{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T17:53:58Z","timestamp":1718733238411},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11277-021-08223-7","type":"journal-article","created":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T07:02:36Z","timestamp":1614409356000},"page":"527-565","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Scalable and Utility Driven Profit Maximized Auction of Resources Model for Cloudlet Based Mobile Edge Computing"],"prefix":"10.1007","volume":"119","author":[{"given":"Santosh Kumar","family":"Yadav","sequence":"first","affiliation":[]},{"given":"Rakesh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,27]]},"reference":[{"issue":"3","key":"8223_CR1","first-page":"2495","volume":"12","author":"H Liu","year":"2018","unstructured":"Liu, H., Eldarrat, F., Alqahtani, H., Reznik, A., Foy, X., & Zhang, Y. (2018). Mobile edge cloud system: Architectures, challenges, and approaches. IEEE Journal of Engineering, Electrical and Computer Engineering, 12(3), 2495\u20132508.","journal-title":"IEEE Journal of Engineering, Electrical and Computer Engineering"},{"key":"8223_CR2","doi-asserted-by":"crossref","unstructured":"Huerta-Canepa, G., & Lee, D. (2010). A virtual cloud computing provider for mobile devices. In proceedings of 1st ACM workshop on mobile cloud computing & services: Social networks and beyond (MCS\u201910). pp. 1\u20135.","DOI":"10.1145\/1810931.1810937"},{"issue":"4","key":"8223_CR3","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MPRV.2009.82","volume":"8","author":"M Satyanarayanan","year":"2009","unstructured":"Satyanarayanan, M., Bahl, P., Caceres, R., & Davies, N. (2009). The case for VM-based cloudlets in mobile computing. Journal of IEEE Pervasive Computing, 8(4), 14\u201323.","journal-title":"Journal of IEEE Pervasive Computing"},{"key":"8223_CR4","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M. (2010). Mobile computing: The next decade. In Proceedings of 1st ACM workshop on mobile cloud computing & services: Social networks and beyond (MCS\u201910), pp. 2\u201310.","DOI":"10.1145\/1810931.1810936"},{"key":"8223_CR5","doi-asserted-by":"crossref","unstructured":"Chun, B., Ihm, S., Maniatis, P., Naik, M., & Patti, A. (2011). CloneCloud: Elastic execution between mobile device and cloud. In proceedings of 6th conference on computer systems (EuroSys), pp. 301\u2013314.","DOI":"10.1145\/1966445.1966473"},{"key":"8223_CR6","doi-asserted-by":"crossref","unstructured":"Satyanarayanan, M., Lewis, G., Morris, E., Simanta, S., Boleng J., & Ha, K. (2013). The role of cloudlet in hostile environments. In Proceedings of IEEE conference on pervasive computing, pp. 40\u201349.","DOI":"10.1109\/MPRV.2013.77"},{"key":"8223_CR7","doi-asserted-by":"crossref","unstructured":"Lewis, G., Echeverria, S., Simanta, S., Bradshaw, B., & Root, J. (2014). Tactical cloudlets: Moving cloud computing to the edge. In proceedings of IEEE military communications conference, pp. 1440\u20131446.","DOI":"10.1109\/MILCOM.2014.238"},{"issue":"3","key":"8223_CR8","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCC.2015.62","volume":"2","author":"A Khan","year":"2015","unstructured":"Khan, A., Othman, M., Xia, F., & Khan, A. N. (2015). Context-aware mobile cloud computing and its challenges. IEEE Journal of Cloud Computing, 2(3), 42\u201349.","journal-title":"IEEE Journal of Cloud Computing"},{"issue":"1","key":"8223_CR9","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2017.9","volume":"50","author":"M Satyanarayanan","year":"2017","unstructured":"Satyanarayanan, M. (2017). The emergence of edge computing. IEEE Journal of Computer, 50(1), 30\u201339.","journal-title":"IEEE Journal of Computer"},{"key":"8223_CR10","doi-asserted-by":"crossref","unstructured":"10Satyanarayanan, M., Chen, Z., Ha, K., Hu, W., Richer W., & Pillai, P. (2014). Cloudlet: At the leading edge of mobile-cloud convergence. In proceedings of 6th international conference on mobile computing, application and services (MobiCASE), pp. 1\u20139.","DOI":"10.4108\/icst.mobicase.2014.257757"},{"issue":"1","key":"8223_CR11","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MCSE.2017.17","volume":"19","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Guo, K., Ren, J., Zhou, Y., Wang, J., & Chen, J. (2017). Transparent computing: A promising network computing paradigm. IEEE Journal of Computing in Science and Engineering, 19(1), 7\u201320.","journal-title":"IEEE Journal of Computing in Science and Engineering"},{"issue":"2","key":"8223_CR12","doi-asserted-by":"publisher","first-page":"954","DOI":"10.1109\/COMST.2017.2647981","volume":"19","author":"NC Luong","year":"2016","unstructured":"Luong, N. C., Wang, P., Niyato, D., Yonggang, W., & Han, Z. (2016). Resource management in cloud networking using economic analysis and pricing models: A survey. IEEE Journal of Communications Surveys and Tutorials, 19(2), 954\u20131001.","journal-title":"IEEE Journal of Communications Surveys and Tutorials"},{"issue":"1","key":"8223_CR13","first-page":"78","volume":"4","author":"C Hu","year":"2018","unstructured":"Hu, C. (2018). Calculation of the behavior utility of a network system: Conception and principle. Elsevier Journal of Engineering, 4(1), 78\u201384.","journal-title":"Elsevier Journal of Engineering"},{"issue":"2","key":"8223_CR14","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1016\/j.ejor.2018.02.018","volume":"269","author":"J Hu","year":"2018","unstructured":"Hu, J., Bansal, M., & Mehrotra, S. (2018). Robust decision making using a general utility set. European Journal of Operational Research, 269(2), 699\u2013714.","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"8223_CR15","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.tust.2017.06.005","volume":"69","author":"F Sun","year":"2017","unstructured":"Sun, F., Liu, C., & Zhou, X. (2017). Utilities tunnel\u2019s finance design for the process of construction and operation. Elsevier Journal of Tunnelling and Underground Space Technology, 69(1), 182\u2013186.","journal-title":"Elsevier Journal of Tunnelling and Underground Space Technology"},{"issue":"11","key":"8223_CR16","doi-asserted-by":"publisher","first-page":"1992","DOI":"10.1016\/j.bmcl.2018.04.066","volume":"28","author":"AE Fraley","year":"2018","unstructured":"Fraley, A. E., & Sherman, D. H. (2018). Halogenase engineering and its utility in medicinal chemistry. Elsevier Journal of Bioorganic and Medicinal Chemistry Letters, 28(11), 1992\u20131999.","journal-title":"Elsevier Journal of Bioorganic and Medicinal Chemistry Letters"},{"key":"8223_CR17","doi-asserted-by":"crossref","unstructured":"Tadayon, S., & Tadayon, B. (2014). Approximate z-number evaluation based on categorical sets of probability distributions. In L. Zadeh, A., Abbasov, R., Yager, S., Shahbazova & M. Reformat (Eds.), Recent developments and new directions in soft computing. Studies in fuzziness and soft computing (Vol. 317). Cham: Springer. https:\/\/doi.org\/10.1007\/978-3-319-06323-2_8.","DOI":"10.1007\/978-3-319-06323-2_8"},{"key":"8223_CR18","doi-asserted-by":"publisher","first-page":"56994","DOI":"10.1109\/ACCESS.2019.2912922","volume":"7","author":"P Liu","year":"2019","unstructured":"Liu, P., Hendiani, S., Bagherpour, M., Ghannadpour, S. F., & Mahmoudi, A. (2019). Utility-numbers theory. IEEE Access, 7, 56994\u201357008.","journal-title":"IEEE Access"},{"issue":"5","key":"8223_CR19","doi-asserted-by":"publisher","first-page":"2795","DOI":"10.1109\/TNET.2015.2487344","volume":"24","author":"X Chen","year":"2016","unstructured":"Chen, X., Jiao, L., Li, W., & Fu, X. (2016). Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE\/ACM Transactions on Networking, 24(5), 2795\u20132808.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"8223_CR20","doi-asserted-by":"publisher","first-page":"13455","DOI":"10.1109\/ACCESS.2017.2721957","volume":"5","author":"H Zhang","year":"2017","unstructured":"Zhang, H., Guo, F., Ji, H., & Zhu, C. (2017). Combinational auction-based service provider selection in mobile edge computing networks. Journal of IEEE Access, 5, 13455\u201313464.","journal-title":"Journal of IEEE Access"},{"key":"8223_CR21","doi-asserted-by":"crossref","unstructured":"Wang, Q., Guo, S., Liu, J., Pan, C., & Yang, L. (2019). Profit maximization incentive mechanism for resource providers in mobile edge computing.\u00a0In proceedings of IEEE transactions on services computing, pp. 1\u201312.","DOI":"10.1109\/TSC.2019.2924002"},{"key":"8223_CR22","doi-asserted-by":"publisher","unstructured":"Boutaba, R., & Fonseca, N. L. S. (2015). Cloud architectures, networks, services, and management. Book Chapter, Cloud Services, Networking, and Management. Wiley. https:\/\/doi.org\/10.1002\/9781119042655.ch1.","DOI":"10.1002\/9781119042655.ch1"},{"key":"8223_CR23","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1109\/ACCESS.2015.2435000","volume":"3","author":"Z Sheng","year":"2015","unstructured":"Sheng, Z., Mahapatra, C., Zhu, C., & Leung, V. (2015). Recent advances in industrial wireless sensor networks toward efficient management in IoT. Journal of IEEE Access, 3, 622\u2013637.","journal-title":"Journal of IEEE Access"},{"key":"8223_CR24","doi-asserted-by":"publisher","first-page":"2151","DOI":"10.1109\/ACCESS.2015.2497312","volume":"3","author":"C Zhu","year":"2015","unstructured":"Zhu, C., Leung, V., Shu, L., & Ngai, E. (2015). Green internet of things for smart world. Journal of IEEE Access, 3, 2151\u20132162.","journal-title":"Journal of IEEE Access"},{"issue":"5","key":"8223_CR25","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2677046.2677052","volume":"44","author":"LM Vaquero","year":"2014","unstructured":"Vaquero, L. M., & Rodero-Merino, L. (2014). Finding your way in the fog: Towards a comprehensive definition of fog computing. Journal of ACM SIGCOMM Computer Communication Review, 44(5), 27\u201332.","journal-title":"Journal of ACM SIGCOMM Computer Communication Review"},{"key":"8223_CR26","doi-asserted-by":"crossref","unstructured":"Yi, S., Li, C., & Li, Q. (2015). A survey of fog computing: Concepts. In proceedings of workshop mobile big data, pp. 37\u201342.","DOI":"10.1145\/2757384.2757397"},{"key":"8223_CR27","doi-asserted-by":"crossref","unstructured":"Stojmenovic, I., & Wen, S. (2014). The fog computing paradigm: Scenarios and security issues. In proceedings of federated conference on computer science and information system, pp. 1\u20138.","DOI":"10.15439\/2014F503"},{"key":"8223_CR28","doi-asserted-by":"crossref","unstructured":"Madsen, H., Albeanu, G., Burtschy, B., & Popentiu-Vladicescu, F. (2013). Reliability in the utility computing era: Towards reliable fog computing. In: proceedings of 20th international conference of system signals image processing, pp. 43\u201346.","DOI":"10.1109\/IWSSIP.2013.6623445"},{"issue":"1","key":"8223_CR29","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.future.2012.05.023","volume":"29","author":"N Fernando","year":"2012","unstructured":"Fernando, N., Loke, S. W., & Rahayu, J. W. (2012). Mobile cloud computing: A survey. Elsevier Journal of Future Generation Computer System, 29(1), 84\u2013106.","journal-title":"Elsevier Journal of Future Generation Computer System"},{"issue":"6","key":"8223_CR30","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang, M., & Zhang, T. (2016). Fog and IoT: An overview of research opportunities. IEEE Journal of Internet of Things, 3(6), 854\u2013864.","journal-title":"IEEE Journal of Internet of Things"},{"key":"8223_CR31","doi-asserted-by":"publisher","DOI":"10.1002\/9781118452189","volume-title":"Vehicle safety communications: Protocols, security, and privacy","author":"L Delgrossi","year":"2012","unstructured":"Delgrossi, L., & Zhang, T. (2012). Vehicle safety communications: Protocols, security, and privacy. Hoboken: Wiley."},{"issue":"1","key":"8223_CR32","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/JIOT.2014.2302386","volume":"1","author":"T Zhang","year":"2014","unstructured":"Zhang, T., Antunes, H., & Aggarwal, S. (2014). Defending connected vehicles against malware: Challenges and a solution framework. IEEE Journal of Internet of Things, 1(1), 10\u201321.","journal-title":"IEEE Journal of Internet of Things"},{"key":"8223_CR33","volume-title":"Securing connected vehicles end to end","author":"T Zhang","year":"2014","unstructured":"Zhang, T., Antunes, H., & Aggarwal, S. (2014). Securing connected vehicles end to end. Detroit: SAE world congress and exhibition."},{"key":"8223_CR34","doi-asserted-by":"crossref","unstructured":"Kitanov, S., Monteiro, E., & Janevski, T., (2016). 5G and the fog - survey of related technologies and research directions. In proceedings of 18th mediterranean electrotechnical conference (MELECON).","DOI":"10.1109\/MELCON.2016.7495388"},{"issue":"2","key":"8223_CR35","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2014.6736752","volume":"52","author":"C Wang","year":"2014","unstructured":"Wang, C., Haider, F., Gao, X., You, X., Yang, Y., Yuan, D., et al. (2014). Cellular architecture and key technologies for 5G wireless communication networks. IEEE Communication Magazine, 52(2), 122\u2013130.","journal-title":"IEEE Communication Magazine"},{"issue":"2","key":"8223_CR36","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/MCOM.2014.6736753","volume":"52","author":"X Wang","year":"2014","unstructured":"Wang, X., Chen, M., & Haleb, T. (2014). Cache in the air: Exploiting content caching and delivery techniques for 5G systems. IEEE Communication Magazine, 52(2), 131\u2013139.","journal-title":"IEEE Communication Magazine"},{"key":"8223_CR37","doi-asserted-by":"crossref","unstructured":"37Janevski, T. (2009). 5G mobile phone concept. In proceedings of 6th IEEE consumer communications and networking conference (CCNC), pp. 1\u20132.","DOI":"10.1109\/CCNC.2009.4784727"},{"issue":"5","key":"8223_CR38","first-page":"5","volume":"9","author":"D Soldaniz","year":"2014","unstructured":"Soldaniz, D., & Mazalini, A. (2014). 5G: The nervous system of the true digital society. IEEE Journal of COMSOC MMTC E-letter, 9(5), 5\u20139.","journal-title":"IEEE Journal of COMSOC MMTC E-letter"},{"key":"8223_CR39","first-page":"65","volume":"32","author":"A Tudzarov","year":"2011","unstructured":"Tudzarov, A., & Janevski, T. (2011). Functional architecture for 5G mobile networks. International Journal of Advanced Science and Technology (IJAST), 32, 65\u201378.","journal-title":"International Journal of Advanced Science and Technology (IJAST)"},{"key":"8223_CR40","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/ACCESS.2015.2461602","volume":"3","author":"A Gupta","year":"2015","unstructured":"Gupta, A., & Jha, R. K. (2015). A Survey of 5G network: Architecture and emerging technologies. Journal of IEEE Access, 3, 1206\u20131232.","journal-title":"Journal of IEEE Access"},{"issue":"11","key":"8223_CR41","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MCOM.2014.6957145","volume":"52","author":"PK Agyapong","year":"2014","unstructured":"Agyapong, P. K., Iwamura, M., Staehle, D., Kiess, W., & Benjebbour, A. (2014). Design considerations for a 5G network architecture. IEEE Communication Magazine, 52(11), 65\u201375.","journal-title":"IEEE Communication Magazine"},{"issue":"3","key":"8223_CR42","doi-asserted-by":"publisher","first-page":"1758","DOI":"10.1109\/COMST.2016.2540004","volume":"18","author":"J Wang","year":"2016","unstructured":"Wang, J., Wu, Y., Yen, N., Guo, S., & Cheng, Z. (2016). Big data analytics for emergency communication Networks: A survey. IEEE Journal of Communications Surveys and tutorials, 18(3), 1758\u20131778.","journal-title":"IEEE Journal of Communications Surveys and tutorials"},{"issue":"1","key":"8223_CR43","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TKDE.2013.109","volume":"26","author":"X Wu","year":"2014","unstructured":"Wu, X., Zhu, X., Wu, G. Q., & Ding, W. (2014). Data mining with big data. IEEE Transactions on Knowledge and Data Engineering, 26(1), 97\u2013107.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"8223_CR44","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1109\/ACCESS.2014.2325029","volume":"2","author":"X Chen","year":"2014","unstructured":"Chen, X., & Lin, X. (2014). Big data deep learning: Challenges and perspectives. Journal of IEEE Access, 2, 514\u2013525.","journal-title":"Journal of IEEE Access"},{"key":"8223_CR45","doi-asserted-by":"crossref","unstructured":"Sharma, S., & Mangat, V. (2015). Technology and trends to handle big data: survey. In proceedings of 5th international conference on advanced computing communication technologies, pp. 266\u2013271.","DOI":"10.1109\/ACCT.2015.121"},{"key":"8223_CR46","doi-asserted-by":"crossref","unstructured":"Rawadi, J. M., Artail, H., & Safa, H. (2014). Providing local cloud service to mobile devices with intercloudlet communication. In proceedings of 17th IEEE mediterranean electrotechnical conference, Beirut, Lebanon, pp. 134\u2013138.","DOI":"10.1109\/MELCON.2014.6820520"},{"key":"8223_CR47","unstructured":"Kurze, T., Klems, M., Bermbach, D., Lenk, A., Tai, S., & Kunze, M. (2011). Cloud federation. In proceeding of 2nd international conference of cloud computing, GRIDs and virtualization, pp. 32\u201338."},{"key":"8223_CR48","unstructured":"Mehrotra, N., & Dangwal, N. (2011). Interoperate in cloud with federation. Infosys technical report."},{"key":"8223_CR49","unstructured":"Petcu, D., Craciun, C., & Rak, M. (2011). Towards a cross platform cloud API: components for cloud federation. In proceeding of closer, pp. 166\u2013 169."},{"key":"8223_CR50","doi-asserted-by":"crossref","unstructured":"Wen, Y., Zhang, W., & Luo, H. (2012). Energy-optimal mobile application execution: Taming resource-poor mobile devices with cloud clones. In proceeding of IEEE Infocom, pp. 2716\u20132720.","DOI":"10.1109\/INFCOM.2012.6195685"},{"key":"8223_CR51","doi-asserted-by":"crossref","unstructured":"Cuervo, E., Balasubramanian, A., Cho, D., Wolman, A., Saroiu, S., Chandra, R., & Bahl, P. (2010). MAUI: Making smartphones last longer with code offload. In proceeding of 8th ACM mobisys, pp. 49\u201362.","DOI":"10.1145\/1814433.1814441"},{"key":"8223_CR52","doi-asserted-by":"crossref","unstructured":"Artail, A., Frenn, K., Artail H., & Safa, H. (2015). A framework of mobile cloudlet center based on the use of mobile devices as cloudlets. In proceedings of 29th IEEE international conference on advanced information networking and applications, pp. 777\u2013784.","DOI":"10.1109\/AINA.2015.267"},{"key":"8223_CR53","doi-asserted-by":"crossref","unstructured":"Bernstein, D., & Vij, D. (2010). Intercloud directory and exchange protocol detail using XMPP and RDF. In proceeding of IEEE 6th world congress on services, pp. 431\u2013438.","DOI":"10.1109\/SERVICES.2010.131"},{"key":"8223_CR54","doi-asserted-by":"crossref","unstructured":"Fawaz, A., Hojaij, A., Kobeissi, H., & Artail, H. (2011). An on-demand mobile advertising system that protects source privacy using interest aggregation. In proceeding of 7th IEEE international conference on wireless and mobile computing, networking and communications, pp. 127\u2013134.","DOI":"10.1109\/WiMOB.2011.6085414"},{"issue":"4","key":"8223_CR55","doi-asserted-by":"publisher","first-page":"3969","DOI":"10.1007\/s11277-017-4035-4","volume":"95","author":"R Kumar","year":"2017","unstructured":"Kumar, R., & Yadav, S. K. (2017). Scalable key parameter yield of resources model for performance enhancement in mobile cloud computing. Springer Journal of Wireless Personal Communications, 95(4), 3969\u20134000.","journal-title":"Springer Journal of Wireless Personal Communications"},{"key":"8223_CR56","unstructured":"Korrapati, R. (2014). Validated management practices. A.H.W.Sameer series. Diamond pocket books. https:\/\/books.google.co.in\/books?id=z4psBQAAQBAJ&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false."},{"key":"8223_CR57","doi-asserted-by":"publisher","unstructured":"Tsai, L., & Liao, W. (2016). Allocation of virtual machines, In Virtualized cloud data center networks: Issues in resource management (pp. 1\u201351). Springer briefs in electrical and computer engineering. https:\/\/doi.org\/10.1007\/978-3-319-32632-0.","DOI":"10.1007\/978-3-319-32632-0"},{"key":"8223_CR58","doi-asserted-by":"crossref","unstructured":"Tsakalozos, K., Kllapi, H., Sitaridi, E., Roussopoulos, M., Paparas, D., & Delis, A. (2011). Flexible use of cloud resources through profit maximization and price discrimination. In proceedings of IEEE international conference on data engineering (ICDE), Hannover, Germany, pp. 75\u201386.","DOI":"10.1109\/ICDE.2011.5767932"},{"issue":"2","key":"8223_CR59","first-page":"699","volume":"25","author":"RP McAfee","year":"1987","unstructured":"McAfee, R. P., & McMillan, J. (1987). Auctions and bidding. Journal of economic literature, 25(2), 699\u2013738.","journal-title":"Journal of economic literature"},{"key":"8223_CR60","unstructured":"Chui, K., & Zwick, R., (1999). Auction on the internet-a preliminary study. [Online]. http:\/\/repository.ust.hk\/ir\/Record\/1783.1-1035."},{"issue":"3","key":"8223_CR61","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1257\/jep.14.3.183","volume":"14","author":"D Lucking-Reiley","year":"2000","unstructured":"Lucking-Reiley, D. (2000). Vickrey auctions in practice: From nineteenth century philately to twenty-first-century e-commerce. The Journal of Economic Perspectives, 14(3), 183\u2013192.","journal-title":"The Journal of Economic Perspectives"},{"key":"8223_CR62","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.future.2017.10.034","volume":"81","author":"Z Kuang","year":"2017","unstructured":"Kuang, Z., Guo, S., Liu, J., & Yang, Y. (2017). A quick-response framework for multi-user computation offloading in mobile cloud computing. Science Direct Journal of Future Generation Computer System, 81, 166\u2013176.","journal-title":"Science Direct Journal of Future Generation Computer System"},{"key":"8223_CR63","doi-asserted-by":"crossref","unstructured":"Wang, Q., Guo, S., Wang, Y., & Yang, Y. (2019). Incentive mechanism for edge cloud profit maximization in mobile edge computing. In proceedings of IEEE international conference on communications (ICC), Shanghai, China, pp. 1\u20136.","DOI":"10.1109\/ICC.2019.8761241"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08223-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08223-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08223-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T10:28:40Z","timestamp":1623839320000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08223-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,27]]},"references-count":63,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["8223"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08223-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,27]]},"assertion":[{"value":"3 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}