{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T08:48:19Z","timestamp":1673081299253},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,12,16]],"date-time":"2014-12-16T00:00:00Z","timestamp":1418688000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s11277-014-2229-6","type":"journal-article","created":{"date-parts":[[2014,12,15]],"date-time":"2014-12-15T08:54:25Z","timestamp":1418633665000},"page":"795-809","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Seamless Service Handoff Based on Delaunay Triangulation for Mobile Cloud Computing"],"prefix":"10.1007","volume":"93","author":[{"given":"Zhen","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhongwei","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Chaowei","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,16]]},"reference":[{"key":"2229_CR1","unstructured":"MarketWatch. (2014). 2014\u20132018 Forecasts in New Research Report. http:\/\/www.marketwatch.com"},{"key":"2229_CR2","unstructured":"Sanaei, Z., Abolfazli, S., & Gani, A. (2013). Heterogeneity in mobile cloud computing: Taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 1\u201324."},{"key":"2229_CR3","doi-asserted-by":"crossref","unstructured":"Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587\u20131611.","DOI":"10.1002\/wcm.1203"},{"key":"2229_CR4","unstructured":"Abolfazli, S., Sanaei, Z., & Gani, A. (2012). Mobile cloud computing: A review on smartphone augmentation approaches. In Proceedings of the CISCO."},{"key":"2229_CR5","doi-asserted-by":"crossref","unstructured":"Cuervo, E., Balasubramanian, A., Cho, D. K., Wolman, A., Saroiu, S., Chandra, R., et al. (2010). MAUI: Making smartphones last longer with code offload. In Proceedings of the ACM MobiSys (pp. 49\u201362).","DOI":"10.1145\/1814433.1814441"},{"key":"2229_CR6","doi-asserted-by":"crossref","unstructured":"Chun, B. G., Ihm, S., Maniatis, P., Naik, M., & Patti, A. (2011). CloneCloud: Elastic execution between mobile device and cloud. In Proceedings of the ACM EuroSys (pp. 301\u2013314).","DOI":"10.1145\/1966445.1966473"},{"key":"2229_CR7","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M., Bahl, P., Caceres, R., & Davies, N. (2009). The case for VM-based cloudlets in mobile computing. IEEE Pervasive Computing, 8(4), 14\u201323.","DOI":"10.1109\/MPRV.2009.82"},{"key":"2229_CR8","unstructured":"Kosta, S., Perta, V. C., Stefa, J., Hui, P., & Mei, A (2013). Clone2clone (c2c): Peer-to-peer networking of smartphones on the cloud. In Proceedings of the USENIX HotCloud."},{"key":"2229_CR9","doi-asserted-by":"crossref","unstructured":"Makaya, C., & Pierre, S. (2008). An analytical framework for performance evaluation of IPv6-based mobility managenment protocols. IEEE Transactions on Wireless Communications, 7(3), 972\u2013983.","DOI":"10.1109\/TWC.2008.060725"},{"key":"2229_CR10","unstructured":"Koodli, R. (2003). Fast handovers for mobile IPv6, Internet Draft, IETF."},{"key":"2229_CR11","doi-asserted-by":"crossref","unstructured":"Chen, Y. S., Chuang, M. C., & Chen, C. K. (2008). DeuceScan: Deuce-based fast handoff scheme in IEEE 802.11 wireless networks. IEEE Transactions on Vehicular Technology, 57(2), 1126\u20131141.","DOI":"10.1109\/TVT.2007.907027"},{"key":"2229_CR12","doi-asserted-by":"crossref","unstructured":"Han, Y. H., Choi, J., & Hwang, S. H. (2006). Reactive handover optimization in IPv6-based mobile networks. IEEE Journal on Selected Areas in Communications, 24(9), 1758\u20131772.","DOI":"10.1109\/JSAC.2006.875112"},{"key":"2229_CR13","doi-asserted-by":"crossref","unstructured":"Taleb, T., Letaief, K. (2010). A cooperative diversity based handoff management scheme. IEEE Transactions on Wireless Communications, 9(4), 1462\u20131471.","DOI":"10.1109\/TWC.2010.04.090548"},{"key":"2229_CR14","doi-asserted-by":"crossref","unstructured":"Chen, Y. H., Chang, C. J. (2007). A fast handoff protocol for cellular IEEE 802.11e WLAN systems. IEEE Communications Letters, 11(2), 140\u2013142.","DOI":"10.1109\/LCOMM.2007.061420"},{"key":"2229_CR15","doi-asserted-by":"crossref","unstructured":"Chen, Y. S., Hsiao, W. H., & Chiu, K. L. (2009). A cross-layer partner-based fast handoff mechanism for IEEE 802.11 wireless networks. International Journal of Communication Systems, 22(12), 1515\u20131541.","DOI":"10.1002\/dac.1033"},{"key":"2229_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, L., Seta, N., Miyajima, H., & Hayashi, H. (2007). Fast authentication based on heuristic movement prediction for seamless handover in wireless access environment. In Proceedings of the IEEE WCNC (pp. 2889\u20132893).","DOI":"10.1109\/WCNC.2007.535"},{"key":"2229_CR17","doi-asserted-by":"crossref","unstructured":"Seshan, S., Balakrishnan, H., & Katz, R. H. (1997). Handoffs in cellular wireless networks: The daedalus implementation and experience. Journal of Wireless Personal Communications, 4(2), 141\u2013162.","DOI":"10.1023\/A:1008830311723"},{"key":"2229_CR18","unstructured":"Shim, E., Wei, H. Y., Chang, Y., & Gitlin, R. D. (2002). Low latency handoff for wireless IP QoS with neighborcasting. In Proceedings of the ICC (pp. 3245\u20133249)."},{"key":"2229_CR19","unstructured":"Gwon, Y., Fu, G., & Jain, R. (2003). Fast handoffs in wireless LAN networks using mobile initiated tunneling handoff protocol for IPv4 (MITHv4). In Proceedings of the WCNC (pp. 1248\u20131253)."},{"key":"2229_CR20","doi-asserted-by":"crossref","unstructured":"Klein, A., Mannweiler, C., Schneider, J., & Schotten, H. D. (2010). Access schemes for mobile cloud computing. In Proceedings of the IEEE MDM (pp. 387\u2013392).","DOI":"10.1109\/MDM.2010.79"},{"key":"2229_CR21","doi-asserted-by":"crossref","unstructured":"Li, H., & Xie, J. (2012). A low-cost channel scheduling design for multi-hop handoff delay reduction in internet-based wireless mesh networks. In Proceedings of the IEEE infocom (pp. 307\u2013315).","DOI":"10.1109\/INFCOM.2012.6195763"},{"key":"2229_CR22","doi-asserted-by":"crossref","unstructured":"Lin, Y., Shao, L., Zhu, Z., Wang, Q., & Sabhikhi, R. K. (2010). Wireless network cloud: Architecture and system requirements. IBM Journal of Research and Development, 54(1), 1\u201312.","DOI":"10.1147\/JRD.2009.2037680"},{"key":"2229_CR23","unstructured":"Garey, M. R., & Johnson, D. S. (1979). Computers and intractability: A guide to the theory of NP-completeness. San Francisco: W. H. Freeman."},{"key":"2229_CR24","volume-title":"Computational geometry algorithms and applications","author":"M Berg De","year":"1999","unstructured":"De Berg, M. (1999). Computational geometry algorithms and applications. Berlin: Springer."},{"key":"2229_CR25","unstructured":"Network Simulator 2\u2014NS2. http:\/\/www-mash.cs.berkeley.edu\/ns\/"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-2229-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-014-2229-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-2229-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-2229-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:16:20Z","timestamp":1559380580000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-014-2229-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,16]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["2229"],"URL":"https:\/\/doi.org\/10.1007\/s11277-014-2229-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,16]]}}}