{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T19:42:11Z","timestamp":1770234131727,"version":"3.49.0"},"reference-count":293,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2948399","type":"journal-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T23:27:10Z","timestamp":1571700430000},"page":"152847-152878","source":"Crossref","is-referenced-by-count":57,"title":["What the Fog? Edge Computing Revisited: Promises, Applications and Future Challenges"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0251-2056","authenticated-orcid":false,"given":"Julien","family":"Gedeon","sequence":"first","affiliation":[]},{"given":"Florian","family":"Brandherm","sequence":"additional","affiliation":[]},{"given":"Rolf","family":"Egert","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Grube","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4713-5327","authenticated-orcid":false,"given":"Max","family":"Muhlhauser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2010.2047650"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1007\/s00464-014-3504-z"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.1316809"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2016.52"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2704100"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/ICPCA.2010.5704072"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.51"},{"key":"ref170","first-page":"320","article-title":"Improving Web sites performance using edge servers in fog computing architecture","author":"zhu","year":"2013","journal-title":"Proc IEEE 7th Int Symp Service-Oriented Syst Eng"},{"key":"ref272","first-page":"2","article-title":"FAST: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation","author":"cao","year":"2015","journal-title":"Proc 10th IEEE Int Conf Netw Archit Storage (NAS)"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921174"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7565185"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2017.7888772"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504383"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/ICFEC.2017.9"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.94"},{"key":"ref178","first-page":"1","article-title":"AppFlux: Taming app delivery via streaming","author":"bhardwaj","year":"2015","journal-title":"Proc USENIX Conf Timely Results Oper Syst (TRIOS)"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29003-4_6"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2294111"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6871674"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.155"},{"key":"ref38","first-page":"1","author":"hu","year":"2015","journal-title":"Mobile edge computing A key technology towards 5G"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701095"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600249CM"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3057266"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2778504"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1145\/2800835.2800961"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2015.7318688"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1145\/2093698.2093829"},{"key":"ref35","first-page":"48","article-title":"Mobile edge computing: A taxonomy","author":"beck","year":"2014","journal-title":"Proc Int Conf Adv Future Internet (AFIN)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3301443"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700120"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1145\/3301418.3313939"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2015.34"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/SIOT.2015.9"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.173"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464440"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.100"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/FWC.2017.8368540"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132763"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.020"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594383"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2017.06.090"},{"key":"ref184","first-page":"1","article-title":"Valorising the IoT databox: Creating value for everyone","volume":"28","author":"perera","year":"2017","journal-title":"Trans Emerg Telecommun Technol"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/3010079.3010082"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.7146\/aahcc.v1i1.21312"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1145\/2389148.2389157"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1145\/2629592"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.39"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20898-0_31"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700906"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3154815"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.243"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487455"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"ref22","article-title":"A view of fog computing from networking perspective","author":"luan","year":"2016","journal-title":"arXiv 1602 01509"},{"key":"ref21","article-title":"Resource management in fog\/edge computing: A survey","author":"hong","year":"2018","journal-title":"arXiv 1810 00305"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/978-3-319-21837-3_67","article-title":"Security and privacy issues of fog computing: A survey","author":"yi","year":"2015","journal-title":"Proc 11th Int Conf Wireless Algorithms Syst Appl (WASA)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1068\/p6794"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2717482"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2010.5537589"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3485"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.015"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2017.61"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422684"},{"key":"ref51","first-page":"637","article-title":"An intelligent traffic light scheduling algorithm through VANETs","author":"younes","year":"2014","journal-title":"Proc 39th Annu IEEE Conf Local Comput Netw Workshops"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1145\/3177102.3177115"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1145\/1012551.1012559"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/3301418.3313942"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.48"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999604"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1145\/1851307.1851312"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/2381876.2381879"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1145\/2799650.2799652"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2012.10.024"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.326105129"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983098"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1162\/pres.1997.6.4.355"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.1992.tb00812.x"},{"key":"ref289","first-page":"1","author":"reznik","year":"0","journal-title":"MEC in an Enterprise Setting A Solution Outline"},{"key":"ref59","article-title":"Feasibility of fog computing","author":"varghese","year":"2017","journal-title":"arXiv 1701 05451"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134447"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2019.00062"},{"key":"ref56","first-page":"1","article-title":"Mobile data repositories at the edge","author":"psaras","year":"2018","journal-title":"Proceedings of USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2015.7158137"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/FWC.2017.8368524"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.358967"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524378"},{"key":"ref166","year":"2013","journal-title":"Ericsson Mobility Report"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1036038"},{"key":"ref164","article-title":"Mobile augmented reality survey: A bottom-up approach","author":"huang","year":"2013","journal-title":"arXiv 1309 4413"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/IE.2014.54"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00168"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1145\/2802130.2802134"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2018.00011"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134458"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134459"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/1550147716665500"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2563428"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/3304109.3306217"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.207"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700268"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.93"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117815"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.124"},{"key":"ref45","first-page":"59","article-title":"Cuckoo: A computation offloading framework for smartphones","author":"kemp","year":"2010","journal-title":"Proc Int Conf Mobile Comput Appl Services (MobiCASE)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.05.013"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.023"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195845"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2748956"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2666783"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2677520"},{"key":"ref70","first-page":"1","article-title":"Privacy-preserving aggregation of time-series data","author":"shi","year":"2011","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2749422"},{"key":"ref77","first-page":"1","article-title":"The fog computing paradigm: Scenarios and security issues","author":"stojmenovic","year":"2014","journal-title":"Proc Federated Conf Comput Sci Inf Syst"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.37"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496103"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3229556.3229557"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736748"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.98"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2633522"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00026"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2766165"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2786343"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10933-6_15"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057196"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2545559"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3286688"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873600"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2388357"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2053053"},{"key":"ref199","first-page":"1","article-title":"On the accuracy of appliance identification based on distributed load metering data","author":"reinhardt","year":"2012","journal-title":"Proceedings of the 2nd IFIP Conference on Sustainable Internet and ICT for Sustainability (SustainIT 2012)"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2017.03.107"},{"key":"ref195","first-page":"1","article-title":"Architecting the smart grid as a holarchy","author":"negeri","year":"2012","journal-title":"Proc 1st Int Conf Smart Grids Green IT Syst"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2013.11"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-012-0368-0"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2017.2940972"},{"key":"ref190","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2655691","article-title":"Urban sensing using mobile phone network data: A survey of research","volume":"47","author":"calabrese","year":"2015","journal-title":"ACM Comput Surv"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/1133373.1133390"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2787"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.79"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2931"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2013.6686530"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29003-4_2"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.111411.00016"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218569"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA.2012.115"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/502251.502257"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3213344.3213348"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6685754"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2532863"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00021"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3130242.3131494"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3007748.3007777"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2935620.2935625"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2706308"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.36"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/EECEA.2016.7470780"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2511002"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2015.7177778"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016212"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134446"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1145\/3301418.3313944"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030126"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4539481"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600238CM"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787504"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389148"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00009"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689254"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700105"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210319"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1145\/1410043.1410054"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1145\/1102219.1102223"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488188"},{"key":"ref217","first-page":"715","article-title":"Diagnosing New York City&#x2019;s noises with ubiquitous data","author":"zheng","year":"2014","journal-title":"Proc ACM Int Joint Conf Pervasive Ubiquitous Comput (UbiComp)"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1145\/3007748.3018286"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1145\/2968456.2974004"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799707"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2017.8094194"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.83"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23126-6_10"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2016.7790356"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2704"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/RIOT.2015.7104901"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.07.009"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88351-7_16"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2018.00039"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452271"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6963800"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"ref124","first-page":"459","article-title":"ClickOS and the art of network function virtualization","author":"martins","year":"2014","journal-title":"Proc 11th USENIX Symp Netw Syst Design Implement (NSDI)"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.60"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/2187671.2187677"},{"key":"ref130","first-page":"101","article-title":"Event processing across edge and the cloud for Internet of Things applications","author":"govindarajan","year":"2014","journal-title":"Proc 20th Int Conf Manage Data"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3213344.3213345"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2015.7414055"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2266895"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.3641638"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2016.7501719"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038485"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2013.26"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2015.7134091"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2012.147"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.403"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7293299"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2013.77"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1145\/3210284.3210291"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45145-9_9"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405527"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2896115"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2607178"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2016.38"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/3229556.3229562"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.22"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/507670.507674"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/NetGames.2012.6404024"},{"key":"ref143","first-page":"1","article-title":"Exploiting Google&#x2019;s edge network for massively multiplayer online games","author":"plumb","year":"2018","journal-title":"Proc 2nd IEEE Int Conf Fog Edge Comput (ICFEC)"},{"key":"ref2","first-page":"323","article-title":"Global analytics in the face of bandwidth and regulatory constraints","author":"vulimiri","year":"2015","journal-title":"Proc USENIX Symp Netw Syst Design Implem (NSDI)"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422518"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2967360.2967369"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/NetGames.2014.7008957"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767608"},{"key":"ref243","first-page":"176","article-title":"Cloud-based video monitoring framework: An approach based on software-defined networking for addressing scalability problems","author":"sandar","year":"2014","journal-title":"Proc Web Inf Syst Eng (WISE)"},{"key":"ref244","first-page":"24","article-title":"Internet of Things for energy efficiency of buildings","volume":"2","author":"casini","year":"2014","journal-title":"Int Sci J Archit Eng"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.2"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.3390\/su10113832"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2016.2590100"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500391"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1145\/3132479.3132488"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2818932"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2841836"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2016.39"},{"key":"ref107","first-page":"93","article-title":"COMET: Code offload by migrating execution transparently","author":"gordon","year":"2012","journal-title":"Proc of USENIX Symp on Operating Systems Design and Implementation (OSDI)"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.06.011"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134463"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3126501"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0496-9"},{"key":"ref102","first-page":"1","article-title":"Energy efficiency of mobile clients in cloud computing","author":"miettinen","year":"2010","journal-title":"Proc of 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud)"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2018.00031"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700175"},{"key":"ref110","first-page":"1","article-title":"A microservice store for efficient edge offloading","author":"gedeon","year":"2019","journal-title":"Proc IEEE Global Commun Conf (GLOBECOM)"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2017.49"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2855198"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2017.02.011"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2827920"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2793350"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258103"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2879579"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1007\/s00502-016-0438-2"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.3390\/s18061731"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-90740-6_10"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.3390\/s18082674"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849256"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobicase.2014.257757"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2015.22"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref16","first-page":"1","article-title":"Fog computing: Current research and future challenges","author":"gedeon","year":"2018","journal-title":"Proc of 1 GI\/ITG KuVs Fachgespr&#x00E4;che Fog Computing"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3094405.3094412"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.02.009"},{"key":"ref117","first-page":"30:30","article-title":"Unikernels: Rise of the virtual library operating system","volume":"11","author":"madhavapeddy","year":"2014","journal-title":"Distrib Comput"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCBD.2015.54"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.069"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2015.35"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2016.7523584"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451167"},{"key":"ref115","first-page":"199","article-title":"CNTR: Lightweight OS containers","author":"thalheim","year":"2018","journal-title":"Proc USENIX Annu Tech Conf (ATC)"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35279-4_17"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/NetSys.2017.7903963"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700908"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2017.7973408"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1016\/j.agsy.2017.01.023"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2015.67"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2017.54"},{"key":"ref264","first-page":"1784","article-title":"Big data, big questions|this one does not go up to 11: The quantified self movement as an alternative big data practice","volume":"8","author":"nafus","year":"2014","journal-title":"Int J Commun"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.3390\/jpm2030093"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815588768"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08877785.pdf?arnumber=8877785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T19:40:54Z","timestamp":1628624454000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8877785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":293,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2948399","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}