{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:46:39Z","timestamp":1730285199934,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/netsoft.2018.8459971","type":"proceedings-article","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T21:43:41Z","timestamp":1536875021000},"page":"80-87","source":"Crossref","is-referenced-by-count":12,"title":["Load Profiling and Migration for Effective Cyber Foraging in Disaster Scenarios with FORMICA"],"prefix":"10.1109","author":[{"given":"Agnese V.","family":"Ventrella","sequence":"first","affiliation":[]},{"given":"Flavio","family":"Esposito","sequence":"additional","affiliation":[]},{"given":"L. Alfredo","family":"Grieco","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/BF02033314"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925927"},{"journal-title":"Probability and Statistics with Reliability Queuing and Computer Science Applications","year":"2002","author":"trivedi","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/331605.331606"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IC2EW.2016.28"},{"key":"ref15","article-title":"BRITE: An Approach to Universal Topology Generation","author":"medina","year":"2001","journal-title":"MASCOTS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2016.15"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"ref19","first-page":"93","article-title":"Comet: Code offload by migrating execution transparently","volume":"12","author":"gordon","year":"2012","journal-title":"OSDI"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.111411.00016"},{"key":"ref3","first-page":"7","article-title":"Elastic urban video surveillance system using edge computing","author":"wang","year":"2017","journal-title":"Proceedings of the Workshop on Smart Internet of Things"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2017.8115808"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2016.15"},{"key":"ref8","first-page":"19","article-title":"A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets","volume":"18","author":"satyanarayanan","year":"2015","journal-title":"ACM Mobile Computing and Communication"},{"journal-title":"FORMICA source code","year":"2017","key":"ref7"},{"journal-title":"Mobile edge computing Survey and research outlook","year":"2017","author":"mao","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCO.2016.7727082"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2013.77"},{"key":"ref20","first-page":"589","article-title":"Throughput maximization for online request admissions in mobile cloudlets","author":"xia","year":"2013","journal-title":"38th Annual IEEE Conference on Local Computer Networks"},{"key":"ref22","article-title":"Cloud computing overview with load balancing techniques","volume":"65","author":"sahu","year":"2013","journal-title":"International Journal of Computer Applications"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2737628"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2009.350"}],"event":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","start":{"date-parts":[[2018,6,25]]},"location":"Montreal, QC","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8429968\/8458492\/08459971.pdf?arnumber=8459971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T10:56:49Z","timestamp":1643194609000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8459971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/netsoft.2018.8459971","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}