{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:53:17Z","timestamp":1772905997251,"version":"3.50.1"},"reference-count":176,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T00:00:00Z","timestamp":1542931200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11227-018-2701-2","type":"journal-article","created":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T10:13:28Z","timestamp":1542968008000},"page":"2070-2105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":196,"title":["Fog computing: from architecture to edge computing and big data processing"],"prefix":"10.1007","volume":"75","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2443-7835","authenticated-orcid":false,"given":"Simar Preet","family":"Singh","sequence":"first","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]},{"given":"Rajesh","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Anju","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,23]]},"reference":[{"key":"2701_CR1","doi-asserted-by":"publisher","unstructured":"Enokido T, Doulikun D, Takizawa M (2017) An energy-aware load balancing algorithm to perform computation type application processes in a cluster of servers. Int J Web Grid Serv 13(2):145. \n                    https:\/\/doi.org\/10.1504\/IJWGS.2017.10004125\n                    \n                  . URL \n                    http:\/\/www.inderscience.com\/link.php?id=10004125","DOI":"10.1504\/IJWGS.2017.10004125"},{"key":"2701_CR2","doi-asserted-by":"publisher","unstructured":"Liu Z, Li J, Wang Y, Li X, Chen S (2017) HGL: a hybrid global-local load balancing routing scheme for the Internet of Things through satellite networks. Int J Distrib Sens Netw 13(3):155014771769258. \n                    https:\/\/doi.org\/10.1177\/1550147717692586\n                    \n                  . URL \n                    http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147717692586","DOI":"10.1177\/1550147717692586"},{"key":"2701_CR3","doi-asserted-by":"publisher","unstructured":"Muck TR, Ghaderi Z, Dutt ND, Bozorgzadeh E (2017) Exploiting heterogeneity for aging-aware load balancing in mobile platforms. IEEE Trans Multiscale Comput Syst 3(1):25\u201335. \n                    https:\/\/doi.org\/10.1109\/TMSCS.2016.2627541\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7740903\/","DOI":"10.1109\/TMSCS.2016.2627541"},{"key":"2701_CR4","doi-asserted-by":"publisher","unstructured":"Jiang F, Liu Y, Wang B, Wang X (2017) A relay-aided device-to-device-based load balancing scheme for multitier heterogeneous networks. IEEE Internet Things J 4(5):1537\u20131551. \n                    https:\/\/doi.org\/10.1109\/JIOT.2017.2677975\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7870597\/","DOI":"10.1109\/JIOT.2017.2677975"},{"key":"2701_CR5","unstructured":"Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things (2015) URL \n                    https:\/\/www.cisco.com\/c\/dam\/en_us\/solutions\/trends\/iot\/docs\/computing-solutions.pdf"},{"key":"2701_CR6","doi-asserted-by":"publisher","unstructured":"Stojmenovic I, Wen S (2014) The fog computing paradigm: scenarios and security issues. In: 2014 Federated conference on computer science and information systems (FedCSIS), pp 1\u20138. \n                    https:\/\/doi.org\/10.15439\/2014F503\n                    \n                  . URL \n                    https:\/\/fedcsis.org\/proceedings\/2014\/drp\/503.html","DOI":"10.15439\/2014F503"},{"key":"2701_CR7","doi-asserted-by":"publisher","first-page":"e68","DOI":"10.1002\/itl2.68","volume":"1","author":"S Rani","year":"2018","unstructured":"Rani S, Ahmed SH (2018) Secure edge computing: an architectural approach and industrial use case. Internet Technol Lett 1:e68","journal-title":"Internet Technol Lett"},{"key":"2701_CR8","doi-asserted-by":"publisher","unstructured":"Dastjerdi AV, Buyya R (2016) Fog computing: helping the internet of things realize its potential. Computer 49(8):112\u2013116. \n                    https:\/\/doi.org\/10.1109\/MC.2016.245\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7543455\/","DOI":"10.1109\/MC.2016.245"},{"key":"2701_CR9","unstructured":"Deshmukh UA, More SA (2016) Fog computing: a new approach in the world of cloud computing. Instr Technol 49"},{"issue":"2","key":"2701_CR10","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/MCOM.2018.1700273","volume":"56","author":"M Gohar","year":"2018","unstructured":"Gohar M, Ahmed SH, Khan M, Guizani N, Ahmed A, Rahman AU (2018) A big data analytics architecture for the internet of small things. IEEE Commun Mag 56(2):128\u2013133","journal-title":"IEEE Commun Mag"},{"key":"2701_CR11","doi-asserted-by":"publisher","unstructured":"Marn-Tordera E, Masip-Bruin X, Garca-Almiana J, Jukan A, Ren G-J, Zhu J (2017) Do we all really know what a fog node is? Current trends towards an open definition. Comput Commun 109:117\u2013130. \n                    https:\/\/doi.org\/10.1016\/j.comcom.2017.05.013\n                    \n                  . URL \n                    http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366416307113","DOI":"10.1016\/j.comcom.2017.05.013"},{"key":"2701_CR12","doi-asserted-by":"publisher","unstructured":"Anawar MR, Wang S, Azam Zia M, Jadoon AK, Akram U, Raza S (2018) Fog computing: an overview of big Iot data analytics. Wireless Commun Mob Comput. \n                    https:\/\/doi.org\/10.1155\/2018\/7157192","DOI":"10.1155\/2018\/7157192"},{"key":"2701_CR13","unstructured":"Cisco estimation report. URL \n                    https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/global-cloud-index-gci\/white-paper-c11-738085.html#_Toc503317525"},{"key":"2701_CR14","doi-asserted-by":"publisher","unstructured":"Hussain F, Alkarkhi A (2017) Big data and fog computing. In: Internet of Things, pp 27\u201344. \n                    https:\/\/doi.org\/10.1007\/978-3-319-55405-1_3","DOI":"10.1007\/978-3-319-55405-1_3"},{"key":"2701_CR15","doi-asserted-by":"publisher","unstructured":"Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854\u2013864. \n                    https:\/\/doi.org\/10.1109\/JIOT.2016.2584538\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7498684\/","DOI":"10.1109\/JIOT.2016.2584538"},{"issue":"5","key":"2701_CR16","first-page":"9","volume":"5","author":"P Kukreja","year":"2016","unstructured":"Kukreja P, Sharma DD (2016) A detail review on cloud. Fog Dew Comput 5(5):9","journal-title":"Fog Dew Comput"},{"issue":"06","key":"2701_CR17","doi-asserted-by":"publisher","first-page":"335","DOI":"10.15623\/ijret.2015.0406057","volume":"4","author":"P More","year":"2015","unstructured":"More P (2015) Review of implementing fog computing. Int J Res Eng Technol 4(06):335\u2013338","journal-title":"Int J Res Eng Technol"},{"key":"2701_CR18","doi-asserted-by":"publisher","unstructured":"Rahmani A-M, Thanigaivelan NK, Gia TN, Granados J, Negash B, Liljeberg P, Tenhunen H (2015) Smart e-health gateway: bringing intelligence to Internet-of-Things based ubiquitous healthcare systems. In: IEEE, pp 826\u2013834. \n                    https:\/\/doi.org\/10.1109\/CCNC.2015.7158084\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7158084\/","DOI":"10.1109\/CCNC.2015.7158084"},{"key":"2701_CR19","doi-asserted-by":"publisher","unstructured":"Aazam M, Huh E-N (2014) Fog computing and smart gateway based communication for Cloud of Things. In: IEEE, pp 464\u2013470. \n                    https:\/\/doi.org\/10.1109\/FiCloud.2014.83\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=6984239","DOI":"10.1109\/FiCloud.2014.83"},{"key":"2701_CR20","doi-asserted-by":"publisher","unstructured":"Aazam M, Huh E-N (2015) Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT. In: IEEE, pp 687\u2013694. \n                    https:\/\/doi.org\/10.1109\/AINA.2015.254\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7098039\/","DOI":"10.1109\/AINA.2015.254"},{"key":"2701_CR21","doi-asserted-by":"publisher","unstructured":"Gia TN, Jiang M, Rahmani A-M, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare Internet of Things: a case study on ECG feature extraction. In: IEEE, pp 356\u2013363. \n                    https:\/\/doi.org\/10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.51\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7363093\/","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.51"},{"key":"2701_CR22","unstructured":"ASE International Conference on Big Data (2015) Academy of Science and Engineering, Association for Computing Machinery. In: ASE international conference on social informatics, a hierarchical distributed fog computing architecture for big data analysis in smart cities, 00000 OCLC: 956994157. URL \n                    http:\/\/dl.acm.org\/citation.cfm?id=2818869"},{"key":"2701_CR23","unstructured":"Bonomi F (2011) The smart and connected vehicle and the Internet of Things, enabling technologies. URL \n                    http:\/\/tf.nist.gov\/seminars\/WSTS\/PDFs\/1-0_Cisco_FBonomi_ConnectedVehicles.pdf"},{"key":"2701_CR24","doi-asserted-by":"publisher","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things, ACM Press, p\u00a013. \n                    https:\/\/doi.org\/10.1145\/2342509.2342513\n                    \n                  . URL \n                    http:\/\/dl.acm.org\/citation.cfm?doid=2342509.2342513","DOI":"10.1145\/2342509.2342513"},{"key":"2701_CR25","doi-asserted-by":"publisher","unstructured":"Bonomi F, Milito R, Natarajan P, Zhu J (2014) Fog computing: a platform for Internet of Things and analytics. In: Bessis N, Dobre C (eds) Big data and Internet of Things: a roadmap for smart environments, vol 546, Springer International Publishing, Cham, pp 169\u2013186. \n                    https:\/\/doi.org\/10.1007\/978-3-319-05029-4_7\n                    \n                  . URL \n                    http:\/\/link.springer.com\/10.1007\/978-3-319-05029-4_7","DOI":"10.1007\/978-3-319-05029-4_7"},{"key":"2701_CR26","doi-asserted-by":"publisher","unstructured":"Gazis V, Leonardi A, Mathioudakis K, Sasloglou K, Kikiras P, Sudhaakar R (2015) Components of fog computing in an industrial Internet of Things context. In: IEEE, pp 1\u20136. \n                    https:\/\/doi.org\/10.1109\/SECONW.2015.7328144\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7328144\/","DOI":"10.1109\/SECONW.2015.7328144"},{"key":"2701_CR27","doi-asserted-by":"publisher","unstructured":"Abdullahi I, Arif S, Hassan S (2015) Ubiquitous shift with information centric network caching using fog computing. In: Phon-Amnuaisuk S, Au TW (eds) Computational intelligence in information systems, vol 331, Springer International Publishing, Cham, pp 327\u2013335. \n                    https:\/\/doi.org\/10.1007\/978-3-319-13153-5_32\n                    \n                  . URL \n                    http:\/\/link.springer.com\/10.1007\/978-3-319-13153-5_32","DOI":"10.1007\/978-3-319-13153-5_32"},{"issue":"1","key":"2701_CR28","first-page":"9","volume":"2","author":"K Skala","year":"2015","unstructured":"Skala K, Davidovic D, Afgan E, Sovic I, Sojat Z (2015) Scalable distributed computing hierarchy: cloud, fog and dew computing. Open J Cloud Comput (OJCC) 2(1):9\u201300063","journal-title":"Open J Cloud Comput (OJCC)"},{"key":"2701_CR29","doi-asserted-by":"publisher","unstructured":"Mahmud R, Kotagiri R, Buyya R (2018) Fog computing: a taxonomy, survey and future directions. In: Di\u00a0Martino B, Li K-C, Yang LT, Esposito A (eds) Internet of everything, Springer, Singapore, pp 103\u2013130. \n                    https:\/\/doi.org\/10.1007\/978-981-10-5861-5_5\n                    \n                  . URL \n                    http:\/\/link.springer.com\/10.1007\/978-981-10-5861-5_5","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"2701_CR30","doi-asserted-by":"publisher","unstructured":"Saharan KP, Kumar A (2015) Fog in comparison to cloud: a survey. Int J Comput Appl 122(3):10\u201312. \n                    https:\/\/doi.org\/10.5120\/21679-4773\n                    \n                  . URL \n                    http:\/\/research.ijcaonline.org\/volume122\/number3\/pxc3904773.pdf","DOI":"10.5120\/21679-4773"},{"key":"2701_CR31","doi-asserted-by":"publisher","unstructured":"Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues, ACM Press, pp 37\u201342. \n                    https:\/\/doi.org\/10.1145\/2757384.2757397\n                    \n                  . URL \n                    http:\/\/dl.acm.org\/citation.cfm?doid=2757384.2757397","DOI":"10.1145\/2757384.2757397"},{"key":"2701_CR32","doi-asserted-by":"publisher","unstructured":"Yi S, Hao Z, Qin Z, Li Q (2015) Fog computing: platform and applications. In: IEEE, pp 73\u201378. \n                    https:\/\/doi.org\/10.1109\/HotWeb.2015.22\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7372286\/","DOI":"10.1109\/HotWeb.2015.22"},{"key":"2701_CR33","doi-asserted-by":"publisher","unstructured":"Razouk W, Sgandurra D, Sakurai K (2017) A new security middleware architecture based on fog computing and cloud to support IoT constrained devices, ACM Press, pp 1\u20138. \n                    https:\/\/doi.org\/10.1145\/3109761.3158413\n                    \n                  . URL \n                    http:\/\/dl.acm.org\/citation.cfm?doid=3109761.3158413","DOI":"10.1145\/3109761.3158413"},{"key":"2701_CR34","doi-asserted-by":"publisher","unstructured":"Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog computing for the Internet of Things: security and privacy issues. IEEE Internet Comput 21(2):34\u201342. \n                    https:\/\/doi.org\/10.1109\/MIC.2017.37\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7867732\/","DOI":"10.1109\/MIC.2017.37"},{"key":"2701_CR35","doi-asserted-by":"publisher","unstructured":"Roman R, Lopez J, Mambo M (2018) Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680\u2013698. \n                    https:\/\/doi.org\/10.1016\/j.future.2016.11.009\n                    \n                  . URL \n                    https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X16305635","DOI":"10.1016\/j.future.2016.11.009"},{"key":"2701_CR36","doi-asserted-by":"publisher","unstructured":"Zhao P, Tian H, Fan S, Paulraj A (2018) Information prediction and dynamic programming-based RAN slicing for mobile edge computing. IEEE Wirel Commun Lett 7(4):614\u2013617. \n                    https:\/\/doi.org\/10.1109\/LWC.2018.2802522\n                    \n                  . URL \n                    https:\/\/ieeexplore.ieee.org\/document\/8281474\/","DOI":"10.1109\/LWC.2018.2802522"},{"key":"2701_CR37","doi-asserted-by":"publisher","unstructured":"Krner M, Runge TM, Panda A, Ratnasamy S, Shenker S (2018) Open carrier interface: an open source edge computing framework. In: Proceedings of the 2018 workshop on networking for emerging applications and technologies\u2014NEAT \u201918, ACM Press, Budapest, Hungary, pp 27\u201332. \n                    https:\/\/doi.org\/10.1145\/3229574.3229579\n                    \n                  . URL \n                    http:\/\/dl.acm.org\/citation.cfm?doid=3229574.3229579","DOI":"10.1145\/3229574.3229579"},{"key":"2701_CR38","doi-asserted-by":"publisher","unstructured":"Syamkumar M, Barford P, Durairajan R (2018) Deployment characteristics of \u201cThe Edge\u201d in mobile edge computing. In: Proceedings of the 2018 workshop on mobile edge communications\u2014MECOMM\u201918, ACM Press, Budapest, Hungary, pp 43\u201349. \n                    https:\/\/doi.org\/10.1145\/3229556.3229557\n                    \n                  . URL \n                    http:\/\/dl.acm.org\/citation.cfm?doid=3229556.3229557","DOI":"10.1145\/3229556.3229557"},{"key":"2701_CR39","doi-asserted-by":"publisher","unstructured":"Yu W, Liang F, He X, Hatcher WG, Lu C, Lin J, Yang X (2018) A survey on the edge computing for the Internet of Things. In: IEEE access, vol 6, pp 6900\u20136919. \n                    https:\/\/doi.org\/10.1109\/ACCESS.2017.2778504\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/8123913\/","DOI":"10.1109\/ACCESS.2017.2778504"},{"key":"2701_CR40","doi-asserted-by":"publisher","unstructured":"Jeong S, Simeone O, Kang J (2018) Mobile edge computing via a UAV-mounted cloudlet: optimization of bit allocation and path planning. IEEE Trans Veh Technol 67(3):2049\u20132063. \n                    https:\/\/doi.org\/10.1109\/TVT.2017.2706308\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7932157\/","DOI":"10.1109\/TVT.2017.2706308"},{"key":"2701_CR41","doi-asserted-by":"publisher","unstructured":"Rahmani AM, Gia TN, Negash B, Anzanpour A, Azimi I, Jiang M, Liljeberg P (2018) Exploiting smart e-health gateways at the edge of healthcare Internet-of-Things: a fog computing approach. Future Gener Comput Syst 78:641\u2013658. \n                    https:\/\/doi.org\/10.1016\/j.future.2017.02.014\n                    \n                  . URL \n                    http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X17302121","DOI":"10.1016\/j.future.2017.02.014"},{"key":"2701_CR42","doi-asserted-by":"publisher","unstructured":"Vora J, Tanwar S, Tyagi S, Kumar N, Rodrigues JJPC (2017) FAAL: fog computing-based patient monitoring system for ambient assisted living. In: IEEE, pp 1\u20136. \n                    https:\/\/doi.org\/10.1109\/HealthCom.2017.8210825\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/8210825\/","DOI":"10.1109\/HealthCom.2017.8210825"},{"key":"2701_CR43","first-page":"7","volume":"4","author":"KA Fakeeh","year":"2016","unstructured":"Fakeeh KA (2016) Privacy and security problems in fog computing. Commun Appl Electron 4:7","journal-title":"Commun Appl Electron"},{"key":"2701_CR44","doi-asserted-by":"publisher","unstructured":"Taneja M, Davy A (2016) Resource aware placement of data analytics platform in fog computing. Procedia Comput Sci 97:153\u2013156. \n                    https:\/\/doi.org\/10.1016\/j.procs.2016.08.295\n                    \n                  . URL \n                    http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050916321111","DOI":"10.1016\/j.procs.2016.08.295"},{"key":"2701_CR45","doi-asserted-by":"publisher","unstructured":"Singh S, Chana I (2015) QoS-aware autonomic resource management in cloud computing: a systematic review. ACM Comput Surv 48(3):1\u201346. \n                    https:\/\/doi.org\/10.1145\/2843889\n                    \n                  . URL \n                    http:\/\/dl.acm.org\/citation.cfm?doid=2856149.2843889","DOI":"10.1145\/2843889"},{"key":"2701_CR46","doi-asserted-by":"publisher","unstructured":"Souza VB, Masip-Bruin X, Marin-Tordera E, Ramirez W , Sanchez S (2016) Towards distributed service allocation in fog-to-cloud (F2c) scenarios. In: IEEE, pp 1\u20136. \n                    https:\/\/doi.org\/10.1109\/GLOCOM.2016.7842341\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7842341\/","DOI":"10.1109\/GLOCOM.2016.7842341"},{"issue":"8","key":"2701_CR47","first-page":"5","volume":"3","author":"M Gupta","year":"2017","unstructured":"Gupta M (2017) Fog computing pushing intelligence to the edge. Int J Sci Technol Eng 3(8):5","journal-title":"Int J Sci Technol Eng"},{"key":"2701_CR48","doi-asserted-by":"publisher","unstructured":"Zhao H, Li X (2013) Resource management in utility and cloud computing, SpringerBriefs in Computer Science, Springer New York, New York. \n                    https:\/\/doi.org\/10.1007\/978-1-4614-8970-2\n                    \n                  . URL \n                    http:\/\/link.springer.com\/10.1007\/978-1-4614-8970-2","DOI":"10.1007\/978-1-4614-8970-2"},{"key":"2701_CR49","doi-asserted-by":"publisher","unstructured":"Kameda H, Li J, Kim C, Zhang Y (1997) Optimal load balancing in distributed computer systems, telecommunication networks and computer systems, Springer London. \n                    https:\/\/doi.org\/10.1007\/978-1-4471-0969-3\n                    \n                  . URL \n                    http:\/\/link.springer.com\/10.1007\/978-1-4471-0969-3","DOI":"10.1007\/978-1-4471-0969-3"},{"key":"2701_CR50","volume-title":"Load balancing servers, firewalls, and caches","author":"C Kopparapu","year":"2002","unstructured":"Kopparapu C (2002) Load balancing servers, firewalls, and caches. Wiley, New York"},{"key":"2701_CR51","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCC.2017.27","volume":"4","author":"LF Bittencourt","year":"2017","unstructured":"Bittencourt LF, Rana OF (2017) Mobility-aware application scheduling in fog computing. IEEE Cloud Comput 4:26\u201335","journal-title":"IEEE Cloud Comput"},{"key":"2701_CR52","doi-asserted-by":"publisher","unstructured":"Etemad M, Aazam M, St-Hilaire M (2017) Using DEVS for modeling and simulating a fog computing environment. In: IEEE, pp 849\u2013854. \n                    https:\/\/doi.org\/10.1109\/ICCNC.2017.7876242\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7876242\/","DOI":"10.1109\/ICCNC.2017.7876242"},{"key":"2701_CR53","doi-asserted-by":"publisher","unstructured":"Aazam M, Zeadally S, Harras KA Offloading in fog computing for IoT: review, enabling technologies, and research opportunities. Future Gener Comput Syst. \n                    https:\/\/doi.org\/10.1016\/j.future.2018.04.057\n                    \n                  . URL \n                    http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X18301973","DOI":"10.1016\/j.future.2018.04.057"},{"key":"2701_CR54","doi-asserted-by":"publisher","unstructured":"Rayes A, Salam S (2017) Fog computing defining. In: Internet of Things from hype to reality, Springer International Publishing, Cham, pp 139\u2013164. \n                    https:\/\/doi.org\/10.1007\/978-3-319-44860-2_6\n                    \n                  . URL \n                    http:\/\/link.springer.com\/10.1007\/978-3-319-44860-2_6","DOI":"10.1007\/978-3-319-44860-2_6"},{"key":"2701_CR55","unstructured":"Klas GI (2015) Fog computing and mobile edge cloud gain momentum open fog consortium, ETSI MEC and cloudlets"},{"key":"2701_CR56","doi-asserted-by":"publisher","unstructured":"Deng R, Lu R, Lai C, Luan TH (2015) Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing. In: IEEE, pp 3909\u20133914. \n                    https:\/\/doi.org\/10.1109\/ICC.2015.7248934\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7248934\/","DOI":"10.1109\/ICC.2015.7248934"},{"key":"2701_CR57","doi-asserted-by":"publisher","unstructured":"Dolui K, Datta SK (2017) Comparison of edge computing implementations: fog computing, cloudlet and mobile edge computing. In: IEEE, pp 1\u20136. \n                    https:\/\/doi.org\/10.1109\/GIOTS.2017.8016213\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/8016213\/","DOI":"10.1109\/GIOTS.2017.8016213"},{"key":"2701_CR58","doi-asserted-by":"publisher","unstructured":"Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27\u201342. \n                    https:\/\/doi.org\/10.1016\/j.jnca.2017.09.002\n                    \n                  . URL \n                    http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1084804517302953","DOI":"10.1016\/j.jnca.2017.09.002"},{"key":"2701_CR59","unstructured":"Fog computing in the internet of things (2017) Intelligence at the edge, 1st edn. Springer, New York"},{"key":"2701_CR60","first-page":"1","volume":"7","author":"AN Toosi","year":"2018","unstructured":"Toosi AN, Son J, Buyya R (2018) Clouds-pi: a low-cost raspberry-pi based testbed for software-defined-networking in cloud data centers. ACM SIGCOMM Comput Commun Rev 7:1\u201311","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"2701_CR61","doi-asserted-by":"publisher","unstructured":"Wang K, Shen M, Cho J, Banerjee A, Van\u00a0der Merwe J, Webb K (2015) MobiScud: a fast moving personal cloud in the mobile network, ACM Press, pp 19\u201324. \n                    https:\/\/doi.org\/10.1145\/2785971.2785979\n                    \n                  . URL \n                    http:\/\/dl.acm.org\/citation.cfm?doid=2785971.2785979","DOI":"10.1145\/2785971.2785979"},{"key":"2701_CR62","doi-asserted-by":"publisher","unstructured":"Han B, Gopalakrishnan V, Ji L, Lee S (2015) Network function virtualization: challenges and opportunities for innovations. IEEE Commun Mag 53(2):90\u201397. \n                    https:\/\/doi.org\/10.1109\/MCOM.2015.7045396\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7045396\/","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"2701_CR63","doi-asserted-by":"publisher","unstructured":"Vinueza\u00a0Naranjo PG, Baccarelli E, Scarpiniti M Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications. J Supercomput. \n                    https:\/\/doi.org\/10.1007\/s11227-018-2274-0\n                    \n                  . URL \n                    http:\/\/link.springer.com\/10.1007\/s11227-018-2274-0","DOI":"10.1007\/s11227-018-2274-0"},{"key":"2701_CR64","doi-asserted-by":"publisher","unstructured":"Oueis J, Strinati EC, Barbarossa S (2015) The fog balancing: load distribution for small cell cloud computing. In: IEEE, pp 1\u20136. \n                    https:\/\/doi.org\/10.1109\/VTCSpring.2015.7146129\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7146129\/","DOI":"10.1109\/VTCSpring.2015.7146129"},{"key":"2701_CR65","doi-asserted-by":"publisher","unstructured":"De Vleeschauwer D, Robinson DC (2011) Optimum caching strategies for a telco CDN. Bell Labs Tech J 16(2):115\u2013132. \n                    https:\/\/doi.org\/10.1002\/bltj.20506\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=6770158","DOI":"10.1002\/bltj.20506"},{"key":"2701_CR66","doi-asserted-by":"publisher","unstructured":"Pooranian Z, Shojafar M, Naranjo PGV, Chiaraviglio L, Conti M (2017) A novel distributed fog-based networked architecture to preserve energy in fog data centers. In: IEEE, pp 604\u2013609. \n                    https:\/\/doi.org\/10.1109\/MASS.2017.33\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/8108808\/","DOI":"10.1109\/MASS.2017.33"},{"key":"2701_CR67","doi-asserted-by":"publisher","unstructured":"Gupta P, Goyal MK, Gupta N (2015) Reliability aware load balancing algorithm for content delivery network. In: Satapathy SC, Govardhan A, Raju KS, Mandal JK (eds) Emerging ICT for bridging the future\u2014proceedings of the 49th annual convention of the computer society of India (CSI), vol 337, Springer International Publishing, Cham, pp 427\u2013434. \n                    https:\/\/doi.org\/10.1007\/978-3-319-13728-5_48\n                    \n                  . URL \n                    http:\/\/link.springer.com\/10.1007\/978-3-319-13728-5_48","DOI":"10.1007\/978-3-319-13728-5_48"},{"key":"2701_CR68","doi-asserted-by":"publisher","unstructured":"Zhou J, Qiao Y (2015) Low-peak-to-average power ratio and low-complexity asymmetrically clipped optical orthogonal frequency-division multiplexing uplink transmission scheme for long-reach passive optical network. Opt Lett 40(17):4034. \n                    https:\/\/doi.org\/10.1364\/OL.40.004034\n                    \n                  . URL \n                    https:\/\/www.osapublishing.org\/abstract.cfm?URI=ol-40-17-4034","DOI":"10.1364\/OL.40.004034"},{"key":"2701_CR69","doi-asserted-by":"publisher","unstructured":"Nag A, Payne DB, Ruffini M (2016) N:1 protection design for minimizing olts in resilient dual-homed long-reach passive optical network. J Opt Commun Netw 8(2):93. \n                    https:\/\/doi.org\/10.1364\/JOCN.8.000093\n                    \n                  . URL \n                    https:\/\/www.osapublishing.org\/abstract.cfm?URI=jocn-8-2-93","DOI":"10.1364\/JOCN.8.000093"},{"key":"2701_CR70","doi-asserted-by":"publisher","unstructured":"Dixit A, Lannoo B, Colle D, Pickavet M, Demeester P (2015) Delay models in ethernet long-reach passive optical networks. In: IEEE, pp 1239\u20131247. \n                    https:\/\/doi.org\/10.1109\/INFOCOM.2015.7218499\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7218499\/","DOI":"10.1109\/INFOCOM.2015.7218499"},{"key":"2701_CR71","doi-asserted-by":"publisher","unstructured":"De\u00a0Andrade M, Buttaboni A, Tornatore M, Boffi P, Martelli P, Pattavina A (2015) Optimization of long-reach TDM\/WDM passive optical networks. Opt Switch Netw 16:36\u201345. \n                    https:\/\/doi.org\/10.1016\/j.osn.2014.11.001\n                    \n                  . URL \n                    http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S157342771400126X","DOI":"10.1016\/j.osn.2014.11.001"},{"key":"2701_CR72","doi-asserted-by":"publisher","unstructured":"Liu Y, Guo L, Yu C, Yu Y, Wang X (2014) Planning of survivable long-reach passive optical network (LR-PON) against single shared-risk link group (SRLG) failure. Opt Switch Netwo 11:167\u2013176. \n                    https:\/\/doi.org\/10.1016\/j.osn.2013.06.001\n                    \n                  . URL \n                    http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1573427713000404","DOI":"10.1016\/j.osn.2013.06.001"},{"key":"2701_CR73","doi-asserted-by":"publisher","unstructured":"Truong NB, Lee GM, Ghamri-Doudane Y (2015) Software defined networking-based vehicular adhoc network with fog computing. In: IEEE, pp 1202\u20131207. \n                    https:\/\/doi.org\/10.1109\/INM.2015.7140467\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7140467\/","DOI":"10.1109\/INM.2015.7140467"},{"key":"2701_CR74","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/CC.2016.7833468","volume":"13","author":"X He","year":"2016","unstructured":"He X, Ren Z, Shi C, Fang J (2016) Cloud\/fog networking in the internet of vehicles. China Commun 13:140\u2013149","journal-title":"China Commun"},{"key":"2701_CR75","doi-asserted-by":"crossref","unstructured":"Din S, Paul A, Ahmad A, Ahmed SH, Jeon G, Rawat DB (2018) Hierarchical architecture for 5g based software-defined intelligent transportation system. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE","DOI":"10.1109\/INFCOMW.2018.8406895"},{"key":"2701_CR76","unstructured":"Sheetal J Architecture of 5g technology in mobile communication. In: Proceedings of 18th IRF International Conference, 11th January"},{"key":"2701_CR77","unstructured":"Brown D, Mather D, Shaddock RN, Weeks WA, Franckx J, Erreygers JJJM (2018) Single line passive optical network converter module. US Patent 9,900,108 (Feb.\u00a020)"},{"key":"2701_CR78","unstructured":"Chakraborty P (2018) Design of passive optical network for hospital management. Asian J Converg Technol 4(I)"},{"key":"2701_CR79","doi-asserted-by":"crossref","unstructured":"Mahmud R, Kotagiri R, Buyya R (2018) Fog computing: a taxonomy, survey and future directions. In: Internet of everything, Springer, pp 103\u2013130","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"2701_CR80","doi-asserted-by":"publisher","unstructured":"Mercian A, McGarry MP, Reisslein M (2013) Offline and online multi-thread polling in long-reach pons: a critical evaluation. J Lightwave Technol 31(12):2018\u20132028. \n                    https:\/\/doi.org\/10.1109\/JLT.2013.2262766\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/6515602\/","DOI":"10.1109\/JLT.2013.2262766"},{"key":"2701_CR81","unstructured":"Townsend PD, Talli G, MacHale EK, Antony C (2008) Long reach PONs, COIN 2008. In: 7th International Conference on Optical Internet, pp 1\u2013200000"},{"key":"2701_CR82","doi-asserted-by":"crossref","unstructured":"Helmy A, Krishna N, Nayak A (2018) On the feasibility of service composition in a long-reach pon backhaul. In: 2018 International Conference on Optical Network Design and Modeling (ONDM), IEEE, pp 41\u201346","DOI":"10.23919\/ONDM.2018.8396104"},{"issue":"9","key":"2701_CR83","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1364\/JOCN.10.000736","volume":"10","author":"A Helmy","year":"2018","unstructured":"Helmy A, Nayak A (2018) Toward parallel edge computing in long-reach pons. J Opt Commun Netw 10(9):736\u2013748","journal-title":"J Opt Commun Netw"},{"key":"2701_CR84","doi-asserted-by":"crossref","unstructured":"Arbelaez A, Mehta D, Sullivan OB, Quesad L (2018) Parallel constraint-based local search: an application to designing resilient long-reach passive optical networks. In: Handbook of parallel constraint reasoning, Springer, pp 633\u2013665","DOI":"10.1007\/978-3-319-63516-3_17"},{"key":"2701_CR85","doi-asserted-by":"publisher","unstructured":"Dastjerdi A, Gupta H, Calheiros R, Ghosh S, Buyya R (2016) Fog computing: principles, architectures, and applications. In: Internet of Things, Elsevier, pp 61\u201375. \n                    https:\/\/doi.org\/10.1016\/B978-0-12-805395-9.00004-6\n                    \n                  . URL \n                    http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780128053959000046","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"2701_CR86","doi-asserted-by":"publisher","unstructured":"Stojmenovic I, Wen S, Huang X, Luan H (2016) An overview of fog computing and its security issues: an overview of fog computing and its security issues. Concurr Comput Pract Exp 28(10):2991\u20133005. \n                    https:\/\/doi.org\/10.1002\/cpe.3485\n                    \n                  . URL \n                    http:\/\/doi.wiley.com\/10.1002\/cpe.3485","DOI":"10.1002\/cpe.3485"},{"key":"2701_CR87","doi-asserted-by":"crossref","unstructured":"Dastjerdi AV, Gupta H, Calheiros RN, Ghosh SK, Buyya R (2016) Fog computing: principles, architectures, and applications. In: Internet of Things, Elsevier, pp 61\u201375","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"issue":"6","key":"2701_CR88","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang M, Zhang T (2016) Fog and iot: an overview of research opportunities. IEEE Internet Things J 3(6):854\u2013864","journal-title":"IEEE Internet Things J"},{"issue":"06","key":"2701_CR89","doi-asserted-by":"publisher","first-page":"335","DOI":"10.15623\/ijret.2015.0406057","volume":"4","author":"P More","year":"2015","unstructured":"More P (2015) Review of implementing fog computing. Int J Res Eng Technol 4(06):335\u2013338","journal-title":"Int J Res Eng Technol"},{"key":"2701_CR90","doi-asserted-by":"publisher","unstructured":"Lin CC, Yang JW (2018) Cost-efficient deployment of fog computing systems at logistics centers in industry 4.0. IEEE Trans Ind Inf. \n                    https:\/\/doi.org\/10.1109\/TII.2018.2827920","DOI":"10.1109\/TII.2018.2827920"},{"issue":"4","key":"2701_CR91","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1080\/17517575.2017.1295321","volume":"12","author":"G Jia","year":"2018","unstructured":"Jia G, Han G, Wang H, Wang F (2018) Cost aware cache replacement policy in shared last-level cache for hybrid memory based fog computing. EnterpInf Syst 12(4):435\u2013451","journal-title":"EnterpInf Syst"},{"issue":"1","key":"2701_CR92","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TCC.2015.2485206","volume":"6","author":"S Sarkar","year":"2018","unstructured":"Sarkar S, Chatterjee S, Misra S (2018) Assessment of the suitability of fog computing in the context of internet of things. IEEE Trans Cloud Comput 6(1):46\u201359","journal-title":"IEEE Trans Cloud Comput"},{"key":"2701_CR93","doi-asserted-by":"publisher","unstructured":"Song Z, Duan Y, Wan S, Sun X, Zou Q, Gao H, Zhu D (2018) Processing optimization of typed resources with synchronized storage and computation adaptation in fog computing. Wireless Commun Mob Comput. \n                    https:\/\/doi.org\/10.1155\/2018\/3794175","DOI":"10.1155\/2018\/3794175"},{"key":"2701_CR94","doi-asserted-by":"crossref","unstructured":"He S, Cheng B, Wang H, Xiao X, Cao Y, Chen J (2018) Data security storage model for fog computing in large-scale iot application. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE, pp 39\u201344","DOI":"10.1109\/INFCOMW.2018.8406927"},{"issue":"5","key":"2701_CR95","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MCOM.2018.1700908","volume":"56","author":"Y Bi","year":"2018","unstructured":"Bi Y, Han G, Lin C, Deng Q, Guo L, Li F (2018) Mobility support for fog computing: an sdn approach. IEEE Commun Mag 56(5):53\u201359","journal-title":"IEEE Commun Mag"},{"key":"2701_CR96","doi-asserted-by":"crossref","unstructured":"Roig PJ, Alcaraz S, Gilly K, Juiz C (2018) Study on mobility and migration in a fog computing environment. In: 22nd International Conference Electronics, IEEE, pp 1\u20136","DOI":"10.1109\/ELECTRONICS.2018.8443636"},{"issue":"2","key":"2701_CR97","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MCOM.2018.1700333","volume":"56","author":"P Zhang","year":"2018","unstructured":"Zhang P, Liu JK, Yu FR, Sookhak M, Au MH, Luo X (2018) A survey on access control in fog computing. IEEE Commun Mag 56(2):144\u2013149","journal-title":"IEEE Commun Mag"},{"key":"2701_CR98","doi-asserted-by":"crossref","unstructured":"Thota C, Sundarasekar R, Manogaran G, Varatharajan R, Priyan M (2018) Centralized fog computing security platform for iot and cloud in healthcare system. In: Exploring the Convergence of Big Data and the Internet of Things, IGI Global, pp 141\u2013154","DOI":"10.4018\/978-1-5225-2947-7.ch011"},{"key":"2701_CR99","doi-asserted-by":"crossref","unstructured":"Wang B, Chang Z, Zhou Z, Ristaniemi T (2018) Reliable and privacy-preserving task recomposition for crowdsensing in vehicular fog computing. In: IEEE 87th Vehicular Technology Conference (VTC Spring), IEEE, pp 1\u20136","DOI":"10.1109\/VTCSpring.2018.8417688"},{"key":"2701_CR100","first-page":"1","volume":"99","author":"Y Guan","year":"2018","unstructured":"Guan Y, Shao J, Wei G, Xie M (2018) Data security and privacy in fog computing. IEEE Netw 99:1\u20136","journal-title":"IEEE Netw"},{"issue":"4","key":"2701_CR101","first-page":"351","volume":"60","author":"C Matt","year":"2018","unstructured":"Matt C (2018) Fog computing. Bus Inf. Syst Eng 60(4):351\u2013355","journal-title":"Syst Eng"},{"key":"2701_CR102","doi-asserted-by":"crossref","unstructured":"Shi C, Ren Z, Yang K, Chen C, Zhang H, Xiao Y, Hou X (2018) Ultra-low latency cloud-fog computing for industrial internet of things. In: 2018 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, pp 1\u20136","DOI":"10.1109\/WCNC.2018.8377192"},{"key":"2701_CR103","unstructured":"Mahmud R, Ramamohanarao K, Buyya R Latency-aware application module management for fog computing environments. In: ACM Transactions on Internet Technology (TOIT)"},{"key":"2701_CR104","doi-asserted-by":"publisher","unstructured":"Mahmud R, Srirama SN, Ramamohanarao K, Buyya R (2018) Quality of experience (QoE)-aware placement of applications in fog computing environments. J Parallel Distrib Comput. \n                    https:\/\/doi.org\/10.1016\/j.jpdc.2018.03.004","DOI":"10.1016\/j.jpdc.2018.03.004"},{"issue":"10","key":"2701_CR105","doi-asserted-by":"publisher","first-page":"4590","DOI":"10.1109\/TII.2018.2843802","volume":"14","author":"DA Chekired","year":"2018","unstructured":"Chekired DA, Khoukhi L, Mouftah HT (2018) Industrial IoT data scheduling based on hierarchical fog computing: a key for enabling smart factory. IEEE Trans Ind Inf 14(10):4590\u20134602. \n                    https:\/\/doi.org\/10.1109\/TII.2018.2843802","journal-title":"IEEE Trans Ind Inf"},{"key":"2701_CR106","unstructured":"Kiani A, Ansari N, Khreishah A Hierarchical capacity provisioning for fog computing. arXiv preprint \n                    arXiv:1807.01093"},{"key":"2701_CR107","unstructured":"Naqvi SAA, Javaid N, Butt H, Kamal MB, Hamza A, Kashif M (2018) Metaheuristic optimization technique for load balancing in cloud-fog environment integrated with smart grid. In: International Conference on Network-Based Information Systems, Springer, pp 700\u2013711"},{"key":"2701_CR108","doi-asserted-by":"crossref","unstructured":"Hussain MM, Alam MS, Beg MS (2019) Feasibility of fog computing in smart grid architectures. In: Proceedings of 2nd International Conference on Communication, Computing and Networking, Springer, pp 999\u20131010","DOI":"10.1007\/978-981-13-1217-5_98"},{"key":"2701_CR109","unstructured":"Okay FY, Ozdemir S (2018) A secure data aggregation protocol for fog computing based smart grids. In: 2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power Engineering (CPE-POWERENG), IEEE, pp 1\u20136"},{"key":"2701_CR110","doi-asserted-by":"publisher","unstructured":"Lyu L, Nandakumar K, Rubinstein B, Jin J, Bedo J, Palaniswami M (2018) PPFA privacy preserving fog-enabled aggregation in smart grid. IEEE Trans Ind Inf. \n                    https:\/\/doi.org\/10.1109\/TII.2018.2803782","DOI":"10.1109\/TII.2018.2803782"},{"issue":"1","key":"2701_CR111","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MIC.2017.265102316","volume":"22","author":"CW Ling","year":"2018","unstructured":"Ling CW, Datta A, Xu J (2018) A case for distributed multilevel storage infrastructure for visual surveillance in intelligent transportation networks. IEEE Internet Comput 22(1):42\u201351","journal-title":"IEEE Internet Comput"},{"key":"2701_CR112","doi-asserted-by":"crossref","unstructured":"Cao Y, Hou P, Brown D, Wang J, Chen S (2015) Distributed analytics and edge intelligence: pervasive health monitoring at the era of fog computing. In: Proceedings of the 2015 Workshop on Mobile Big Data, ACM, pp 43\u201348","DOI":"10.1145\/2757384.2757398"},{"key":"2701_CR113","doi-asserted-by":"crossref","unstructured":"Gia TN, Jiang M, Rahmani A-M, Westerlund T, Liljeberg P, Tenhunen H (2015) Fog computing in healthcare internet of things: a case study on ecg feature extraction. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM), IEEE, pp 356\u2013363","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.51"},{"key":"2701_CR114","doi-asserted-by":"crossref","unstructured":"Aazam M, Huh E-N (2015) E-hamc: leveraging fog computing for emergency alert service. In: 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), IEEE, pp 518\u2013523","DOI":"10.1109\/PERCOMW.2015.7134091"},{"key":"2701_CR115","doi-asserted-by":"publisher","unstructured":"Ballas C, Marsden M, Zhang D, O\u2019Connor NE, Little S (2018) Performance of video processing at the edge for crowd-monitoring applications. In: 2018 IEEE 4th World Forum Internet Things (WF-IoT). \n                    https:\/\/doi.org\/10.1109\/WF-IoT.2018.8355170","DOI":"10.1109\/WF-IoT.2018.8355170"},{"key":"2701_CR116","doi-asserted-by":"crossref","unstructured":"Hong K, Lillethun D, Ramachandran U, Ottenw\u00e4lder B, Koldehofe B (2013) Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, ACM, pp 15\u201320","DOI":"10.1145\/2491266.2491270"},{"issue":"1","key":"2701_CR117","first-page":"202","volume":"19","author":"X Zhu","year":"2015","unstructured":"Zhu X, Chan DS, Hu H, Prabhu MS, Ganesan E, Bonomi F (2015) Improving video performance with edge servers in the fog computing architecture. Intel Technol J 19(1):202\u2013224","journal-title":"Intel Technol J"},{"key":"2701_CR118","doi-asserted-by":"crossref","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, ACM, pp 13\u201316","DOI":"10.1145\/2342509.2342513"},{"key":"2701_CR119","doi-asserted-by":"crossref","unstructured":"Grover J, Jain A, Singhal S, Yadav A (2018) Real-time vanet applications using fog computing. In: Proceedings of First International Conference on Smart System, Innovations and Computing, Springer, pp 683\u2013691","DOI":"10.1007\/978-981-10-5828-8_65"},{"key":"2701_CR120","doi-asserted-by":"crossref","unstructured":"Stojmenovic I, Wen S (2014) The fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), IEEE, pp 1\u20138","DOI":"10.15439\/2014F503"},{"key":"2701_CR121","doi-asserted-by":"crossref","unstructured":"Bonomi F, Milito R, Natarajan P, Zhu J (2014) Fog computing: a platform for internet of things and analytics. In: Big Data and Internet of Things: A Roadmap for Smart Environments, Springer, pp 169\u2013186","DOI":"10.1007\/978-3-319-05029-4_7"},{"key":"2701_CR122","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1016\/j.future.2017.02.017","volume":"78","author":"J Liu","year":"2018","unstructured":"Liu J, Li J, Zhang L, Dai F, Zhang Y, Meng X, Shen J (2018) Secure intelligent traffic light control using fog computing. Future Gener Comput Syst 78:817\u2013824","journal-title":"Future Gener Comput Syst"},{"key":"2701_CR123","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1016\/j.future.2017.09.014","volume":"78","author":"KKR Choo","year":"2018","unstructured":"Choo KKR, Lu R, Chen L, Yi X (2018) A foggy research future: advances and future opportunities in fog computing research. Future Gener Comput Syst 78:677\u2013679","journal-title":"Future Gener Comput Syst"},{"key":"2701_CR124","doi-asserted-by":"crossref","unstructured":"Tran VL, Islam A, Kharel J, Shin SY (2018) On the application of social internet of things with fog computing: a new paradigm for traffic information sharing system. In: 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), IEEE, pp 349\u2013354","DOI":"10.1109\/FiCloud.2018.00057"},{"key":"2701_CR125","unstructured":"Rao YS, Sree KB (2018) A review on fog computing: conceptual live Vm migration framework, issues, applications and its challenges. Int J Sci Res Comput Sci Eng Inf Technol 3(1)"},{"issue":"3","key":"2701_CR126","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MNET.2018.1700286","volume":"32","author":"S Garg","year":"2018","unstructured":"Garg S, Singh A, Batra S, Kumar N, Yang LT (2018) Uav-empowered edge computing environment for cyber-threat detection in smart vehicles. IEEE Netw 32(3):42\u201351","journal-title":"IEEE Netw"},{"key":"2701_CR127","doi-asserted-by":"crossref","unstructured":"Li L, Ota K, Dong M (2018) Deep learning for smart industry: efficient manufacture inspection system with fog computing. IEEE Trans Ind Inf 14(10)","DOI":"10.1109\/TII.2018.2842821"},{"key":"2701_CR128","doi-asserted-by":"publisher","unstructured":"Tortonesi M, Govoni M, Morelli A, Riberto G, Stefanelli C, Suri N (2018) Taming the IoT data deluge: an innovative information-centric service model for fog computing applications. Future Gen Comput Syst. \n                    https:\/\/doi.org\/10.1016\/j.future.2018.06.009","DOI":"10.1016\/j.future.2018.06.009"},{"issue":"4","key":"2701_CR129","first-page":"97","volume":"8","author":"K Raja","year":"2016","unstructured":"Raja K, Krithika L (2016) Smart street light system. Autom Auton Syst 8(4):97\u201399","journal-title":"Autom Auton Syst"},{"issue":"1","key":"2701_CR130","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/2331675.2331679","volume":"16","author":"S Wang","year":"2012","unstructured":"Wang S, Dey S (2012) Cloud mobile gaming: modeling and measuring user experience in mobile wireless networks. ACM SIGMOBILE Mob Comput Commun Rev 16(1):10\u201321","journal-title":"ACM SIGMOBILE Mob Comput Commun Rev"},{"key":"2701_CR131","doi-asserted-by":"crossref","unstructured":"Zhao Z, Hwang K, Villeta J (2012) Game cloud design with virtualized cpu\/gpu servers and initial performance results. In: Proceedings of the 3rd Workshop on Scientific Cloud Computing, ACM, pp 23\u201330","DOI":"10.1145\/2287036.2287042"},{"issue":"4","key":"2701_CR132","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/2479942.2479946","volume":"40","author":"L Yang","year":"2013","unstructured":"Yang L, Cao J, Yuan Y, Li T, Han A, Chan A (2013) A framework for partitioning and execution of data stream applications in mobile cloud computing. ACM SIGMETRICS Perform Eval Rev 40(4):23\u201332","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"2701_CR133","doi-asserted-by":"crossref","unstructured":"Qian Z, He Y, Su C, Wu Z, Zhu H, Zhang T, Zhou L, Yu Y, Zhang Z (2013) Timestream: reliable stream computation in the cloud. In: Proceedings of the 8th ACM European Conference on Computer Systems, ACM, pp 1\u201314","DOI":"10.1145\/2465351.2465353"},{"key":"2701_CR134","unstructured":"Nath SB, Gupta H, Chakraborty S, Ghosh SK A survey of fog computing and communication: current researches and future directions. arXiv preprint \n                    arXiv:1804.04365"},{"key":"2701_CR135","doi-asserted-by":"crossref","unstructured":"Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 Workshop on Mobile Big Data, ACM, pp 37\u201342","DOI":"10.1145\/2757384.2757397"},{"key":"2701_CR136","doi-asserted-by":"crossref","unstructured":"Yi S, Hao Z, Qin Z, Li Q (2015) Fog computing: platform and applications. In: Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb), IEEE 2015, pp 73\u201378","DOI":"10.1109\/HotWeb.2015.22"},{"key":"2701_CR137","unstructured":"Rahmani A-M, Thanigaivelan NK, Gia TN, Granados J, Negash B, Liljeberg P, Tenhunen H, Smart, (2015) e-health gateway: bringing intelligence to internet-of-things based ubiquitous healthcare. systems. In: 2015 12th Annual Consumer Communications and Networking Conference (CCNC), IEEE, pp 826\u2013834"},{"key":"2701_CR138","doi-asserted-by":"publisher","first-page":"31950","DOI":"10.1109\/ACCESS.2018.2845399","volume":"6","author":"MM Mahmoud","year":"2018","unstructured":"Mahmoud MM, Rodrigues JJ, Ahmed SH, Shah SC, Al-Muhtadi JF, Korotaev VV, De Albuquerque VHC (2018) Enabling technologies on cloud of things for smart healthcare. IEEE Access 6:31950\u201331967","journal-title":"IEEE Access"},{"key":"2701_CR139","doi-asserted-by":"crossref","unstructured":"Din S, Paul A, Guizani N, Ahmed SH, Khan M, Rathore MM (2017) Features selection model for internet of e-health things using big data. In: GLOBECOM 2017\u20142017 IEEE Global Communications Conference, IEEE, pp 1\u20137","DOI":"10.1109\/GLOCOM.2017.8254418"},{"key":"2701_CR140","doi-asserted-by":"publisher","unstructured":"Varghese B, Wang N, Barbhuiya S, Kilpatrick P, Nikolopoulos DS (2016) Challenges and opportunities in edge computing. In: IEEE, pp 20\u201326. \n                    https:\/\/doi.org\/10.1109\/SmartCloud.2016.18\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7796149\/","DOI":"10.1109\/SmartCloud.2016.18"},{"issue":"6","key":"2701_CR141","first-page":"55","volume":"4","author":"K Shenoy","year":"2013","unstructured":"Shenoy K, Bhokare P, Pai U (2013) FOG computing future of cloud computing. Int J Sci Res (IJSR) 4(6):55\u201356","journal-title":"Int J Sci Res (IJSR)"},{"key":"2701_CR142","doi-asserted-by":"publisher","unstructured":"Hao Z, Novak E, Yi S, Li Q (2017) Challenges and software architecture for fog computing. IEEE Internet Comput 21(2):44\u201353. \n                    https:\/\/doi.org\/10.1109\/MIC.2017.26\n                    \n                  . URL \n                    http:\/\/ieeexplore.ieee.org\/document\/7867731\/","DOI":"10.1109\/MIC.2017.26"},{"key":"2701_CR143","unstructured":"Varghese B, Wang N, Nikolopoulos DS, Buyya R (2017) Feasibility of fog computing. arXiv preprint \n                    arXiv:1701.05451"},{"issue":"5","key":"2701_CR144","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOM.2018.1700795","volume":"56","author":"D Puthal","year":"2018","unstructured":"Puthal D, Obaidat MS, Nanda P, Prasad M, Mohanty SP, Zomaya AY (2018) Secure and sustainable load balancing of edge data centers in fog computing. IEEE Commun Mag 56(5):60\u201365","journal-title":"IEEE Commun Mag"},{"key":"2701_CR145","doi-asserted-by":"publisher","unstructured":"Wan J, Chen B, Wang S, Xia M, Li D, Liu C (2018) Fog computing for energy-aware load balancing and scheduling in smart factory. IEEE Trans Ind Inf. \n                    https:\/\/doi.org\/10.1109\/TII.2018.2818932","DOI":"10.1109\/TII.2018.2818932"},{"key":"2701_CR146","doi-asserted-by":"crossref","unstructured":"Iorga M, Feldman L, Barton R, Martin MJ, Goren NS, Mahmoudi C (2018) Fog computing conceptual model. Technical report","DOI":"10.6028\/NIST.SP.500-325"},{"issue":"10","key":"2701_CR147","first-page":"4674","volume":"14","author":"M Aazam","year":"2018","unstructured":"Aazam M, Zeadally S, Harras KA (2018) Deploying fog computing in industrial internet of things and industry 4.0. IEEE Trans Ind. Inf 14(10):4674\u20134682","journal-title":"Inf"},{"key":"2701_CR148","unstructured":"Comma-di L, Abdullaziz OI, Antevski K, Chundrigar SB, Gdowski R, Kuo P-H, Mourad A, Yen L-H, Zabala A (2018) Opportunities and challenges of joint edge and fog orchestration. In: 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), IEEE, pp 344\u2013349"},{"issue":"3","key":"2701_CR149","doi-asserted-by":"publisher","first-page":"61","DOI":"10.4018\/IJESMA.2018070104","volume":"10","author":"D Chaudhary","year":"2018","unstructured":"Chaudhary D, Bhushan K, Gupta B (2018) Survey on ddos attacks and defense mechanisms in cloud and fog computing. Int J E-serv Mobile Appl (IJESMA) 10(3):61\u201383","journal-title":"Int J E-serv Mobile Appl (IJESMA)"},{"issue":"3","key":"2701_CR150","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MNET.2017.1700271","volume":"32","author":"Y Jiang","year":"2018","unstructured":"Jiang Y, Huang Z, Tsang DH (2018) Challenges and solutions in fog computing orchestration. IEEE Netw 32(3):122\u2013129","journal-title":"IEEE Netw"},{"issue":"7","key":"2701_CR151","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1109\/MCOM.2018.1701322","volume":"56","author":"J Santos","year":"2018","unstructured":"Santos J, Vanhove T, Sebrechts M, Dupont T, Kerckhove W, Braem B, Van Seghbroeck G, Wauters T, Leroux P, Latre S et al (2018) City of things: enabling resource provisioning in smart cities. IEEE Commun Mag 56(7):177\u2013183","journal-title":"IEEE Commun Mag"},{"key":"2701_CR152","doi-asserted-by":"crossref","unstructured":"Wu H-Y, Lee C-R, Energy efficient scheduling for heterogeneous fog computing architectures. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), IEEE, pp 555\u2013560","DOI":"10.1109\/COMPSAC.2018.00085"},{"key":"2701_CR153","doi-asserted-by":"crossref","unstructured":"Mehta A, Elmroth E (2018) Distributed cost-optimized placement for latency-critical applications in heterogeneous environments. In: 2018 IEEE International Conference on Autonomic Computing, Trento, Italy, September 3\u20137, 2018, pp 121\u2013130","DOI":"10.1109\/ICAC.2018.00022"},{"key":"2701_CR154","unstructured":"Byers CC, Clarke JM, Salgueiro G (2018) Configuring heterogeneous computing environments using machine learning. US Patent App. 15\/390,921 (Jun.\u00a028)"},{"key":"2701_CR155","doi-asserted-by":"crossref","unstructured":"Cappiello C, Plebani P, Vitali M (2018) A data utility model for data-intensive applications in fog computing environments. In: Fog computing, Springer, pp 183\u2013202","DOI":"10.1007\/978-3-319-94890-4_9"},{"key":"2701_CR156","doi-asserted-by":"publisher","first-page":"12280","DOI":"10.1109\/ACCESS.2018.2805543","volume":"6","author":"MA Khan","year":"2018","unstructured":"Khan MA, Umer T, Khan SU, Yu S, Rachedi A (2018) Ieee access special section editorial: green cloud and fog computing: energy efficiency and sustainability aware infrastructures, protocols, and applications. IEEE Access 6:12280\u201312283","journal-title":"IEEE Access"},{"issue":"8","key":"2701_CR157","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MCOM.2018.1701130","volume":"56","author":"G Qiao","year":"2018","unstructured":"Qiao G, Leng S, Zhang K, He Y (2018) Collaborative task offloading in vehicular edge multi-access networks. IEEE Commun Mag 56(8):48\u201354","journal-title":"IEEE Commun Mag"},{"key":"2701_CR158","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.future.2018.04.057","volume":"87","author":"M Aazam","year":"2018","unstructured":"Aazam M, Zeadally S, Harras KA (2018) Offloading in fog computing for IoT: review, enabling technologies, and research opportunities. Future Gen Comput Syst 87:278\u2013289. \n                    https:\/\/doi.org\/10.1016\/j.future.2018.04.057","journal-title":"Future Gen Comput Syst"},{"key":"2701_CR159","doi-asserted-by":"crossref","unstructured":"Zhang G, Shen F, Yang Y, Qian H, Yao W (2018) Fair task offloading among fog nodes in fog computing networks. In: 2018 IEEE International Conference on Communications (ICC), IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2018.8422316"},{"key":"2701_CR160","unstructured":"Jo\u0161ilo S, D\u00e1n G Decentralized fog computing resource management for offloading of periodic tasks. In: Poster Presented at IEEE INFOCOM"},{"issue":"2","key":"2701_CR161","first-page":"7","volume":"6","author":"S Agarwal","year":"2015","unstructured":"Agarwal S, Yadav S, Yadav AK (2015) An architecture for elastic resource allocation in Fog. Computing 6(2):7","journal-title":"Computing"},{"issue":"2","key":"2701_CR162","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MIC.2017.37","volume":"21","author":"A Alrawais","year":"2017","unstructured":"Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34\u201342","journal-title":"IEEE Internet Comput"},{"key":"2701_CR163","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-1-4614-9278-8_4","volume-title":"Secure cloud computing","author":"M Tsugawa","year":"2014","unstructured":"Tsugawa M, Matsunaga A, Fortes JA (2014) Cloud computing security: What changes with software-defined networking? Secure cloud computing. Springer, Berlin, pp 77\u201393"},{"issue":"5","key":"2701_CR164","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1109\/JIOT.2017.2659783","volume":"4","author":"P Hu","year":"2017","unstructured":"Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143\u20131155","journal-title":"IEEE Internet Things J"},{"key":"2701_CR165","doi-asserted-by":"crossref","unstructured":"Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings, Infocom, IEEE, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"3","key":"2701_CR166","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/JIOT.2017.2666783","volume":"4","author":"S Basudan","year":"2017","unstructured":"Basudan S, Lin X, Sankaranarayanan K (2017) A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet Things J 4(3):772\u2013782","journal-title":"IEEE Internet Things J"},{"key":"2701_CR167","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1016\/j.future.2017.01.024","volume":"78","author":"D Koo","year":"2018","unstructured":"Koo D, Hur J (2018) Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gener Comput Syst 78:739\u2013752","journal-title":"Future Gener Comput Syst"},{"key":"2701_CR168","doi-asserted-by":"crossref","unstructured":"Ma L, Teymorian AY, Cheng X (2008) A hybrid rogue access point protection framework for commodity wi-fi. networks. In: The 27th Conference on Computer Communications INFOCOM 2008, IEEE, pp 1220\u20131228","DOI":"10.1109\/INFOCOM.2008.178"},{"issue":"1","key":"2701_CR169","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M (2013) A survey of intrusion detection techniques in cloud. J Netw Comput Appl 36(1):42\u201357","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"2701_CR170","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1109\/TPWRS.2012.2224144","volume":"28","author":"J Valenzuela","year":"2013","unstructured":"Valenzuela J, Wang J, Bissinger N (2013) Real-time intrusion detection in power system operations. IEEE Trans Power Syst 28(2):1052\u20131062","journal-title":"IEEE Trans Power Syst"},{"issue":"10","key":"2701_CR171","doi-asserted-by":"publisher","first-page":"1961","DOI":"10.1109\/TPDS.2012.273","volume":"24","author":"Z Qin","year":"2013","unstructured":"Qin Z, Li Q, Chuah M-C (2013) Defending against unidentifiable attacks in electric power grids. IEEE Trans Parallel Distrib Syst 24(10):1961\u20131971","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"2701_CR172","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222\u2013233","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2701_CR173","doi-asserted-by":"crossref","unstructured":"Rial A, Danezis G (2011) Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, ACM, pp 49\u201360","DOI":"10.1145\/2046556.2046564"},{"issue":"4","key":"2701_CR174","doi-asserted-by":"publisher","first-page":"668","DOI":"10.3390\/s17040668","volume":"17","author":"L Wang","year":"2017","unstructured":"Wang L, Liu G, Sun L (2017) A secure and privacy-preserving navigation scheme using spatial crowdsourcing in fog-based vanets. Sensors 17(4):668","journal-title":"Sensors"},{"key":"2701_CR175","doi-asserted-by":"crossref","unstructured":"Qin Z, Yi S, Li Q, Zamkov D (2014) Preserving secondary users\u2019 privacy in cognitive radio networks. In: 2014 Proceedings of INFOCOM, IEEE, pp 772\u2013780","DOI":"10.1109\/INFOCOM.2014.6848004"},{"key":"2701_CR176","doi-asserted-by":"crossref","unstructured":"Wei W, Xu F, Li Q (2012) Mobishare: flexible privacy-preserving location sharing in mobile online social networks. In: 012 Proceedings of INFOCOM,, IEEE, pp 2616\u20132620","DOI":"10.1109\/INFCOM.2012.6195664"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2701-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-018-2701-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2701-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T19:27:28Z","timestamp":1574450848000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-018-2701-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,23]]},"references-count":176,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["2701"],"URL":"https:\/\/doi.org\/10.1007\/s11227-018-2701-2","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,23]]},"assertion":[{"value":"23 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}