{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:36:12Z","timestamp":1761129372188,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/iccomm.2016.7528203","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T14:27:58Z","timestamp":1470407278000},"page":"337-340","source":"Crossref","is-referenced-by-count":12,"title":["Future Vehicular networks: What control technologies?"],"prefix":"10.1109","author":[{"given":"Silviu-Andrei","family":"Lazar","sequence":"first","affiliation":[]},{"given":"Carmen-Elenea","family":"Stefan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10"},{"key":"ref11","article-title":"FOG Computing and Its Real Time Applications","author":"peter","year":"2015","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2413247.2413283"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140467"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1201\/b19779"},{"article-title":"Unlocking Network Value: Service Innovation in the Era of SDN","year":"2013","author":"chappell","key":"ref15"},{"key":"ref16","article-title":"Fog Computing","author":"patil","year":"0","journal-title":"College of Engineering and Technology"},{"article-title":"Smart Vehicles, Technologies and Main Applications in Vehicular Ad hoc_-Networks","year":"0","author":"vegni","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/745303"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1161064.1161080"},{"key":"ref6","article-title":"5G Mobile Technology between Requirements and Real Life Deployment","author":"pantelimon","year":"0","journal-title":"Politehnica University of Bucharest IJFCC"},{"key":"ref5","article-title":"Security challenges, issues and their solution for vanet","volume":"5","author":"raw","year":"2013","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.15439\/2014F503"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref2","first-page":"103","article-title":"Towards Software-Defined VANET","author":"ku","year":"2014","journal-title":"Ad Hoc Networking Workshop (Med-Hoc-Net)"},{"year":"0","key":"ref1"},{"key":"ref9","article-title":"Review of implementing Fog Computing","author":"more","year":"2015","journal-title":"International Journal of Research in Engineering and Technology"}],"event":{"name":"2016 International Conference on Communications (COMM)","start":{"date-parts":[[2016,6,9]]},"location":"Bucharest, Romania","end":{"date-parts":[[2016,6,10]]}},"container-title":["2016 International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7522608\/7528195\/07528203.pdf?arnumber=7528203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,25]],"date-time":"2016-09-25T22:12:15Z","timestamp":1474841535000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7528203\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2016.7528203","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}