{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T09:44:11Z","timestamp":1775123051451,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Nature Science Foundation of Fujian Province","award":["2021J011002"],"award-info":[{"award-number":["2021J011002"]}]},{"name":"the Nature Science Foundation of Fujian Province","award":["2021J011004"],"award-info":[{"award-number":["2021J011004"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s11036-025-02444-x","type":"journal-article","created":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T14:49:53Z","timestamp":1742827793000},"page":"776-794","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Computation Offloading in Mobile Edge Computing-enabled Blockchain Based on Contract and Matching Theory"],"prefix":"10.1007","volume":"30","author":[{"given":"Wenjie","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yijun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jingmin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yifeng","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Ziqiong","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Chai Kiat","family":"Yeo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,24]]},"reference":[{"key":"2444_CR1","doi-asserted-by":"publisher","first-page":"4061","DOI":"10.1007\/s11276-020-02317-z","volume":"26","author":"J Liu","year":"2020","unstructured":"Liu J, Tong X, Wang Z, Zhang M, Ma J (2020) A centralized key management scheme for space network with resistance of nonlinear channel noise. Wireless Netw 26:4061\u20134078. https:\/\/doi.org\/10.1007\/s11276-020-02317-z","journal-title":"Wireless Netw"},{"key":"2444_CR2","doi-asserted-by":"publisher","first-page":"4436471","DOI":"10.1155\/2022\/4436471","volume":"2022","author":"S Wang","year":"2022","unstructured":"Wang S (2022) Improved blockchain technology for performance optimization model design of sports clubs. J. Electr. Comput. Eng. 2022:4436471\u2013144364718. https:\/\/doi.org\/10.1155\/2022\/4436471","journal-title":"J. Electr. Comput. Eng."},{"key":"2444_CR3","doi-asserted-by":"publisher","DOI":"10.1142\/s021759592340002x","author":"S Yu","year":"2023","unstructured":"Yu S, Wu C, Xu C, Zhao G (2023) The optimal pricing in blockchain-enabled enterprises operation considering privacy attitude and privacy protection. Asia-Pacific J Oper Res. https:\/\/doi.org\/10.1142\/s021759592340002x","journal-title":"Asia-Pacific J Oper Res"},{"key":"2444_CR4","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1142\/S0219649222500046","volume":"2","author":"B Chen","year":"2022","unstructured":"Chen B, Liu D, Zhang T (2022) A blockchain-based security model for iot systems. Journal of information & knowledge management 2:21. https:\/\/doi.org\/10.1142\/S0219649222500046","journal-title":"Journal of information & knowledge management"},{"key":"2444_CR5","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.future.2021.08.029","volume":"127","author":"X Huang","year":"2022","unstructured":"Huang X, Gong S, Yang J, Zhang W, Yang L, Yeo CK (2022) Hybrid market-based resources allocation in mobile edge computing systems under stochastic information. Futur Gener Comput Syst 127:80\u201391. https:\/\/doi.org\/10.1016\/j.future.2021.08.029","journal-title":"Futur Gener Comput Syst"},{"issue":"02","key":"2444_CR6","doi-asserted-by":"publisher","first-page":"480","DOI":"10.3778\/j.issn.1673-9418.2009072","volume":"16","author":"PA Yuan","year":"2022","unstructured":"Yuan PA, Jigang WU, Long CH, Mianyang YA (2022) Energy balancing for multiple devices with multiple tasks in mobile edge computing. Journal of Frontiers of Computer Science and Technology 16(02):480\u2013488. https:\/\/doi.org\/10.3778\/j.issn.1673-9418.2009072","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"issue":"2","key":"2444_CR7","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.icte.2021.04.010","volume":"7","author":"D Aishwarya","year":"2021","unstructured":"Aishwarya D, Minu R (2021) Edge computing based surveillance framework for real time activity recognition. ICT Express 7(2):182\u2013186. https:\/\/doi.org\/10.1016\/j.icte.2021.04.010","journal-title":"ICT Express"},{"key":"2444_CR8","doi-asserted-by":"publisher","unstructured":"Grover J (2022) Security of vehicular ad hoc networks using blockchain: A comprehensive review. Vehicular Communications (Apr.) 34. https:\/\/doi.org\/10.1016\/j.vehcom.2022.100458","DOI":"10.1016\/j.vehcom.2022.100458"},{"issue":"3","key":"2444_CR9","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/mnet.011.2000554","volume":"35","author":"S Islam","year":"2021","unstructured":"Islam S, Badsha S, Sengupta S, La H, Khalil I, Atiquzzaman M (2021) Blockchain-enabled intelligent vehicular edge computing. IEEE Network 35(3):125\u2013131. https:\/\/doi.org\/10.1109\/mnet.011.2000554","journal-title":"IEEE Network"},{"key":"2444_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107022","volume":"131","author":"S Xu","year":"2021","unstructured":"Xu S, Liao B, Yang C, Guo S, Hu B, Zhao J, Jin L (2021) Deep reinforcement learning assisted edge-terminal collaborative offloading algorithm of blockchain computing tasks for energy internet. International Journal of Electrical Power & Energy Systems 131:107022. https:\/\/doi.org\/10.1016\/j.ijepes.2021.107022","journal-title":"International Journal of Electrical Power & Energy Systems"},{"key":"2444_CR11","doi-asserted-by":"publisher","unstructured":"Aghazadeh R, Shahidinejad A, Ghobaei-Arani M (2023) An autonomous proactive content caching method in edge computing environment: a learning-based approach. Multimedia Tools and Applications 1\u201323. https:\/\/doi.org\/10.1007\/s11042-023-14935-8","DOI":"10.1007\/s11042-023-14935-8"},{"key":"2444_CR12","doi-asserted-by":"publisher","unstructured":"Baek B, Lee J, Peng Y, Park S (2020) Three dynamic pricing schemes for resource allocation of edge computing for iot environment. IEEE Internet Things J 7(5):4292\u20134303. https:\/\/doi.org\/10.1109\/jiot.2020.2966627","DOI":"10.1109\/jiot.2020.2966627"},{"key":"2444_CR13","doi-asserted-by":"publisher","unstructured":"Qiu H, Li T (2022) Auction method to prevent bid-rigging strategies in mobile blockchain edge computing resource allocation. Future generations computer systems: FGCS (128-):128. https:\/\/doi.org\/10.1016\/j.future.2021.09.031","DOI":"10.1016\/j.future.2021.09.031"},{"key":"2444_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejpoleco.2020.101891","volume":"63","author":"RD Congleton","year":"2020","unstructured":"Congleton RD (2020) The institutions of international treaty organizations as evidence for social contract theory. Eur J Polit Econ 63:101891. https:\/\/doi.org\/10.1016\/j.ejpoleco.2020.101891","journal-title":"Eur J Polit Econ"},{"issue":"1","key":"2444_CR15","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/tcc.2021.3081580","volume":"11","author":"W Junfei","year":"2021","unstructured":"Junfei W, Li J, Gao Z, Han Z, Qiu C, Wang X (2021) Resource management and pricing for cloud computing based mobile blockchain with pooling. IEEE Transactions on Cloud Computing 11(1):128\u2013138. https:\/\/doi.org\/10.1109\/tcc.2021.3081580","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"7","key":"2444_CR16","doi-asserted-by":"publisher","first-page":"7970","DOI":"10.1007\/s11227-022-04990-7","volume":"79","author":"Y Li","year":"2023","unstructured":"Li Y, Lin Z, Zhang W, Zheng Y, Yang J (2023) Mobile edge computing-enabled blockchain: contract-guided computation offloading. J Supercomput 79(7):7970\u20137996. https:\/\/doi.org\/10.1007\/s11227-022-04990-7","journal-title":"J Supercomput"},{"key":"2444_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/6107893","volume":"1","author":"X Chu","year":"2022","unstructured":"Chu X (2022) Leng Z (2022) Multiuser computing offload algorithm based on mobile edge computing in the internet of things environment. Wirel Commun Mob Comput 1:1\u20139. https:\/\/doi.org\/10.1155\/2022\/6107893","journal-title":"Wirel Commun Mob Comput"},{"key":"2444_CR18","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.future.2021.08.029","volume":"127","author":"X Huang","year":"2022","unstructured":"Huang X, Gong S, Yang J, Zhang W, Yang L, Yeo CK (2022) Hybrid market-based resources allocation in mobile edge computing systems under stochastic information. Futur Gener Comput Syst 127:80\u201391. https:\/\/doi.org\/10.1016\/j.future.2021.08.029","journal-title":"Futur Gener Comput Syst"},{"key":"2444_CR19","doi-asserted-by":"publisher","unstructured":"Oualhaj OA, Mohamed A, Guizani M, Erbad A (2020) Blockchain based decentralized trust management framework. In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 2210\u20132215. https:\/\/doi.org\/10.1109\/iwcmc48107.2020.9148247. IEEE","DOI":"10.1109\/iwcmc48107.2020.9148247"},{"issue":"2","key":"2444_CR20","doi-asserted-by":"publisher","first-page":"2708","DOI":"10.1109\/jsyst.2020.3004468","volume":"15","author":"T Wang","year":"2020","unstructured":"Wang T, Bai X, Wang H, Liew SC, Zhang S (2020) Game-theoretical analysis of mining strategy for bitcoin-ng blockchain protocol. IEEE Syst J 15(2):2708\u20132719. https:\/\/doi.org\/10.1109\/jsyst.2020.3004468","journal-title":"IEEE Syst J"},{"issue":"2","key":"2444_CR21","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/tcss.2021.3049152","volume":"8","author":"Y Fan","year":"2021","unstructured":"Fan Y, Wang L, Wu W, Du D (2021) Cloud\/edge computing resource allocation and pricing for mobile blockchain: an iterative greedy and search approach. IEEE Transactions on Computational Social Systems 8(2):451\u2013463. https:\/\/doi.org\/10.1109\/tcss.2021.3049152","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"01","key":"2444_CR22","doi-asserted-by":"publisher","first-page":"2240001","DOI":"10.1142\/s0217595922400012","volume":"40","author":"J Chen","year":"2023","unstructured":"Chen J, Cheng Y, Xu Z (2023) A novel two-stage game model for pricing cloud\/fog computing resource in blockchain systems. Asia-Pacific J Oper Res 40(01):2240001. https:\/\/doi.org\/10.1142\/s0217595922400012","journal-title":"Asia-Pacific J Oper Res"},{"key":"2444_CR23","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/3489048.3522651","volume":"1","author":"R Rana","year":"2022","unstructured":"Rana R, Viswanath P, Kannan S, Tse D (2022) Free2shard: Adversary-resistant distributed resource allocation for blockchains. Performance Evaluation Review 1:50. https:\/\/doi.org\/10.1145\/3489048.3522651","journal-title":"Performance Evaluation Review"},{"issue":"4","key":"2444_CR24","doi-asserted-by":"publisher","first-page":"3094","DOI":"10.1109\/jiot.2020.2965009","volume":"7","author":"X Peng","year":"2020","unstructured":"Peng X, Ota K, Dong M (2020) Multiattribute-based double auction toward resource allocation in vehicular fog computing. IEEE Internet Things J 7(4):3094\u20133103. https:\/\/doi.org\/10.1109\/jiot.2020.2965009","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"2444_CR25","doi-asserted-by":"publisher","first-page":"3773","DOI":"10.1109\/tvt.2021.3064426","volume":"70","author":"X Huang","year":"2021","unstructured":"Huang X, Yu R, Ye D, Shu L, Xie S (2021) Efficient workload allocation and user-centric utility maximization for task scheduling in collaborative vehicular edge computing. IEEE Trans Veh Technol 70(4):3773\u20133787. https:\/\/doi.org\/10.1109\/tvt.2021.3064426","journal-title":"IEEE Trans Veh Technol"},{"key":"2444_CR26","doi-asserted-by":"publisher","unstructured":"Wang Y, Gao H, Xiang Z, Zhu Z, Al-Dulaimi A (2024) Rsmr: A reliable and sustainable multi-path routing scheme for vehicle electronics in edge computing networks. IEEE Transactions on Consumer Electronics PP, 1\u20131. https:\/\/doi.org\/10.1109\/TCE.2024.3436908","DOI":"10.1109\/TCE.2024.3436908"},{"issue":"12","key":"2444_CR27","doi-asserted-by":"publisher","first-page":"21215","DOI":"10.1109\/JIOT.2024.3366506","volume":"11","author":"H Zeng","year":"2024","unstructured":"Zeng H, Zhu Z, Wang Y, Xiang Z, Gao H (2024) Periodic collaboration and real-time dispatch using an actor-critic framework for uav movement in mobile edge computing. IEEE Internet Things J 11(12):21215\u201321226. https:\/\/doi.org\/10.1109\/JIOT.2024.3366506","journal-title":"IEEE Internet Things J"},{"key":"2444_CR28","doi-asserted-by":"publisher","unstructured":"Li P, Xiao Z, Gao H, Wang X, Wang Y (2025) Reinforcement learning based edge-end collaboration for multi-task scheduling in 6g enabled intelligent autonomous transport systems. IEEE Transactions on Intelligent Transportation Systems PP, 1\u201314. https:\/\/doi.org\/10.1109\/TITS.2024.3525356","DOI":"10.1109\/TITS.2024.3525356"},{"key":"2444_CR29","doi-asserted-by":"publisher","unstructured":"Gao Y, Zhang H, Yu F, Xia Y, Shi Y (2022) Joint computation offloading and resource allocation for mobile-edge computing assisted ultra-dense networks. Journal of Communications and Information Networks (1):7. https:\/\/doi.org\/10.23919\/jcin.2022.9745485","DOI":"10.23919\/jcin.2022.9745485"},{"issue":"2","key":"2444_CR30","doi-asserted-by":"publisher","first-page":"1022","DOI":"10.1109\/twc.2021.3100985","volume":"21","author":"Y Xu","year":"2021","unstructured":"Xu Y, Zhang H, Ji H, Yang L, Li X, Leung VC (2021) Transaction throughput optimization for integrated blockchain and mec system in iot. IEEE Trans Wireless Commun 21(2):1022\u20131036. https:\/\/doi.org\/10.1109\/twc.2021.3100985","journal-title":"IEEE Trans Wireless Commun"},{"issue":"6","key":"2444_CR31","doi-asserted-by":"publisher","first-page":"2058","DOI":"10.1109\/tmc.2020.3035990","volume":"21","author":"S Jiang","year":"2020","unstructured":"Jiang S, Li X, Wu J (2020) Multi-leader multi-follower stackelberg game in mobile blockchain mining. IEEE Trans Mob Comput 21(6):2058\u20132071. https:\/\/doi.org\/10.1109\/tmc.2020.3035990","journal-title":"IEEE Trans Mob Comput"},{"key":"2444_CR32","doi-asserted-by":"publisher","first-page":"2400","DOI":"10.1109\/jsyst.2019.2927686","volume":"14","author":"N Gupta","year":"2020","unstructured":"Gupta N, Dhurandher SK, Sehgal A (2020) A contract theory approach-based scheme to encourage secondary users for cooperative sensing in cognitive radio networks. IEEE Syst J 14:2400\u20132410. https:\/\/doi.org\/10.1109\/jsyst.2019.2927686","journal-title":"IEEE Syst J"},{"key":"2444_CR33","doi-asserted-by":"publisher","first-page":"3029","DOI":"10.1007\/s11276-017-1518-x","volume":"24","author":"N Zhao","year":"2018","unstructured":"Zhao N, Liu R, Chen Y, Wu M, Jiang Y, Xiong W, Liu C (2018) Contract design for relay incentive mechanism under dual asymmetric information in cooperative networks. Wireless Netw 24:3029\u20133044. https:\/\/doi.org\/10.1007\/s11276-017-1518-x","journal-title":"Wireless Netw"},{"key":"2444_CR34","doi-asserted-by":"publisher","first-page":"1349","DOI":"10.1109\/tmc.2020.3025189","volume":"21","author":"N Raveendran","year":"2022","unstructured":"Raveendran N, Zhang H, Song L, Wang LC, Hong CS, Han Z (2022) Pricing and resource allocation optimization for iot fog computing and nfv: An epec and matching based perspective. IEEE Trans Mob Comput 21:1349\u20131361. https:\/\/doi.org\/10.1109\/tmc.2020.3025189","journal-title":"IEEE Trans Mob Comput"},{"key":"2444_CR35","doi-asserted-by":"publisher","unstructured":"Manlove D (2013) Algorithmics of Matching Under Preferences vol. 2. World Scientific, (2013). https:\/\/doi.org\/10.1142\/8591","DOI":"10.1142\/8591"},{"issue":"4","key":"2444_CR36","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1109\/lwc.2021.3049169","volume":"10","author":"C Su","year":"2021","unstructured":"Su C, Ye F, Zha Y, Liu T, Zhang Y, Han Z (2021) Matching with contracts-based resource trading and price negotiation in multi-access edge computing. IEEE Wireless Communications Letters 10(4):892\u2013896. https:\/\/doi.org\/10.1109\/lwc.2021.3049169","journal-title":"IEEE Wireless Communications Letters"},{"issue":"10","key":"2444_CR37","doi-asserted-by":"publisher","first-page":"6242","DOI":"10.1109\/tits.2020.2990462","volume":"22","author":"X Huang","year":"2020","unstructured":"Huang X, Yu R, Xie S, Zhang Y (2020) Task-container matching game for computation offloading in vehicular edge computing and networks. IEEE Trans Intell Transp Syst 22(10):6242\u20136255. https:\/\/doi.org\/10.1109\/tits.2020.2990462","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"11","key":"2444_CR38","doi-asserted-by":"publisher","first-page":"13686","DOI":"10.1109\/tvt.2020.3022766","volume":"69","author":"C Su","year":"2020","unstructured":"Su C, Ye F, Liu T, Tian Y, Han Z (2020) Computation offloading in hierarchical multi-access edge computing based on contract theory and bayesian matching game. IEEE Trans Veh Technol 69(11):13686\u201313701. https:\/\/doi.org\/10.1109\/tvt.2020.3022766","journal-title":"IEEE Trans Veh Technol"},{"issue":"5","key":"2444_CR39","doi-asserted-by":"publisher","first-page":"3313","DOI":"10.1109\/jiot.2021.3098003","volume":"9","author":"KS Khan","year":"2021","unstructured":"Khan KS, Naeem A, Jamalipour A (2021) Incentive-based caching and communication in a clustered d2d network. IEEE Internet Things J 9(5):3313\u20133320. https:\/\/doi.org\/10.1109\/jiot.2021.3098003","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"2444_CR40","doi-asserted-by":"publisher","first-page":"117","DOI":"10.3390\/info14020117","volume":"14","author":"H Taherdoost","year":"2023","unstructured":"Taherdoost H (2023) Smart contracts in blockchain technology: A critical review. Information 14(2):117. https:\/\/doi.org\/10.3390\/info14020117","journal-title":"Information"},{"issue":"4","key":"2444_CR41","doi-asserted-by":"publisher","first-page":"3416","DOI":"10.1109\/comst.2018.2842460","volume":"20","author":"M Conti","year":"2018","unstructured":"Conti M, Kumar ES, Lal C, Ruj S (2018) A survey on security and privacy issues of bitcoin. IEEE communications surveys & tutorials 20(4):3416\u20133452. https:\/\/doi.org\/10.1109\/comst.2018.2842460","journal-title":"IEEE communications surveys & tutorials"},{"key":"2444_CR42","doi-asserted-by":"publisher","first-page":"184976","DOI":"10.1109\/access.2020.3030195","volume":"8","author":"N Irtija","year":"2020","unstructured":"Irtija N, Sangoleye F, Tsiropoulou EE (2020) Contract-theoretic demand response management in smart grid systems. IEEE Access 8:184976\u2013184987. https:\/\/doi.org\/10.1109\/access.2020.3030195","journal-title":"IEEE Access"},{"key":"2444_CR43","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.ijar.2018.10.017","volume":"104","author":"H Zhao","year":"2019","unstructured":"Zhao H, Yu S (2019) Cost-sensitive feature selection via the $$\\ell _{2,1}$$-norm. Int J Approximate Reasoning 104:25\u201337. https:\/\/doi.org\/10.1016\/j.ijar.2018.10.017","journal-title":"Int J Approximate Reasoning"},{"issue":"9","key":"2444_CR44","doi-asserted-by":"publisher","first-page":"6427","DOI":"10.1109\/tcomm.2019.2910545","volume":"67","author":"K Hamidouche","year":"2019","unstructured":"Hamidouche K, Saad W, Debbah M, Thai MT, Han Z (2019) Contract-based incentive mechanism for lte over unlicensed channels. IEEE Trans Commun 67(9):6427\u20136440. https:\/\/doi.org\/10.1109\/tcomm.2019.2910545","journal-title":"IEEE Trans Commun"},{"issue":"12","key":"2444_CR45","doi-asserted-by":"publisher","first-page":"15988","DOI":"10.1109\/tvt.2020.3039851","volume":"69","author":"C Yang","year":"2020","unstructured":"Yang C, Lou W, Liu Y, Xie S (2020) Resource allocation for edge computing-based vehicle platoon on freeway: A contract-optimization approach. IEEE Trans Veh Technol 69(12):15988\u201316000. https:\/\/doi.org\/10.1109\/tvt.2020.3039851","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"2444_CR46","doi-asserted-by":"publisher","first-page":"3545","DOI":"10.1109\/jiot.2020.2973267","volume":"7","author":"X Li","year":"2020","unstructured":"Li X, Ma L, Xu Y, Shankaran R (2020) Resource allocation for d2d-based v2x communication with imperfect csi. IEEE Internet Things J 7(4):3545\u20133558. https:\/\/doi.org\/10.1109\/jiot.2020.2973267","journal-title":"IEEE Internet Things J"},{"key":"2444_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2023.114329","volume":"986","author":"TH Hubert Chan","year":"2024","unstructured":"Hubert Chan TH, Zhihao Gavin Tang QX (2024) Max-min greedy matching problem: Hardness for the adversary and fractional variant. Theoret Comput Sci 986:114329. https:\/\/doi.org\/10.1016\/j.tcs.2023.114329","journal-title":"Theoret Comput Sci"},{"key":"2444_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.nucengdes.2023.112384","volume":"410","author":"JDS Nie","year":"2023","unstructured":"Nie JDS, Graizer V (2023) A greedy algorithm for wavelet-based time domain response spectrum matching. Nucl Eng Des 410:1\u20131117. https:\/\/doi.org\/10.1016\/j.nucengdes.2023.112384","journal-title":"Nucl Eng Des"},{"key":"2444_CR49","doi-asserted-by":"publisher","unstructured":"Wanbo Z, Yuqi F, Jun Z, Xu D, Kim JY (2024) Computing resource allocation for blockchain-based mobile edge\u00a0computing. CMES - Computer Modeling in Engineering and Sciences 140:863\u2013885. https:\/\/doi.org\/10.32604\/cmes.2024.047295","DOI":"10.32604\/cmes.2024.047295"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-025-02444-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-025-02444-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-025-02444-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T09:53:55Z","timestamp":1773309235000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-025-02444-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,24]]},"references-count":49,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["2444"],"URL":"https:\/\/doi.org\/10.1007\/s11036-025-02444-x","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,24]]},"assertion":[{"value":"17 March 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}