{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T03:43:07Z","timestamp":1765165387823,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/iscc.2018.8538612","type":"proceedings-article","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T20:49:31Z","timestamp":1542660571000},"page":"00366-00372","source":"Crossref","is-referenced-by-count":20,"title":["Energy-efficient Offloading Policy for Resource Allocation in Distributed Mobile Edge Computing"],"prefix":"10.1109","author":[{"given":"Chang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chongwu","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Jinghui","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Xiaoxing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wushao","family":"Wen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","volume":"2","author":"rappaport","year":"1996","journal-title":"Wireless Communications Principles and Practice"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/49.414651"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566921"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2597169"},{"key":"ref14","first-page":"147","author":"k -h","year":"2009","journal-title":"Solving the maximum cardinality bin packing problem with a weight annealing-based algorithm"},{"key":"ref15","first-page":"48","article-title":"Equilibrium points in n-person games","volume":"36","author":"nash","year":"1950"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2307\/1969529"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1660950"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1006\/game.1996.0044"},{"key":"ref19","first-page":"372","author":"han","year":"2012","journal-title":"Game Theory in Wireless and Communication Networks Theory Models and Applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2013.6612005"},{"article-title":"Mobile edge computing-introductory technical white paper","year":"2014","author":"etsi","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2478718"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541539"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2015.2448520"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.2334709"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"}],"event":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2018,6,25]]},"location":"Natal","end":{"date-parts":[[2018,6,28]]}},"container-title":["2018 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8510755\/8538441\/08538612.pdf?arnumber=8538612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T10:43:19Z","timestamp":1643280199000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8538612\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iscc.2018.8538612","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}