{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:08:43Z","timestamp":1758845323479,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,4,10]],"date-time":"2017-04-10T00:00:00Z","timestamp":1491782400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61379110"],"award-info":[{"award-number":["61379110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s12083-017-0556-6","type":"journal-article","created":{"date-parts":[[2017,4,10]],"date-time":"2017-04-10T02:27:41Z","timestamp":1491791261000},"page":"679-696","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["A resource allocation model based on double-sided combinational auctions for transparent computing"],"prefix":"10.1007","volume":"11","author":[{"given":"Jiaze","family":"Wang","sequence":"first","affiliation":[]},{"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Zhiwen","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,10]]},"reference":[{"key":"556_CR1","doi-asserted-by":"publisher","unstructured":"Kim SH, Kang DK, Kim WJ, Chen M., & Youn CH (2016) A science gateway cloud with cost adaptive VM management scheme for computational scientific applications. IEEE Syst J doi: 10.1109\/JSYST.2015.2501750","DOI":"10.1109\/JSYST.2015.2501750"},{"issue":"10","key":"556_CR2","doi-asserted-by":"crossref","first-page":"3171","DOI":"10.1109\/TC.2016.2519901","volume":"65","author":"J Liu","year":"2016","unstructured":"Liu J, Zhou Y, Zhang D (2016) TranSim: a simulation framework for cache-enabled transparent computing systems. IEEE Trans Comput 65(10):3171\u20133183","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"556_CR3","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1504\/IJAHUC.2016.075188","volume":"21","author":"K Guo","year":"2016","unstructured":"Guo K, Xiao Y, Duan G (2016) A cost-efficient architecture for the campus information system based on transparent computing platform. Int J Ad Hoc Ubiquit Comput 21(2):95\u2013103","journal-title":"Int J Ad Hoc Ubiquit Comput"},{"key":"556_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2442994","author":"Y Li","year":"2015","unstructured":"Li Y, Chen M, Dai W, Qiu M (2015) Energy optimization with dynamic task scheduling mobile cloud computing. IEEE Syst J. doi: 10.1109\/JSYST.2015.2442994","journal-title":"IEEE Syst J"},{"issue":"1","key":"556_CR5","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/TST.2013.6449403","volume":"18","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Zhou Y (2013) Transparent computing: spatio-temporal extension on von neumann architecture for cloud services. Tsinghua Sci Technol 18(1):10\u201321","journal-title":"Tsinghua Sci Technol"},{"issue":"2","key":"556_CR6","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1504\/IJAHUC.2016.075191","volume":"21","author":"C Xue","year":"2016","unstructured":"Xue C, Lin C (2016) Performance modelling for transparent computing using stochastic petri nets. Int J Ad Hoc Ubiquit Comput 21(2):81\u201394","journal-title":"Int J Ad Hoc Ubiquit Comput"},{"issue":"3","key":"556_CR7","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1109\/TDSC.2015.2406704","volume":"13","author":"H Li","year":"2016","unstructured":"Li H, Yang Y, Luan TH, Liang X, Zhou L, Shen XS (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Secure Comput 13(3):312\u2013325","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"8","key":"556_CR8","doi-asserted-by":"crossref","first-page":"1650","DOI":"10.1109\/TMM.2016.2566584","volume":"18","author":"Z Su","year":"2016","unstructured":"Su Z, Xu Q, Fei M, Dong M (2016) Game theoretic resource allocation in media cloud with mobile social users. IEEE Trans Multimed 18(8):1650\u20131660","journal-title":"IEEE Trans Multimed"},{"key":"556_CR9","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.ins.2012.12.037","volume":"230","author":"A Liu","year":"2013","unstructured":"Liu A, Jin X, Cui G, Chen Z (2013) Deployment guidelines for achieving maximal Lifetime and avoiding energy holes in sensor network. Inf Sci 230:197\u2013226","journal-title":"Inf Sci"},{"issue":"1","key":"556_CR10","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MNET.2016.7389831","volume":"30","author":"Z Su","year":"2016","unstructured":"Su Z, Xu Q, Qi Q (2016) Big data in mobile social networks: a QoE-oriented framework. IEEE Netw 30(1):52\u201357","journal-title":"IEEE Netw"},{"issue":"2","key":"556_CR11","first-page":"35","volume":"15","author":"J Zeng","year":"2016","unstructured":"Zeng J, Yang LT, Ma J (2016) A system-level modeling and design for cyber-physical-social systems. ACM Trans Embed Comput Syst (TECS) 15(2):35","journal-title":"ACM Trans Embed Comput Syst (TECS)"},{"issue":"6","key":"556_CR12","doi-asserted-by":"crossref","first-page":"3096","DOI":"10.1109\/TCOMM.2013.050613.121698","volume":"12","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, He S, Chen J et al (2013) Distributed sampling rate control for rechargeable sensor nodes with limited battery capacity. IEEE Trans Wirel Commun 12(6):3096\u20133106","journal-title":"IEEE Trans Wirel Commun"},{"issue":"2","key":"556_CR13","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1109\/TII.2015.2411231","volume":"12","author":"J Ren","year":"2016","unstructured":"Ren J, Zhang Y, Zhang K, Liu A, Chen J, Shen XS (2016) Lifetime and energy hole evolution analysis in data-gathering wireless sensor networks. IEEE Trans Ind Inform 12(2):788\u2013800","journal-title":"IEEE Trans Ind Inform"},{"issue":"3","key":"556_CR14","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1007\/s12083-016-0501-0","volume":"10","author":"Z Chen","year":"2017","unstructured":"Chen Z, Liu A, Li Z, Choi YJ, Li J (2017) Distributed duty cycle control for delay improvement in wireless sensor networks. Peer-to-Peer Netw Appl 10(3):559\u2013578","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"4","key":"556_CR15","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1007\/s12083-015-0331-5","volume":"9","author":"X Deng","year":"2016","unstructured":"Deng X, He L, Li X, Liu Q, Cai L, Chen Z (2016) A reliable QoS aware routing scheme for neighbor area nework in smart grid. Peer-to-Peer Netw Appl 9(4):616\u2013627","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"10","key":"556_CR16","first-page":"2606","volume":"97","author":"D Mianxiong","year":"2014","unstructured":"Mianxiong D, Kimata T, Sugiura K et al (2014) Quality-of-experience (QoE) in emerging mobile social networks. IEICE Trans Inf Syst 97(10):2606\u20132612","journal-title":"IEICE Trans Inf Syst"},{"issue":"4","key":"556_CR17","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/2886780","volume":"48","author":"M Platania","year":"2016","unstructured":"Platania M, Obenshain D, Tantillo T, Amir Y, Suri N (2016) On choosing server-or client-side solutions for BFT. ACM Comput Surv (CSUR) 48(4):61","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"4","key":"556_CR18","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MWC.2015.7224730","volume":"22","author":"H Li","year":"2015","unstructured":"Li H, Liu D, Dai Y, Luan TH (2015) Engineering searchable encryption of mobile cloud networks: when qoe meets qop. IEEE Wirel Commun 22(4):74\u201380","journal-title":"IEEE Wirel Commun"},{"key":"556_CR19","doi-asserted-by":"crossref","unstructured":"Aazam M, Huh EN (2015) Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT[C] \/\/. IEEE 29th Int Conf Adv Inf Netw Appl:687\u2013694","DOI":"10.1109\/AINA.2015.254"},{"key":"556_CR20","doi-asserted-by":"crossref","unstructured":"Yaoxue Zhang, Ju Ren, Jiagang Liu, et al (2017) A Survey on Emerging Computing Paradigms for Big Data. Chinese Journal of Electronics 26(1):1\u201312","DOI":"10.1049\/cje.2016.11.016"},{"key":"556_CR21","doi-asserted-by":"crossref","unstructured":"Ren J, Zhang Y, Zhang K, et al (2015) Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions[J]. IEEE Communications Magazine 53(3):98\u2013105.","DOI":"10.1109\/MCOM.2015.7060488"},{"issue":"5","key":"556_CR22","doi-asserted-by":"crossref","first-page":"1694","DOI":"10.1007\/s11227-014-1311-x","volume":"72","author":"CR Choi","year":"2016","unstructured":"Choi CR, Jeong HY, Park JH, Jang HJ, Jeong YS (2016) Relative weight comparison between virtual key factors of cloud computing with analytic network process. J Supercomput 72(5):1694\u20131714","journal-title":"J Supercomput"},{"key":"556_CR23","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0860","author":"X Deng","year":"2016","unstructured":"Deng X, Peng Q, He L, He T (2016) Interference-aware QoS routing for neighborhood area network in smart grid. IET Commun. doi: 10.1049\/iet-com.2016.0860","journal-title":"IET Commun"},{"key":"556_CR24","doi-asserted-by":"crossref","unstructured":"Zhao S, Liu A (2017) High performance target tracking scheme with low prediction precision requirement in WSNs, International Journal of Ad Hoc and Ubiquitous Computing, http:\/\/www.inderscience.com\/info\/ingeneral\/forthcoming.php?jcode=ijahuc","DOI":"10.1504\/IJAHUC.2018.10016988"},{"key":"556_CR25","first-page":"3145","volume-title":"Optimal admission control policy for mobile cloud computing hotspot with cloudlet \u2225WCNC 2012","author":"DT Hoang","year":"2012","unstructured":"Hoang DT, Niyato D, Wang P (2012) Optimal admission control policy for mobile cloud computing hotspot with cloudlet \u2225WCNC 2012. IEEE Press, Atlanta, pp 3145\u20133149"},{"issue":"2","key":"556_CR26","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/TSC.2015.2449314","volume":"9","author":"X Liu","year":"2016","unstructured":"Liu X, Dong M, Ota K, Hung P, Liu A (2016) Service pricing decision in cyber-physical systems: insights from game theory. IEEE Trans Serv Comput 9(2):186\u2013198","journal-title":"IEEE Trans Serv Comput"},{"issue":"6","key":"556_CR27","doi-asserted-by":"crossref","first-page":"1268","DOI":"10.1109\/TMC.2013.129","volume":"13","author":"S He","year":"2014","unstructured":"He S, Chen J, Li X, Shen XS, Sun Y (2014) Mobility and intruder prior information improving the barrier coverage of sparse sensor networks. IEEE Trans Mob Comput 13(6):1268\u20131282","journal-title":"IEEE Trans Mob Comput"},{"issue":"10","key":"556_CR28","doi-asserted-by":"crossref","first-page":"1931","DOI":"10.1109\/TMC.2012.161","volume":"12","author":"S He","year":"2013","unstructured":"He S, Chen J, Jiang F, Yau DK, Xing G, Sun Y (2013) Energy provisioning in wireless rechargeable sensor networks. IEEE Trans Mob Comput 12(10):1931\u20131942","journal-title":"IEEE Trans Mob Comput"},{"key":"556_CR29","doi-asserted-by":"crossref","unstructured":"Gui J, & Zhou K (2016) Flexible adjustments between energy and capacity for topology control in heterogeneous wireless multi-hop networks. Journal of Network and Systems Management 1-24","DOI":"10.1007\/s10922-016-9367-y"},{"key":"556_CR30","doi-asserted-by":"crossref","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","volume":"11","author":"Y Liu","year":"2016","unstructured":"Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensic Secur 11:2013\u20132027","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"8","key":"556_CR31","doi-asserted-by":"crossref","first-page":"6692","DOI":"10.1109\/TVT.2015.2472289","volume":"65","author":"Q Xu","year":"2016","unstructured":"Xu Q, Su Z, Guo S (2016) A game theoretical incentive scheme for relay selection services in mobile social networks. IEEE Trans Veh Technol 65(8):6692\u20136702","journal-title":"IEEE Trans Veh Technol"},{"issue":"8","key":"556_CR32","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1109\/TPDS.2013.124","volume":"25","author":"H Li","year":"2014","unstructured":"Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2014) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst 25(8):2053\u20132064","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"556_CR33","doi-asserted-by":"publisher","unstructured":"Long J, Dong M, Ota K, Liu A (2015) Green TDMA scheduling algorithm for prolonging Lifetime in wireless sensor networks. IEEE Syst J doi: 10.1109\/JSYST.2015.2448355 .","DOI":"10.1109\/JSYST.2015.2448355"},{"issue":"5","key":"556_CR34","doi-asserted-by":"crossref","first-page":"825","DOI":"10.1007\/s11036-016-0745-1","volume":"21","author":"M Chen","year":"2016","unstructured":"Chen M, Ma Y, Song J, Lai C, Hu B (2016) Smart clothing: connecting human with clouds and big data for sustainable health monitoring. ACM\/Springer Mob Netw Appl 21(5):825\u2013845","journal-title":"ACM\/Springer Mob Netw Appl"},{"issue":"2","key":"556_CR35","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/s12083-016-0457-0","volume":"10","author":"X Deng","year":"2017","unstructured":"Deng X, Li G, Dong M, Ota K (2017) Finding overlapping communities based on Markov chain and link clustering. Peer-to-Peer Netw Appl 10(2):411\u2013420","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"10","key":"556_CR36","doi-asserted-by":"crossref","first-page":"2991","DOI":"10.1002\/cpe.3485","volume":"28","author":"I Stojmenovic","year":"2015","unstructured":"Stojmenovic I, Wen S, Huang X, Luan H (2015) An overview of fog computing and its security issues. Concurr Comput: Pract Experience 28(10):2991\u20133005","journal-title":"Concurr Comput: Pract Experience"},{"issue":"2","key":"556_CR37","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/JIOT.2015.2471260","volume":"3","author":"MA Al Faruque","year":"2016","unstructured":"Al Faruque MA, Vatanparvar K (2016) Energy management-as-a-service over fog computing platform. IEEE Internet Things J 3(2):161\u2013169","journal-title":"IEEE Internet Things J"},{"key":"556_CR38","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.ins.2014.02.008","volume":"357","author":"P Samimi","year":"2016","unstructured":"Samimi P, Teimouri Y, Mukhtar M (2016) A combinatorial double auction resource allocation model in cloud computing. Inf Sci 357:201\u2013216","journal-title":"Inf Sci"},{"key":"556_CR39","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.jss.2015.06.025","volume":"108","author":"G Baranwal","year":"2015","unstructured":"Baranwal G, Vidyarthi DP (2015) A fair multi-attribute combinatorial double auction model for resource allocation in cloud computing. J Syst Softw 108:60\u201376","journal-title":"J Syst Softw"},{"issue":"4","key":"556_CR40","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MWC.2015.7224727","volume":"22","author":"M Dong","year":"2015","unstructured":"Dong M, Liu X, Qian Z et al (2015) QoE-ensured price competition model for emerging mobile networks. IEEE Wirel Commun 22(4):50\u201357","journal-title":"IEEE Wirel Commun"},{"issue":"1","key":"556_CR41","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/TPDS.2013.23","volume":"25","author":"N Samaan","year":"2014","unstructured":"Samaan N (2014) A novel economic sharing model in a federation of selfish cloud providers. IEEE Trans Parallel Distrib Syst 25(1):12\u201321","journal-title":"IEEE Trans Parallel Distrib Syst"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-017-0556-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-017-0556-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-017-0556-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T17:06:32Z","timestamp":1568999192000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-017-0556-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,10]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["556"],"URL":"https:\/\/doi.org\/10.1007\/s12083-017-0556-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2017,4,10]]}}}