{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:50:07Z","timestamp":1725673807239},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/wcnc.2014.6952953","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T09:59:19Z","timestamp":1416995959000},"page":"2982-2987","source":"Crossref","is-referenced-by-count":5,"title":["Operator centric mobile cloud architecture"],"prefix":"10.1109","author":[{"given":"Jacques Bou","family":"Abdo","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Demerjian","sequence":"additional","affiliation":[]},{"given":"Hakima","family":"Chaouchi","sequence":"additional","affiliation":[]},{"given":"Kabalan","family":"Barbar","sequence":"additional","affiliation":[]},{"given":"Guy","family":"Pujolle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307658"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.98"},{"key":"16","article-title":"Broker-based cross-cloud federation manager","author":"bou abdo","year":"0","journal-title":"The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) IEEE"},{"year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2016598.2016600"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1999916.1999926"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.023"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1810931.1810937"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"journal-title":"Hyrax Cloud Computing on Mobile Devices Using MapReduce","year":"2009","author":"marinelli","key":"10"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"journal-title":"Exploiting Rich Mobile Environments","year":"2005","author":"cheng","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1810931.1810937"}],"event":{"name":"2014 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2014,4,6]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2014,4,9]]}},"container-title":["2014 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6923023\/6951847\/06952953.pdf?arnumber=6952953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:17:35Z","timestamp":1490307455000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6952953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2014.6952953","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}