{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:59:02Z","timestamp":1763348342700,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T00:00:00Z","timestamp":1619222400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T00:00:00Z","timestamp":1619222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11277-021-08453-9","type":"journal-article","created":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T08:55:09Z","timestamp":1619340909000},"page":"269-286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Novel Cost Efficient Resource Allocation Technique Based on Deadline and Budget Constraints for Edge Users"],"prefix":"10.1007","volume":"120","author":[{"given":"S. Sabahat H.","family":"Bukhari","sequence":"first","affiliation":[]},{"given":"Asif","family":"Kabir","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9033-1767","authenticated-orcid":false,"given":"Muhammad Usman","family":"Younus","sequence":"additional","affiliation":[]},{"given":"Muhammad Rizwan","family":"Anjum","sequence":"additional","affiliation":[]},{"given":"Sanam","family":"Narejo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,24]]},"reference":[{"key":"8453_CR1","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing (pp. 13\u201316). ACM.","DOI":"10.1145\/2342509.2342513"},{"key":"8453_CR2","unstructured":"Josilo, S. (2020). Task Placement and Resource Allocation in Edge Computing Systems (Ph.D. Thesis). KTH Royal Institute of Technology."},{"issue":"5","key":"8453_CR3","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge computing: Vision and challenges. IEEE Internet of Things Journal, 3(5), 637\u2013646.","journal-title":"IEEE Internet of Things Journal"},{"issue":"7","key":"8453_CR4","doi-asserted-by":"publisher","first-page":"842","DOI":"10.3390\/sym11070842","volume":"11","author":"J-W Ryu","year":"2019","unstructured":"Ryu, J.-W., Pham, Q.-V., Luan, H. N., Hwang, W.-J., Kim, J.-D., & Lee, J.-T. (2019). Multi-access edge computing empowered heterogeneous networks: A novel architecture and potential works. Symmetry, 11(7), 842.","journal-title":"Symmetry"},{"key":"8453_CR5","doi-asserted-by":"crossref","unstructured":"Khodashenas, P. S., Ruiz, C., Riera, J. F., Fajardo, J. O., Taboada, I., Blanco, B., \u2026 Sallent, O. (2016). Service provisioning and pricing methods in a multi-tenant cloud enabled RAN. In 2016 IEEE Conference on Standards for Communications and Networking (CSCN) (pp. 1\u20136). IEEE.","DOI":"10.1109\/CSCN.2016.7785191"},{"issue":"1","key":"8453_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.future.2012.05.023","volume":"29","author":"N Fernando","year":"2013","unstructured":"Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A survey. Future Generation Computer Systems, 29(1), 84\u2013106.","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"8453_CR7","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TCC.2015.2449834","volume":"5","author":"M Jia","year":"2017","unstructured":"Jia, M., Cao, J., & Liang, W. (2017). Optimal cloudlet placement and user to cloudlet allocation in wireless metropolitan area networks. IEEE Transactions on Cloud Computing, 5(4), 725\u2013737.","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"8453_CR8","doi-asserted-by":"crossref","unstructured":"Brummett, T., Sheinidashtegol, P., Sarkar, D., & Galloway, M. (2015). Performance metrics of local cloud computing architectures. In 2015 IEEE 2nd international conference on cyber security and cloud computing (pp. 25\u201330). IEEE.","DOI":"10.1109\/CSCloud.2015.61"},{"issue":"6","key":"8453_CR9","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang, M., & Zhang, T. (2016). Fog and IoT: An overview of research opportunities. IEEE Internet of Things Journal, 3(6), 854\u2013864.","journal-title":"IEEE Internet of Things Journal"},{"issue":"11","key":"8453_CR10","doi-asserted-by":"publisher","first-page":"594","DOI":"10.3390\/sym10110594","volume":"10","author":"TD Nguyen","year":"2018","unstructured":"Nguyen, T. D., Nguyen, T.-D., Nguyen, V. D., Pham, X.-Q., & Huh, E.-N. (2018). Cost-effective resource sharing in an internet of vehicles-employed mobile edge computing environment. Symmetry, 10(11), 594.","journal-title":"Symmetry"},{"issue":"1","key":"8453_CR11","doi-asserted-by":"publisher","first-page":"58","DOI":"10.3390\/sym11010058","volume":"11","author":"X-Q Pham","year":"2019","unstructured":"Pham, X.-Q., Nguyen, T.-D., Nguyen, V., & Huh, E.-N. (2019). Joint node selection and resource allocation for task offloading in scalable vehicle-assisted multi-access edge computing. Symmetry, 11(1), 58.","journal-title":"Symmetry"},{"key":"8453_CR12","doi-asserted-by":"crossref","unstructured":"Xu, J., Palanisamy, B., Ludwig, H., & Wang, Q. (2017). Zenith: Utility-aware resource allocation for edge computing. In 2017 IEEE international conference on edge computing (EDGE) (pp. 47\u201354). IEEE.","DOI":"10.1109\/IEEE.EDGE.2017.15"},{"key":"8453_CR13","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MPRV.2009.82","volume":"4","author":"M Satyanarayanan","year":"2009","unstructured":"Satyanarayanan, M., Bahl, P., Caceres, R., & Davies, N. (2009). The case for vm-based cloudlets in mobile computing. IEEE Pervasive Computing, 4, 14\u201323.","journal-title":"IEEE Pervasive Computing"},{"key":"8453_CR14","doi-asserted-by":"crossref","unstructured":"Clinch, S., Harkes, J., Friday, A., Davies, N., & Satyanarayanan, M. (2012). How close is close enough? Understanding the role of cloudlets in supporting display appropriation by mobile users. In 2012 IEEE international conference on pervasive computing and communications (pp. 122\u2013127). IEEE.","DOI":"10.1109\/PerCom.2012.6199858"},{"issue":"3","key":"8453_CR15","doi-asserted-by":"publisher","first-page":"2575","DOI":"10.1007\/s11277-020-07997-6","volume":"117","author":"Z Abbas","year":"2021","unstructured":"Abbas, Z., Anjum, M. R., Younus, M. U., & Chowdhry, B. S. (2021). Monitoring of gas distribution pipelines network using wireless sensor networks. Wireless Personal Communications, 117(3), 2575\u20132594.","journal-title":"Wireless Personal Communications"},{"issue":"12","key":"8453_CR16","doi-asserted-by":"publisher","first-page":"2739","DOI":"10.3390\/s19122739","volume":"19","author":"MU Younus","year":"2019","unstructured":"Younus, M. U., & Kim, S. W. (2019). Proposition and real-time implementation of an energy-aware routing protocol for a software defined wireless sensor network. Sensors, 19(12), 2739.","journal-title":"Sensors"},{"key":"8453_CR17","doi-asserted-by":"crossref","unstructured":"Xu, Z., Liang, W., Xu, W., Jia, M., & Guo, S. (2015). Capacitated cloudlet placements in wireless metropolitan area networks. In 2015 IEEE 40th Conference on Local Computer Networks (LCN) (pp. 570\u2013578). IEEE.","DOI":"10.1109\/LCN.2015.7366372"},{"issue":"1","key":"8453_CR18","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/TETC.2015.2508382","volume":"5","author":"L Gu","year":"2017","unstructured":"Gu, L., Zeng, D., Guo, S., Barnawi, A., & Xiang, Y. (2017). Cost efficient resource management in fog computing supported medical cyber-physical system. IEEE Transactions on Emerging Topics in Computing, 5(1), 108\u2013119.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"issue":"3","key":"8453_CR19","first-page":"16","volume":"9","author":"MU Younus","year":"2018","unstructured":"Younus, M. U. (2018). Analysis of the impact of different parameter settings on wireless sensor network lifetime. International Journal of Advanced Computer Science and Applications, 9(3), 16\u201321.","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"8453_CR20","doi-asserted-by":"crossref","unstructured":"El Haber, E., Nguyen, T. M., & Assi, C. (2019). Joint optimization of computational cost and devices energy for task offloading in multi-tier edge-clouds. IEEE Transactions on Communications.","DOI":"10.1109\/TCOMM.2019.2895040"},{"issue":"3","key":"8453_CR21","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1109\/LWC.2017.2780128","volume":"7","author":"M Liu","year":"2018","unstructured":"Liu, M., & Liu, Y. (2018). Price-based distributed offloading for mobile-edge computing with computation capacity constraints. IEEE Wireless Communications Letters, 7(3), 420\u2013423.","journal-title":"IEEE Wireless Communications Letters"},{"issue":"11","key":"8453_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8867157","volume":"2020","author":"Z Qin","year":"2020","unstructured":"Qin, Z., Qiu, X., Ye, J., & Wang, L. (2020). User-edge collaborative resource allocation and offloading strategy in edge computing. Wireless Communications and Mobile Computing, 2020(11), 1\u201312.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"4","key":"8453_CR23","doi-asserted-by":"publisher","first-page":"3246","DOI":"10.1109\/JIOT.2018.2838022","volume":"5","author":"H Shah-Mansouri","year":"2018","unstructured":"Shah-Mansouri, H., & Wong, V. W. (2018). Hierarchical fog-cloud computing for IoT systems: A computation offloading game. IEEE Internet of Things Journal, 5(4), 3246\u20133257.","journal-title":"IEEE Internet of Things Journal"},{"issue":"16","key":"8453_CR24","doi-asserted-by":"publisher","first-page":"e3975","DOI":"10.1002\/cpe.3975","volume":"29","author":"H Yao","year":"2017","unstructured":"Yao, H., Bai, C., Xiong, M., Zeng, D., & Fu, Z. (2017). Heterogeneous cloudlet deployment and user-cloudlet association toward cost effective fog computing. Concurrency and Computation: Practice and Experience, 29(16), e3975.","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"1\u20132","key":"8453_CR25","doi-asserted-by":"publisher","first-page":"460","DOI":"10.14778\/1920841.1920902","volume":"3","author":"J Schad","year":"2010","unstructured":"Schad, J., Dittrich, J., & Quian\u00e9-Ruiz, J.-A. (2010). Runtime measurements in the cloud: Observing, analyzing, and reducing variance. Proceedings of the VLDB Endowment, 3(1\u20132), 460\u2013471.","journal-title":"Proceedings of the VLDB Endowment"},{"key":"8453_CR26","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-7091-2748-3_8","volume-title":"Analysis and design of algorithms in combinatorial optimization","author":"MR Garey","year":"1981","unstructured":"Garey, M. R., & Johnson, D. S. (1981). Approximation algorithms for bin packing problems: A survey. In G. Ausiello & M. Lucertini (Eds.), Analysis and design of algorithms in combinatorial optimization. (pp. 147\u2013172). Springer."},{"key":"8453_CR27","doi-asserted-by":"crossref","unstructured":"Ostermann, S., Iosup, A., Yigitbasi, N., Prodan, R., Fahringer, T., & Epema, D. (2009). A performance analysis of EC2 cloud computing services for scientific computing. In International conference on cloud computing (pp. 115\u2013131). Springer.","DOI":"10.1007\/978-3-642-12636-9_9"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08453-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08453-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08453-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T11:02:41Z","timestamp":1629716561000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08453-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,24]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["8453"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08453-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2021,4,24]]},"assertion":[{"value":"28 March 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}