{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:19:49Z","timestamp":1769282389440,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/glocom.2017.8254591","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T17:50:54Z","timestamp":1516038654000},"page":"1-6","source":"Crossref","is-referenced-by-count":21,"title":["Availability-Aware Mobile Edge Application Placement in 5G Networks"],"prefix":"10.1109","author":[{"given":"He","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Changcheng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045400"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2627585.2627592"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.02.093"},{"key":"ref13","author":"bellur","year":"2010","journal-title":"Optimal Placement Algorithms for Virtual Machines"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40047-6_33"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2015.7390454"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014205"},{"key":"ref17","author":"lee","year":"0","journal-title":"Resource Management in Service Chaining"},{"key":"ref18","author":"cassen","year":"2002","journal-title":"Keepalived Health checking for lvs & high availability"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-010-9566-0"},{"key":"ref4","author":"kevin brown","year":"0","journal-title":"Edge computing needs reliability"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2654119"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249413"},{"key":"ref5","article-title":"Mobile edge computing: A taxonomy","author":"beck","year":"2014","journal-title":"Proc of the Sixth International Conference on Advances in Future Internet"},{"key":"ref8","article-title":"Mobile Edge Computing (MEC); Framework and Reference Architecture","year":"2016","journal-title":"ETSI GS MEC 003 V1 1 1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7116178"},{"key":"ref2","article-title":"Mobile edge computinga key technology towards 5g","volume":"11","author":"hu","year":"2015","journal-title":"ETSI White Paper"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"ref9","article-title":"Network Function Virtualisation(NFV); Architectural Framework","year":"2013","journal-title":"ETSI GS NFV-PER 002 v1 1 1"}],"event":{"name":"2017 IEEE Global Communications Conference (GLOBECOM 2017)","location":"Singapore","start":{"date-parts":[[2017,12,4]]},"end":{"date-parts":[[2017,12,8]]}},"container-title":["GLOBECOM 2017 - 2017 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253768\/8253909\/08254591.pdf?arnumber=8254591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T19:13:08Z","timestamp":1519067588000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8254591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/glocom.2017.8254591","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}