CR18","doi-asserted-by":"publisher","first-page":"83771","DOI":"10.1109\/ACCESS.2019.2920325","volume":"7","author":"X Niu","year":"2019","unstructured":"Niu, X., et al.: Workload allocation mechanism for minimum service delay in edge computing-based power Internet of Things. IEEE Access 7, 83771\u201383784 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"5289_CR19","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10723-020-09507-1","volume":"18","author":"M Abbasi","year":"2020","unstructured":"Abbasi, M., Mohammadi Pasand, E., Khosravi, M.R.: Workload allocation in iot-fog-cloud architecture using a multi-objective genetic algorithm. J. Grid Comput. 18(1), 43\u201356 (2020)","journal-title":"J. Grid Comput."},{"key":"5289_CR20","doi-asserted-by":"crossref","unstructured":"Sun, J., Gao, Q., Wu, C., Li, Y., Wang, J., Niyato, D.: Secure resource allocation via constrained deep reinforcement learning. arXiv preprint arXiv:2501.11557 (2025)","DOI":"10.36227\/techrxiv.173750145.56771557\/v1"},{"key":"5289_CR21","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.comcom.2020.02.017","volume":"153","author":"M Abbasi","year":"2020","unstructured":"Abbasi, M., Yaghoobikia, M., Rafiee, M., Jolfaei, A., Khosravi, M.R.: Efficient resource management and workload allocation in fog\u2013cloud computing paradigm in IoT using learning classifier systems. Comput. Commun. 153, 217\u2013228 (2020). https:\/\/doi.org\/10.1016\/j.comcom.2020.02.017","journal-title":"Comput. Commun."},{"issue":"7","key":"5289_CR22","doi-asserted-by":"publisher","first-page":"2253","DOI":"10.1109\/JSEN.2025.3542972","volume":"25","author":"C Xu","year":"2025","unstructured":"Xu, C., Zhang, P., Yu, H.: Lyapunov-guided resource allocation and task scheduling for edge computing cognitive radio networks via deep reinforcement learning. IEEE Sens. J. 25(7), 2253\u201312264 (2025)","journal-title":"IEEE Sens. J."},{"key":"5289_CR23","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/TCC.2025.3538090","volume":"13","author":"Z He","year":"2025","unstructured":"He, Z., Guo, Y., Zhai, X., Zhao, M., Zhou, W., Li, K.: Joint computation offloading and resource allocation in mobile-edge cloud computing: a two-layer game approach. IEEE Trans. Cloud Comput. 13, 411\u2013428 (2025)","journal-title":"IEEE Trans. Cloud Comput"},{"key":"5289_CR24","doi-asserted-by":"publisher","unstructured":"Chi, X., Chen, H., Ni, Z., Sun, H., Sun, P., Yu, D.: H-STEP: heuristic stable edge service entity placement for mobile virtual reality systems. IEEE Trans. Mob. Comput. (2025). https:\/\/doi.org\/10.1109\/TMC.2025.3548703","DOI":"10.1109\/TMC.2025.3548703"},{"key":"5289_CR25","doi-asserted-by":"publisher","unstructured":"Wang, Q., Qian, L.P., Fan, X., Li, M., Huang, C.: Energy minimization-driven communication and computation resource allocation in hybrid NOMA-RSMA industrial IoT. IEEE Internet Things J. (2025). https:\/\/doi.org\/10.1109\/JIOT.2025.3546394","DOI":"10.1109\/JIOT.2025.3546394"},{"issue":"5","key":"5289_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/dac.6141","volume":"38","author":"F Amirghafouri","year":"2025","unstructured":"Amirghafouri, F., Neghabi, A.A., Shakeri, H., Sola, Y.E.: Nature-inspired meta-heuristic algorithms for resource allocation in the internet of things. Int. J. Commun. Syst. 38(5), e6141 (2025)","journal-title":"Int. J. Commun. Syst."},{"key":"5289_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.08.001","volume":"162","author":"N Sultana","year":"2025","unstructured":"Sultana, N., et al.: Context aware clustering and meta-heuristic resource allocation for NB-IoT D2D devices in smart healthcare applications. Futur. Gener. Comput. Syst. 162, 107477 (2025)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"5289_CR28","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/s42979-025-03827-3","volume":"6","author":"P Tripathi","year":"2025","unstructured":"Tripathi, P., Sasidhar, K., Mistry, H., Shah, V.: Scheduling computing tasks on smartphones: comparative case studies of metaheuristic algorithms on real world applications. SN Comput. Sci. 6(4), 298 (2025)","journal-title":"SN Comput. Sci."},{"key":"5289_CR29","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.aej.2024.10.015","volume":"111","author":"Y Wang","year":"2025","unstructured":"Wang, Y., Chen, J., Wu, Z., Chen, P., Li, X., Hao, J.: Efficient task migration and resource allocation in cloud\u2013edge collaboration: a drl approach with learnable masking. Alex. Eng. J. 111, 107\u2013122 (2025)","journal-title":"Alex. Eng. J."},{"key":"5289_CR30","unstructured":"Gu, Y., et al.: Deep reinforcement learning for job scheduling and resource management in cloud computing: an algorithm-level review. arXiv preprint arXiv:2501.01007 (2025)"},{"key":"5289_CR31","doi-asserted-by":"publisher","unstructured":"Wu, J., Zou, Y., Zhang, X., Liu, J., Sun, W., Du, G.: Dependency-aware task offloading strategy via heterogeneous graph neural network and deep reinforcement learning. IEEE Internet Things J. (2025). https:\/\/doi.org\/10.1109\/JIOT.2025.3549441","DOI":"10.1109\/JIOT.2025.3549441"},{"key":"5289_CR32","doi-asserted-by":"publisher","unstructured":"Yang, Y., Xie, C., Liu, L., Peng, X.: DynMap: a heuristic dynamic mapper for CGRA multi-task dynamic resource allocation. IEEE Trans. Comput.-Aided Des. Integrated Circuits Syst. (2025). https:\/\/doi.org\/10.1109\/TCAD.2025.3537975","DOI":"10.1109\/TCAD.2025.3537975"},{"key":"5289_CR33","doi-asserted-by":"publisher","unstructured":"Dai, W., Rai, U., Chiun, J., Yuhong, C., Sartoretti, G.: Heterogeneous multi-robot task allocation and scheduling via reinforcement learning. IEEE Robot. Autom. Lett. (2025). https:\/\/doi.org\/10.1109\/LRA.2025.3534682","DOI":"10.1109\/LRA.2025.3534682"},{"key":"5289_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100461","volume":"16","author":"L Dutta","year":"2021","unstructured":"Dutta, L., Bharali, S.: Tinyml meets iot: a comprehensive survey. Internet Things 16, 100461 (2021)","journal-title":"Internet Things"},{"issue":"2","key":"5289_CR35","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1162\/evco.2007.15.2.133","volume":"15","author":"PL Lanzi","year":"2007","unstructured":"Lanzi, P.L., Loiacono, D., Wilson, S.W., Goldberg, D.E.: Generalization in the XCSF classifier system: analysis, improvement, and extension. Evol. Comput. 15(2), 133\u2013168 (2007)","journal-title":"Evol. Comput."},{"key":"5289_CR36","unstructured":"Sutton, R.S., Barto, A.G.: Reinforcement learning: an introduction. Bradford Books (2018)"},{"key":"5289_CR37","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/3-540-45027-0_1","volume-title":"Learning classifier systems: from foundations to applications","author":"JH Holland","year":"2000","unstructured":"Holland, J.H., et al.: What is a learning classifier system? In: Learning classifier systems: from foundations to applications, pp. 3\u201332. Springer (2000)"},{"issue":"2","key":"5289_CR38","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1162\/evco.1995.3.2.149","volume":"3","author":"SW Wilson","year":"1995","unstructured":"Wilson, S.W.: Classifier fitness based on accuracy. Evol. Comput. 3(2), 149\u2013175 (1995)","journal-title":"Evol. Comput."},{"issue":"5","key":"5289_CR39","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1049\/iet-its.2018.5121","volume":"13","author":"B Bartin","year":"2019","unstructured":"Bartin, B.: Use of learning classifier systems in microscopic toll plaza simulation models. IET Intel. Transp. Syst. 13(5), 860\u2013869 (2019)","journal-title":"IET Intel. Transp. Syst."},{"key":"5289_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41109-018-0088-x","volume":"3","author":"MR Karlsen","year":"2018","unstructured":"Karlsen, M.R., Moschoyiannis, S.: Evolution of control with learning classifier systems. Appl. Netw. Sci. 3, 1\u201336 (2018)","journal-title":"Appl. Netw. Sci."},{"issue":"21","key":"5289_CR41","doi-asserted-by":"publisher","first-page":"7281","DOI":"10.1007\/s00500-017-2729-x","volume":"22","author":"MH Arif","year":"2018","unstructured":"Arif, M.H., Li, J., Iqbal, M., Liu, K.: Sentiment analysis and spam detection in short informal text using learning classifier systems. Soft. Comput. 22(21), 7281\u20137291 (2018)","journal-title":"Soft. Comput."},{"key":"5289_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39925-4","volume-title":"Applications of Learning Classifier Systems","author":"L Bull","year":"2004","unstructured":"Bull, L.: Applications of Learning Classifier Systems. Springer (2004)"},{"key":"5289_CR43","volume-title":"Introduction to Machine Learning","author":"E Alpaydin","year":"2020","unstructured":"Alpaydin, E.: Introduction to Machine Learning. MIT Press (2020)"},{"key":"5289_CR44","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.comcom.2021.01.022","volume":"169","author":"M Abbasi","year":"2021","unstructured":"Abbasi, M., Mohammadi-Pasand, E., Khosravi, M.R.: Intelligent workload allocation in IoT\u2013Fog\u2013cloud architecture towards mobile edge computing. Comput. Commun. 169, 71\u201380 (2021)","journal-title":"Comput. Commun."},{"issue":"2","key":"5289_CR45","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/TCAD.2024.3437344","volume":"44","author":"K Cao","year":"2024","unstructured":"Cao, K., Chen, M., Karnouskos, S., Hu, S.: Reliability-aware personalized deployment of approximate computation IoT applications in serverless mobile edge computing. IEEE Trans. Comput.-Aided Des. Integrated Circuits Syst. 44(2), 430\u2013443 (2024)","journal-title":"IEEE Trans. Comput.-Aided Des. Integrated Circuits Syst."},{"key":"5289_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107530","volume":"211","author":"Z Xu","year":"2021","unstructured":"Xu, Z., Saleh, J.H.: Machine learning for reliability engineering and safety applications: review of current status and future opportunities. Reliab. Eng. Syst. Saf. 211, 107530 (2021)","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"1","key":"5289_CR47","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10586-021-03410-4","volume":"26","author":"Z Guo","year":"2023","unstructured":"Guo, Z., Lu, Y., Tian, H., Zuo, J., Lu, H.: A security evaluation model for multi-source heterogeneous systems based on IOT and edge computing. Cluster Comput. 26(1), 303\u2013317 (2023)","journal-title":"Cluster Comput."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05289-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05289-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05289-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T20:21:47Z","timestamp":1756930907000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05289-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,16]]},"references-count":47,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5289"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05289-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,16]]},"assertion":[{"value":"24 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2025","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised: The affiliations of the authors Parham Moradi and Bahman Javadi have been swapped, the affiliations have been corrected now.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"381"}}