{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T00:59:29Z","timestamp":1768093169202,"version":"3.49.0"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61872175"],"award-info":[{"award-number":["61872175"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20181252"],"award-info":[{"award-number":["BK20181252"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["14380060"],"award-info":[{"award-number":["14380060"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Collaborative Innovation Center of Novel Software Technology and Industrialization"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/tnet.2020.2989307","type":"journal-article","created":{"date-parts":[[2020,5,6]],"date-time":"2020-05-06T20:08:04Z","timestamp":1588795684000},"page":"1684-1697","source":"Crossref","is-referenced-by-count":10,"title":["Provably Efficient Resource Allocation for Edge Service Entities Using Hermes"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6581-6399","authenticated-orcid":false,"given":"Sheng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yu","family":"Liang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1773-0942","authenticated-orcid":false,"given":"Jidong","family":"Ge","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7852-0282","authenticated-orcid":false,"given":"Mingjun","family":"Xiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3472-1717","authenticated-orcid":false,"given":"Jie","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","volume":"58","author":"fujishige","year":"2005","journal-title":"Submodular Functions and Optimization"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281239"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2307849.2307858"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155524"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230574"},{"key":"ref30","first-page":"377","article-title":"Live video analytics at scale with approximation and delay-tolerance","author":"zhang","year":"2017","journal-title":"Proc NSDI"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020958815308"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2685578"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848036"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2480075"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/BF01588971"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"ref12","first-page":"93","article-title":"COMET: Code offload by migrating execution transparently","author":"gordon","year":"2012","journal-title":"Proc of ODSI"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195845"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486403"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486422"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486269"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486411"},{"key":"ref18","year":"2018"},{"key":"ref19","article-title":"Energy-efficient resource allocation for mobile-edge computation offloading (Extended Version)","author":"you","year":"2016","journal-title":"arXiv 1605 08518"},{"key":"ref28","author":"vazirani","year":"2004","journal-title":"Approximation Algorithms"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1810931.1810937"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2952097"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486241"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524497"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA\/IUCC.2017.00049"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594383"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2366735"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464451"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057116"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999603"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS47876.2019.00066"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486305"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2785305"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485977"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3084451"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524411"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934908"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2915218"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524340"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935173"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/9169972\/09088284.pdf?arnumber=9088284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:42:25Z","timestamp":1651070545000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9088284\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":45,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2020.2989307","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8]]}}}