{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:34:08Z","timestamp":1772120048520,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T00:00:00Z","timestamp":1539216000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s12083-018-0690-9","type":"journal-article","created":{"date-parts":[[2018,10,10]],"date-time":"2018-10-10T22:28:41Z","timestamp":1539210521000},"page":"865-880","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Pareto set as a model for dispatching resources in emergency Centres"],"prefix":"10.1007","volume":"12","author":[{"given":"Ricardo","family":"Guedes","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8721-4308","authenticated-orcid":false,"given":"Vasco","family":"Furtado","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tarc\u00edsio","family":"Pequeno","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,10,11]]},"reference":[{"key":"690_CR1","doi-asserted-by":"crossref","unstructured":"Birks DJ, Donkin S, and Wellsmith MJ (2008). Synthesis over analysis: Towards an ontology of volume crime simulation. In Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems, eds. Lin Liu and John E. Eck. Hershey, PA: Idea Group","DOI":"10.4018\/978-1-59904-591-7.ch009"},{"key":"690_CR2","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cor.2013.08.001","volume":"41","author":"R Abounacer","year":"2014","unstructured":"Abounacer R, Rekik M, Renaud J (2014) An exact solution approach for multi-objective location-transportation problem for disaster response. Computer Operation Research 41:83\u201393","journal-title":"Computer Operation Research"},{"key":"690_CR3","doi-asserted-by":"crossref","unstructured":"Guedes R, Furtado V. and Pequeno T (2015). Multi-objective Evolutionary Algorithms and Multiagent Models for Optimizing Police Dispatch. International Conference on Intelligence and Security Informatics (ISI)","DOI":"10.1109\/ISI.2015.7165936"},{"key":"690_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.tre.2011.05.004","volume":"48","author":"K Huang","year":"2012","unstructured":"Huang K, Smilowitz BB (2012) Models for relief routing: equity, efficiency and efficacy transport. Res Part E: Logist Transport Rev 48:2\u201318","journal-title":"Res Part E: Logist Transport Rev"},{"key":"690_CR5","doi-asserted-by":"crossref","unstructured":"Huang K, Jiang Y, Yuan Y, Zhao L (2015). modelling multiple humanitarian objectives in emergency response to large-scale disasters. Transportation Research Part E","DOI":"10.1016\/j.tre.2014.11.007"},{"key":"690_CR6","unstructured":"Deng R, Lu R, Lai C, Luan T and Liang H (2015) Optimal Workload allocation in fog-cloud computing towards balanced delay and power consumption. IEEE Internet of Things Journal 3(6):1171\u20131181"},{"key":"690_CR7","unstructured":"Guo X, Singh R, Zhao NT. (2016). An index based task assignment policy for achieving optimal power-delay tradeoff in edge cloud systems, (ICC) 2016 IEEE International Conference on communications, pp. 1\u20137"},{"issue":"1","key":"690_CR8","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/TSG.2011.2170100","volume":"3","author":"R Rao","year":"2012","unstructured":"Rao R, Liu X, Xie L, Liu F (2012) Coordinated energy cost management of distributed internet data centers in smart grid. IEEE Transactions on Smart Grid 3(1):50\u201358","journal-title":"IEEE Transactions on Smart Grid"},{"key":"690_CR9","unstructured":"Zhao, T., Zhou, S, Guo, X, Niu, Z. (2017). Tasks scheduling and resource allocation in heterogeneous cloud for delay-bounded mobile edge computing, 2017 IEEE International Conference on Communications, pp. 1\u20137"},{"key":"690_CR10","unstructured":"Nabi, M, Benkoczi, R, Abdelhamid, S, Hassanein, H. S. (2017) Resource assignment in vehicular clouds, Communications (ICC) 2017 IEEE International Conference on, pp. 1\u20136"},{"issue":"1","key":"690_CR11","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/JPROC.2011.2161236","volume":"100","author":"R Rao","year":"2012","unstructured":"Rao R, Liu X, Ilic M, Liu J (2012) Distributed coordination of internet data centers under multiregional electricity markets. Proc IEEE 100(1):269\u2013282","journal-title":"Proc IEEE"},{"key":"690_CR12","unstructured":"Souza V, Ram\u00edrez W, Masip-Bruin X, Mar\u00edn-Tordera E, Ren G, Tashakor G. (2016). Handling service allocation in combined Fog-cloud scenarios, 2016 IEEE International Conference on Communications, pp. 1\u20135"},{"key":"690_CR13","doi-asserted-by":"publisher","first-page":"9206","DOI":"10.1109\/ACCESS.2017.2704100","volume":"5","author":"F Kraemer","year":"2017","unstructured":"Kraemer F, Braten AE, Tamkittikhun N, Palma D (2017) Fog computing in healthcare \u2013 a review and discussion. Access IEEE 5:9206\u20139222","journal-title":"Access IEEE"},{"issue":"2","key":"690_CR14","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/BF01071168","volume":"9","author":"S Sacks","year":"1993","unstructured":"Sacks S, Larson R, Richard C, Schaack C (1993) Minimizing the cost of dispatch delays by holding patrol cars in reserve. J Quant Criminol 9(2):203\u2013224","journal-title":"J Quant Criminol"},{"key":"690_CR15","doi-asserted-by":"crossref","unstructured":"Almeida A, Ramalho GL, Santana HP, Tedesco P, Menezes TR, Corruble V, Chevaleyre Y (2004) Recent Advances on Multi-Agent Patrolling. Proc. 17th Brazilian Symposium on Artificial Intelligence","DOI":"10.1007\/978-3-540-28645-5_48"},{"issue":"4","key":"690_CR16","first-page":"288","volume":"3","author":"R Guedes","year":"2014","unstructured":"Guedes R, Furtado V, Pequeno T (2014) Multiagent models for police resource allocation and dispatch. Intelligence and Security Informatics Conference (JISIC) 3(4):288\u2013291","journal-title":"Intelligence and Security Informatics Conference (JISIC)"},{"key":"690_CR17","volume-title":"Police patrol, operations and management","author":"CD Hale","year":"1980","unstructured":"Hale CD (1980) Police patrol, operations and management. Prentice Hall, Upper Saddle River"},{"key":"690_CR18","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.tre.2014.12.012","volume":"75","author":"AP Ianonnim","year":"2015","unstructured":"Ianonnim AP, Chiyosi F, Morabito R (2015) A spatially distributed queuing model considering dispatching policies with server reservation. Transportation Research Part E: Logistics and Transportation Review 75:49\u201366","journal-title":"Transportation Research Part E: Logistics and Transportation Review"},{"issue":"1","key":"690_CR19","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1057\/palgrave.sj.8340159","volume":"17","author":"P Brantingham","year":"2004","unstructured":"Brantingham P, Brantingham P (2004) Computer simulation as a tool for environmental criminology. Secur J 17(1):21\u201330","journal-title":"Secur J"},{"key":"690_CR20","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-591-7","volume-title":"Artificial crime analysis systems: using computer simulations and geographic information systems","author":"L Liu","year":"2008","unstructured":"Liu L, Eck JE (2008) Artificial crime analysis systems: using computer simulations and geographic information systems. Idea Group, Hershey"},{"key":"690_CR21","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1186\/2190-8532-2-7","volume":"2","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Brown DE (2013) Police patrol districting method and simulation evaluation using agent-based model & GIS. Security Informatics 2:7","journal-title":"Security Informatics"},{"issue":"3","key":"690_CR22","first-page":"63","volume":"27","author":"V Furtado","year":"2006","unstructured":"Furtado V, Vasconcelos E (2006) A multiagent simulator to teach police allocation. AI Mag 27(3):63","journal-title":"AI Mag"},{"key":"690_CR23","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.cor.2016.05.018","volume":"79","author":"A Ahmaldi","year":"2017","unstructured":"Ahmaldi A, Seyedia P, Syam S (2017) A survey of healthcare facility location. Comput Oper Res 79:223\u2013263","journal-title":"Comput Oper Res"},{"key":"690_CR24","doi-asserted-by":"crossref","unstructured":"Wang Y, Luangkesom K, Schuman L. (2012). \n                    Modeling emergency medical response to a mass casualty incident using agent based simulation\n                    \n                  . Socio-Economic planning sciences, Elsevier","DOI":"10.1016\/j.seps.2012.07.002"},{"issue":"10","key":"690_CR25","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.ins.2016.06.030","volume":"373","author":"J Wang","year":"2016","unstructured":"Wang J, Han L, Shi A, Cui N (2016) A new partial coverage locating model for cooperative fire services. Information Science 373(10):527\u2013538","journal-title":"Information Science"},{"key":"690_CR26","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.tre.2012.09.001","volume":"49","author":"N Najafi","year":"2013","unstructured":"Najafi N, Eshghi K, Dullaert W (2013) A multi-objective robust optimization model for logistics planning in the earthquake response phase. Transport Res Part E: Logist Transport Rev 49:217\u2013249","journal-title":"Transport Res Part E: Logist Transport Rev"},{"issue":"4","key":"690_CR27","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/4235.797969","volume":"3","author":"E Zitzler","year":"1999","unstructured":"Zitzler E, Thiele L (1999) Multiobjective evolutionary algorithms: a comparative case study and the strength pareto approach. IEEE Transactions on Evolutionary Computation 3(4):257\u2013271","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"2","key":"690_CR28","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1162\/106365600568202","volume":"8","author":"E Zitzler","year":"2000","unstructured":"Zitzler E, Deb K, Thiele L (2000) Comparison of multiobjective evolutionary algorithms: empirical results. Evol Comput 8(2):173\u2013195","journal-title":"Evol Comput"},{"key":"690_CR29","doi-asserted-by":"crossref","unstructured":"Zitzler E., Laumanns, and Bleuler S. (2004). A Tutorial on Evolutionary Multiobjective Optimization. In: Metaheuristics for Multiobjective Optimization. Lecture Notes in Economics and Mathematical Systems. Volume 535","DOI":"10.1007\/978-3-642-17144-4_1"},{"key":"690_CR30","unstructured":"Cansado T (2005) Aloca\u00e7\u00e3o e Despacho de Recursos para Combate \u00e0 Criminalidade. Master Dissertation, UFMG"},{"key":"690_CR31","doi-asserted-by":"crossref","unstructured":"Melo A, Furtado V, Coelho A, Menezes R (2009) A bio-inspired crime simulation model. Decis Support Syst","DOI":"10.1016\/j.dss.2009.08.008"},{"key":"690_CR32","unstructured":"Wilensky U (1999). NetLogo. \n                    http:\/\/ccl.northwestern.edu\/netlogo\/\n                    \n                   . Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL"},{"issue":"3","key":"690_CR33","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/JIOT.2014.2322606","volume":"1","author":"L Yu","year":"2014","unstructured":"Yu L, Jiang T, Cao Y, Qi Q (2014) Carbon-aware energy cost minimization for distributed internet data centers in smart microgrids. IEEE Internet of Things Journal 1(3):255\u2013264","journal-title":"IEEE Internet of Things Journal"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0690-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-018-0690-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0690-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T19:15:12Z","timestamp":1570734912000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-018-0690-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,11]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["690"],"URL":"https:\/\/doi.org\/10.1007\/s12083-018-0690-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.2196\/preprints.10298","asserted-by":"object"}]},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,11]]},"assertion":[{"value":"4 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"No author has a conflict of interest with the contents of this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}