{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T04:32:15Z","timestamp":1769661135731,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T00:00:00Z","timestamp":1694995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T00:00:00Z","timestamp":1694995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,18]]},"DOI":"10.1109\/fmec59375.2023.10306090","type":"proceedings-article","created":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T13:51:37Z","timestamp":1699451497000},"page":"254-261","source":"Crossref","is-referenced-by-count":9,"title":["NebulOuS: A Meta-Operating System with Cloud Continuum Brokerage Capabilities"],"prefix":"10.1109","author":[{"given":"Yiannis","family":"Verginadis","sequence":"first","affiliation":[{"name":"Athens University of Economics and Business,Greece"}]},{"given":"Christos-Alexandros","family":"Sarros","sequence":"additional","affiliation":[{"name":"Ubitech,Greece"}]},{"given":"Mario Reyes","family":"de Los Mozos","sequence":"additional","affiliation":[{"name":"Eurecat Technological Centre,Spain"}]},{"given":"Simeon","family":"Veloudis","sequence":"additional","affiliation":[{"name":"South-East European Research Centre,Greece"}]},{"given":"Rados\u0142aw","family":"Piliszek","sequence":"additional","affiliation":[{"name":"University of Bia&#x0142;ystok,Poland"}]},{"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[{"name":"Telefonica Research,Spain"}]},{"given":"Geir","family":"Horn","sequence":"additional","affiliation":[{"name":"University of Oslo,Norway"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2890784"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103384"},{"key":"ref15","author":"atlas","year":"0","journal-title":"Drives Applications through the Fog"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.36"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3274657"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-015-0042-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0178-3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22726-4_47"},{"key":"ref17","article-title":"Eclipse Foundation Zenoh","year":"0","journal-title":"zenoh The zero network overhead protocol"},{"key":"ref16","year":"0","journal-title":"FIWARE FogFlow"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3142856"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EDGE55608.2022.00018"},{"key":"ref24","first-page":"202","article-title":"Negative selection algorithm based intrusion detection model","author":"tosin","year":"0","journal-title":"IEEE Mediterranean Electrotechnical Conference (MELECON)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3326066"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61350-092-7.ch005"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.294161"},{"key":"ref20","article-title":"Topology and orchestration specification for cloud applications (tosca)","author":"palma","year":"2013","journal-title":"OASIS Tech Rep"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79382-1_27"},{"key":"ref21","author":"rossini","year":"2017","journal-title":"The cloud application modelling and execution language (camel)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2927341"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-06369-9_4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47474-8_18"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2017.62"},{"key":"ref9","year":"0","journal-title":"GSMA Open Gateway APIs"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2011.99"},{"key":"ref3","article-title":"An Architecture for Autonomous Proactive and Polymorphic Optimization of Cloud Applications","volume":"451","author":"r\u00f3?a?ska","year":"0","journal-title":"Advanced Information Networking and Applications AINA 2022 Lecture Notes in Networks and Systems"},{"key":"ref6","year":"0","journal-title":"What Edge Computing Means for Infrastructure and Operations Leaders"},{"key":"ref5","year":"0","journal-title":"Cisco Annual Internet Report (2018&#x2013;2023)"}],"event":{"name":"2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC)","location":"Tartu, Estonia","start":{"date-parts":[[2023,9,18]]},"end":{"date-parts":[[2023,9,20]]}},"container-title":["2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10305711\/10305726\/10306090.pdf?arnumber=10306090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T14:22:55Z","timestamp":1702304575000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10306090\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,18]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/fmec59375.2023.10306090","relation":{},"subject":[],"published":{"date-parts":[[2023,9,18]]}}}