{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:39:29Z","timestamp":1761745169013,"version":"3.37.3"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"National Key Research and Development Program Cyberspace Security Special","award":["2016YFB0801605"],"award-info":[{"award-number":["2016YFB0801605"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61521003"],"award-info":[{"award-number":["61521003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2976858","type":"journal-article","created":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T22:16:57Z","timestamp":1582841817000},"page":"41649-41658","source":"Crossref","is-referenced-by-count":10,"title":["Toward Latency-Optimal Placement and Autoscaling of Monitoring Functions in MEC"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0932-2404","authenticated-orcid":false,"given":"Quan","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Xinsheng","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Hongbo","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"You","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"708","article-title":"Resource monitoring policy for network virtualization environment","volume":"36","author":"jiang","year":"2014","journal-title":"J Electron Inf Technol"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.jnca.2017.09.009","article-title":"An algorithm for network and data-aware placement of multi-tier applications in cloud data centers","volume":"98","author":"ferdaus","year":"2017","journal-title":"J Netw Comput Appl"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2017.12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2867587"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647590"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2800400"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806631"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869955"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.7000967"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1126\/science.153.3731.34"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2652850"},{"key":"ref3","first-page":"4","article-title":"Multi-access edge computing: An overview of ETSI MEC ISG","volume":"1","author":"giust","year":"2017","journal-title":"IEEE 5G Tech Focus"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600935"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2598420"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.04.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"journal-title":"Next Generation Mobile Networks White paper","first-page":"1","year":"2015","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647858"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-CPSCom.2010.137"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566944"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2671867"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1996.493353"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2016.0028"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09016063.pdf?arnumber=9016063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T18:48:19Z","timestamp":1643309299000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9016063\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2976858","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}