{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T02:44:28Z","timestamp":1761965068713,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/icsenst.2018.8603663","type":"proceedings-article","created":{"date-parts":[[2019,1,23]],"date-time":"2019-01-23T21:49:59Z","timestamp":1548280199000},"page":"263-268","source":"Crossref","is-referenced-by-count":13,"title":["Towards the Distributed Edge \u2013 An IoT Review"],"prefix":"10.1109","author":[{"given":"Jeff","family":"McCann","sequence":"first","affiliation":[]},{"given":"Liam","family":"Quinn","sequence":"additional","affiliation":[]},{"given":"Sean","family":"McGrath","sequence":"additional","affiliation":[]},{"given":"Eoin","family":"O'Connell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"What Edge Computing Means for Infrastructure and Operations Leaders","year":"2017","author":"van der mullen","key":"ref39"},{"journal-title":"Mist Computing Linking Cloudlet to Fogs","year":"2017","author":"uehara","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14738\/jbemi.24.1309"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOTA.2017.8073629"},{"journal-title":"Evolving Computer Architectures","year":"2017","author":"preden","key":"ref31"},{"key":"ref30","article-title":"A Review on the Challenges and Growth of Cloudlets","author":"panda","year":"2013","journal-title":"International Journal of Engineering Research and Technology"},{"key":"ref37","first-page":"29","volume":"12","author":"tran","year":"2017","journal-title":"IEEE COMSOC MMTC Commun Front"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1186\/2193-1801-3-S1-K2"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.74"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2303071"},{"journal-title":"The Internet of Things","year":"2010","author":"chui","key":"ref10"},{"journal-title":"Finding your way in the fog Towards a comprehensive definition of fog computing","year":"2014","author":"vaquero","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECONW.2015.7328145"},{"journal-title":"Machine learning heterogeneous edge device method and system","year":"2016","author":"clayton","key":"ref12"},{"journal-title":"Edge core and cloud Where all the workloads go","year":"2017","author":"fulton","key":"ref13"},{"journal-title":"Gartner Internet Growth","year":"2017","author":"gartner","key":"ref14"},{"journal-title":"Understand the Azure IoT Edge runtime and its architecture - preview","year":"2018","author":"gremban","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref17","article-title":"A scalable and manageable IoT architecture based on transparent computing","author":"guo","year":"2017","journal-title":"Journal of Parallel and Distributed Computing"},{"journal-title":"Mobile Edge Computing A key technology towards 5G 06921 Sophia Antipolis CEDEX","year":"2015","author":"hu","key":"ref18"},{"journal-title":"Semantic virtualization for Edge-IoT cloud issues and challenges","year":"2017","author":"jang","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2017.7937703"},{"journal-title":"Private vs Public Cloud Why the supposed debate is really no debate at all","year":"0","author":"bliesner","key":"ref4"},{"key":"ref27","article-title":"Edge-centric Computing: Vision and Challenges","volume":"45","author":"lopez","year":"2015","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2006.881997"},{"journal-title":"Private vs Public Cloud Debate Continues","year":"2013","author":"bowen","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2007.75"},{"key":"ref5","first-page":"13","author":"bonomi","year":"2012","journal-title":"Fog Computing and its Role in the Internet of Things"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43352-2_2"},{"key":"ref2","first-page":"7","article-title":"That &#x2018;internet of things&#x2019; thing","volume":"22","author":"ashton","year":"2011","journal-title":"RFID Journal"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2017.8001570"},{"key":"ref1","article-title":"Cloud of things &#x2013; Integrating IoTs with cloud","author":"aazam","year":"2015","journal-title":"International Journal of Sensor Networks and Data Communications"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14445\/23488387\/IJCSE-V4I7P104"},{"journal-title":"Determination of training set size for a machine learning system","year":"2010","author":"jin","key":"ref20"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7437031"},{"journal-title":"Fog Computing and Mobile Edge Cloud Gain Momentum Open Fog Consortium Etsi Mec and Cloudlets","year":"2015","author":"klas","key":"ref22"},{"key":"ref21","first-page":"133","article-title":"A Distributed Security Mechanism for Resource-Constrained IoT Devices","volume":"40","author":"king","year":"2016","journal-title":"Informatica (Lithuan Academy of Sciences)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.12"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.44"},{"key":"ref41","first-page":"97","article-title":"Internet of robotic things: converging sensing\/actuating, hypoconnectivity, artificial intelligence and IoT Platforms","author":"vermesan","year":"2017","journal-title":"Cognitive Hyperconnected Digital Transformation Internet of Things Intelligence Evolution"},{"journal-title":"Adaptive latency-aware query processing in IoT networks","year":"2016","author":"kotamsetty","key":"ref23"},{"journal-title":"Methods and apparatus for communicating time and latency sensitive information","year":"2002","author":"williams","key":"ref44"},{"key":"ref26","first-page":"1373","article-title":"Distributed security management for the IoT","author":"lincke","year":"2015","journal-title":"Immunotechnology"},{"key":"ref43","first-page":"3829","article-title":"Design of a Low-Latency","author":"weiner","year":"2014","journal-title":"High-Reliability Wireless Communication System for Control Applications s l s n"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.06.011"}],"event":{"name":"2018 12th International Conference on Sensing Technology (ICST)","start":{"date-parts":[[2018,12,4]]},"location":"Limerick","end":{"date-parts":[[2018,12,6]]}},"container-title":["2018 12th International Conference on Sensing Technology (ICST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8589964\/8603546\/08603663.pdf?arnumber=8603663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:25:14Z","timestamp":1598221514000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8603663\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/icsenst.2018.8603663","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}