{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:12:49Z","timestamp":1774541569216,"version":"3.50.1"},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100010661","name":"European Union\u2019s Horizon 2020 Research and Innovation Programme","doi-asserted-by":"publisher","award":["957218 (Project IntellIoT)"],"award-info":[{"award-number":["957218 (Project IntellIoT)"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Green Commun. Netw."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/tgcn.2021.3138792","type":"journal-article","created":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T21:04:19Z","timestamp":1640725459000},"page":"629-644","source":"Crossref","is-referenced-by-count":18,"title":["Learning, Computing, and Trustworthiness in Intelligent IoT Environments: Performance-Energy Tradeoffs"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2708-645X","authenticated-orcid":false,"given":"Beatriz","family":"Soret","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0161-3055","authenticated-orcid":false,"given":"Lam D.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Seeger","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1181-3897","authenticated-orcid":false,"given":"Arne","family":"Broring","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4481-8168","authenticated-orcid":false,"given":"Chaouki Ben","family":"Issaid","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2382-1982","authenticated-orcid":false,"given":"Sumudu","family":"Samarakoon","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5012-2370","authenticated-orcid":false,"given":"Anis El","family":"Gabli","sequence":"additional","affiliation":[]},{"given":"Vivek","family":"Kulkarni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0261-0171","authenticated-orcid":false,"given":"Mehdi","family":"Bennis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6195-4797","authenticated-orcid":false,"given":"Petar","family":"Popovski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600398CM"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800543"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2984887"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09228-7"},{"key":"ref5","article-title":"Lean ICT\u2014Towards digital sobriety","year":"2019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/S3S.2015.7333500"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2778504"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700906"},{"key":"ref9","volume-title":"Mobile-edge computing introductory technical white paper","author":"Patel","year":"2014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1218-y"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2917084"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2018.8446044"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2970550"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700202"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3022751"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600510CM"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2019.2948591"},{"key":"ref20","volume-title":"Radio resource control (RRC); protocol specification, v9. 3.0","year":"2010"},{"key":"ref21","article-title":"Federated learning: Strategies for improving communication efficiency","volume-title":"Proc. NIPS Workshop PMPML","author":"Kone\u010dn\u00fd"},{"key":"ref22","article-title":"Applied federated learning: Improving google keyboard query suggestions","author":"Yang","year":"2018","journal-title":"arXiv:1812.02903"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2956472"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref25","first-page":"4424","article-title":"Federated multi-task learning","volume-title":"Proc. NIPS","author":"Smith"},{"key":"ref26","article-title":"Peer-to-peer federated learning on graphs","author":"Lalitha","year":"2019","journal-title":"arXiv: 1901.11173"},{"key":"ref27","article-title":"Federated learning with non-IID data","author":"Zhao","year":"2018","journal-title":"arXiv::1806.00582"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2944481"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3017377"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037194"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_1"},{"key":"ref32","article-title":"Local differential privacy and its applications: A comprehensive survey","author":"Yang","year":"2020","journal-title":"arXiv:2008.03686"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322199"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3078783"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2944169"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120649"},{"key":"ref37","article-title":"Towards federated learning at scale: System design","author":"Bonawitz","year":"2019","journal-title":"arXiv:1902.01046"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2952051"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2999852"},{"key":"ref40","article-title":"Lag: Lazily aggregated gradient for communication-efficient distributed learning","author":"Chen","year":"2018","journal-title":"arXiv:1805.09965"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2161027"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500613"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICC47138.2019.9123209"},{"issue":"76","key":"ref44","first-page":"1","article-title":"GADMM: Fast and communication efficient framework for distributed machine learning","volume":"21","author":"Elgabli","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref45","article-title":"Communication efficient distributed learning with censored, quantized, and generalized group ADMM","author":"Issaid","year":"2020","journal-title":"arXiv:2009.06459"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.129"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.011"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845499"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2015.2448520"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2739804"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CIOT.2016.7872914"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2933267.2933312"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3386361"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842685"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000116"},{"key":"ref56","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"key":"ref57","first-page":"1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"Wood","year":"2014"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3051923"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.011791712"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0982-x"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1533261"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2918467"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2836144"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900180"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1561\/9781601984616"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3026398"},{"key":"ref68","volume-title":"UCI machine learning repository (2020)","author":"Dua","year":"2017"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2019.8815402"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2946245"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.2989580"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/7.1.24"},{"key":"ref73","volume-title":"SIMATIC Box IPC","year":"2021"},{"key":"ref74","volume-title":"ENC28J60\u2014Stand-Alone Ethernet Controller with SPI Interface","year":"2012"},{"key":"ref75","article-title":"Power consumption of WLAN network elements","author":"Chiaravalloti","year":"2011"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881533"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-12-812458-1.00001-0"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2377121"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0871-9"}],"container-title":["IEEE Transactions on Green Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7511293\/9714516\/09663530.pdf?arnumber=9663530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:37:25Z","timestamp":1704847045000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9663530\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":79,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tgcn.2021.3138792","relation":{},"ISSN":["2473-2400"],"issn-type":[{"value":"2473-2400","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}