{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:40:03Z","timestamp":1766137203433},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/cfec.2019.8733149","type":"proceedings-article","created":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T22:05:19Z","timestamp":1560204319000},"page":"1-6","source":"Crossref","is-referenced-by-count":18,"title":["Edge-to-Edge Resource Discovery using Metadata Replication"],"prefix":"10.1109","author":[{"given":"Ilir","family":"Murturi","sequence":"first","affiliation":[]},{"given":"Cosmin","family":"Avasalcai","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Tsigkanos","sequence":"additional","affiliation":[]},{"given":"Schahram","family":"Dustdar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803126"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2358296"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061964"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DSDIS.2015.115"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.022021657"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700030"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-319-06160-3_2","article-title":"Smart and digital city: A systematic literature review","author":"cocchia","year":"2014","journal-title":"Smart City"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00502-018-0612-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref15","first-page":"949","article-title":"Service modelling for the internet of things","author":"de","year":"2011","journal-title":"2011 Federated Conference on Computer Science and Information Systems (FedCSIS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2184751.2184810"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383071"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45518-3_18"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2532863"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389112"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2002.1039766"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.145"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.03.006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2016.7423332"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.52"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/PERCOM.2019.8767395","article-title":"Poet: Privacy on the edge with bidirectional data transformations","author":"li","year":"2019","journal-title":"2019 IEEE International Conference on Pervasive Computing and Communications PerCom 2019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.09.013"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457097"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref1","article-title":"Inferring analyzable models from trajectories of spatially-distributed internet-of-things","author":"tsigkanos","year":"2019","journal-title":"1th IEEE\/ACM International Symposium on Software Engineering for Adaptive and Self-Managing Systems SEAMS ICSE 2019"},{"article-title":"Tapestry: An infrastructure for fault-tolerant wide-area location and routing","year":"2001","author":"zhao","key":"ref20"},{"year":"0","key":"ref22"},{"year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767381"},{"year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1651263.1651271"},{"year":"0","key":"ref25"}],"event":{"name":"2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC)","start":{"date-parts":[[2019,5,14]]},"location":"Larnaca, Cyprus","end":{"date-parts":[[2019,5,17]]}},"container-title":["2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8730889\/8733137\/08733149.pdf?arnumber=8733149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T02:45:22Z","timestamp":1663641922000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8733149\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/cfec.2019.8733149","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}