{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:06:49Z","timestamp":1772122009714,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/ifipnetworking.2015.7145315","type":"proceedings-article","created":{"date-parts":[[2015,7,6]],"date-time":"2015-07-06T21:28:09Z","timestamp":1436218089000},"page":"1-9","source":"Crossref","is-referenced-by-count":57,"title":["Cloudlet network design optimization"],"prefix":"10.1109","author":[{"given":"Alberto","family":"Ceselli","sequence":"first","affiliation":[]},{"given":"Marco","family":"Premoli","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Secci","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1942268.1942279"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566903"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2342468.2342470"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254834"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2014.012114.130517"},{"key":"ref15","article-title":"PACAO: Protocol Architecture for Cloud Access Optimization","author":"raad","year":"2015","journal-title":"Proc of IEEE NETSOFT 2015"},{"key":"ref16","article-title":"Using Carrier Ethernet to Backhaul LTE","author":"howard","year":"2011","journal-title":"Infonetics Research White Paper"},{"key":"ref17","article-title":"LTE backhauling deployment scenarios","author":"alvarez","year":"2011","journal-title":"White Paper MGMN Alliance"},{"key":"ref18","article-title":"Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies","author":"nadiv","year":"2010","journal-title":"Ceragon White Paper"},{"key":"ref19","article-title":"Architectural Considerations for Backhaul of 2G\/3G and Long Term Evolution Networks","year":"2010","journal-title":"Cisco white paper"},{"key":"ref28","article-title":"Mobile-Edge Computing Introductory Technical White Paper","author":"patel","year":"0","journal-title":"European Telecommunications Standards Institute"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2012.6199858"},{"key":"ref27","article-title":"Mobile Gaming","author":"bahl","year":"0","journal-title":"MobiGames 2012 Keynote Speech"},{"key":"ref3","year":"2014","journal-title":"Elijah project (website)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2012.23"},{"key":"ref29","year":"2014","journal-title":"ANR ABCD Project"},{"key":"ref5","article-title":"The impact of mobile multimedia applications on data center consolidation","author":"ha","year":"0","journal-title":"Proc of IC2E 2013 IEEE"},{"key":"ref8","article-title":"On delivering embarrassingly distributed cloud services","author":"church","year":"2008","journal-title":"Proc Of Hotnets"},{"key":"ref7","article-title":"An Architecture for Modular Data Centers","author":"hamilton","year":"2007","journal-title":"Proc of CIDR"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2013.75"},{"key":"ref9","year":"2014","journal-title":"Myoonet project (website)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref20","article-title":"Live migration of virtual machines","author":"clark","year":"2015","journal-title":"Proc of USENIX NSDI"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496103"},{"key":"ref21","article-title":"KVM live migration","year":"0","journal-title":"Chapt 5 Red Hat Enterprise Linux 6 Virtualization Administration Guide"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21726-5_9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.017"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2013.06.010"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10852-005-9022-1"}],"event":{"name":"2015 IFIP Networking Conference (IFIP Networking)","location":"Toulouse, France","start":{"date-parts":[[2015,5,20]]},"end":{"date-parts":[[2015,5,22]]}},"container-title":["2015 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7128766\/7145285\/07145315.pdf?arnumber=7145315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:08:50Z","timestamp":1490378930000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7145315\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ifipnetworking.2015.7145315","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}