{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:26:58Z","timestamp":1773840418179,"version":"3.50.1"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003803","name":"University of Hong Kong","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003803","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796718","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:49Z","timestamp":1655759929000},"page":"1809-1818","source":"Crossref","is-referenced-by-count":24,"title":["Schedule or Wait: Age-Minimization for IoT Big Data Processing in MEC via Online Learning"],"prefix":"10.1109","author":[{"given":"Zichuan","family":"Xu","sequence":"first","affiliation":[{"name":"Dalian University of Technology,School of Software,Dalian,China,116621"}]},{"given":"Wenhao","family":"Ren","sequence":"additional","affiliation":[{"name":"Dalian University of Technology,School of Software,Dalian,China,116621"}]},{"given":"Weifa","family":"Liang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science,Hong Kong"}]},{"given":"Wenzheng","family":"Xu","sequence":"additional","affiliation":[{"name":"Sichuan University,College of Computer Science,Chengdu,China,610065"}]},{"given":"Qiufen","family":"Xia","sequence":"additional","affiliation":[{"name":"Dalian University of Technology,International School of Information Science and Engineering,Dalian,China,116621"}]},{"given":"Pan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology,Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering,Wuhan,China,430074"}]},{"given":"Mingchu","family":"Li","sequence":"additional","affiliation":[{"name":"Dalian University of Technology,School of Software,Dalian,China,116621"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3339186.3339207"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59419-0_48"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/TNET.2019.2946481","article-title":"Optimizing information freshness in wireless networks under general interference constraints","volume":"28","author":"talak","year":"2019","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2019.000035"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2019.8902529"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1561\/9781680836219"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2976013"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2954825"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155238"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2996237"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787505"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3240508.3240642"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155420"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1109\/TII.2017.2738841","article-title":"Optimal decision making for big data processing at edge-cloud environment: an SDN perspective","volume":"14","author":"aujla","year":"2017","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804090"},{"key":"ref20","article-title":"AoI and throughput tradeoffs in touting-aware multi-hop wireless networks","author":"lou","year":"2020","journal-title":"Proc of INFOCOM"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.11.001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209602"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2899754"},{"key":"ref23","article-title":"Virtual extensible local area network (VXLAN): a framework for overlaying virtualized layer 2 networks over layer 3 networks. RFC 7348, IETF","author":"mahalingam","year":"0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624176"},{"key":"ref25","year":"0"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.06.015"},{"key":"ref51","year":"0"},{"key":"ref10","year":"0"},{"key":"ref11","year":"0","journal-title":"Enhanced data freshness Google Analytics"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS50907.2020.00027"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2936759"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987580"},{"key":"ref14","article-title":"Deep reinforcement learning for online computation offloading in wireless powered mobile-edge computing networks","author":"huang","year":"2019","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2988013"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2019.8927944"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2018.2878584"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155514"},{"key":"ref19","article-title":"Bohr: similarity aware geo-distributed data analytics","author":"li","year":"2017","journal-title":"Open Access Media"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943193"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2912159"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3313276.3316303"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155261"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996722"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737497"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2018.8446018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2018.00034"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3304112.3325612"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2936015"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845223"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS49365.2020.9213056"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2473174"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2921337"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2998100"},{"key":"ref43","article-title":"Proactive and intelligent evaluation of big data queries in edge clouds with materialized views","author":"xia","year":"2021","journal-title":"Computer Networks"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","location":"London, United Kingdom","start":{"date-parts":[[2022,5,2]]},"end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796718.pdf?arnumber=9796718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T20:01:30Z","timestamp":1657569690000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796718","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}