{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:44:36Z","timestamp":1773247476902,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,5,4]],"date-time":"2015-05-04T00:00:00Z","timestamp":1430697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,4]]},"DOI":"10.1145\/2737182.2737188","type":"proceedings-article","created":{"date-parts":[[2015,4,22]],"date-time":"2015-04-22T15:50:56Z","timestamp":1429717856000},"page":"53-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["A Catalog of Architectural Tactics for Cyber-Foraging"],"prefix":"10.1145","author":[{"given":"Grace A.","family":"Lewis","sequence":"first","affiliation":[{"name":"Carnegie Mellon Software Engineering Institute, Pittsburgh, PA, USA"}]},{"given":"Patricia","family":"Lago","sequence":"additional","affiliation":[{"name":"VU University Amsterdam, Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2015,5,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ubiquitous Computing, and Dependable Applications (JoWUA), 4:1--17","author":"Angin P.","year":"2013","unstructured":"P. Angin and B. Bhargava . An agent-based optimization framework for mobile-cloud computing. Journal of Wireless Mobile Networks , Ubiquitous Computing, and Dependable Applications (JoWUA), 4:1--17 , 2013 . P. Angin and B. Bhargava. An agent-based optimization framework for mobile-cloud computing. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 4:1--17, 2013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134680.1134687"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644927"},{"key":"e_1_3_2_1_4_1","volume-title":"Pattern-oriented Software Architecture: A System of Patterns","author":"Buschmann F.","year":"1996","unstructured":"F. Buschmann , R. Meunier , H. Rohnert , P. Sommerlad , and M. Stal . Pattern-oriented Software Architecture: A System of Patterns . John Wiley & Sons, Inc. , New York, NY, USA , 1996 . F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad, and M. Stal. Pattern-oriented Software Architecture: A System of Patterns. John Wiley & Sons, Inc., New York, NY, USA, 1996."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855568.1855576"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000027"},{"key":"e_1_3_2_1_8_1","volume-title":"Synthesis Lectures on Mobile and Pervasive Computing","author":"Flinn J.","year":"2012","unstructured":"J. Flinn . Cyber foraging: Bridging mobile and cloud computing . In M. Satyanarayanan, editor, Synthesis Lectures on Mobile and Pervasive Computing . Morgan & Claypool Publishers , 2012 . J. Flinn. Cyber foraging: Bridging mobile and cloud computing. In M. Satyanarayanan, editor, Synthesis Lectures on Mobile and Pervasive Computing. Morgan & Claypool Publishers, 2012."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings 2nd USENIX Conference on File and Storage Technologies (FAST03)","author":"Flinn J.","year":"2003","unstructured":"J. Flinn , S. Sinnamohideen , N. Tolia , and M. Satyanarayanan . Data staging on untrusted surrogates . In Proceedings 2nd USENIX Conference on File and Storage Technologies (FAST03) , Mar 31 - Apr 2, 2003 , San Francisco, CA., 2003. J. Flinn, S. Sinnamohideen, N. Tolia, and M. Satyanarayanan. Data staging on untrusted surrogates. In Proceedings 2nd USENIX Conference on File and Storage Technologies (FAST03), Mar 31-Apr 2, 2003, San Francisco, CA., 2003."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.4018\/jghpc.2011040102"},{"key":"e_1_3_2_1_13_1","volume-title":"Master's thesis","author":"Imai S.","year":"2012","unstructured":"S. Imai . Task offloading between smartphones and distributed computational resources. Master's thesis , Rensselaer Polytechnic Institute , 2012 . S. Imai. Task offloading between smartphones and distributed computational resources. Master's thesis, Rensselaer Polytechnic Institute, 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-29336-8_4","volume-title":"Mobile Computing, Applications, and Services","author":"Kemp R.","year":"2012","unstructured":"R. Kemp , N. Palmer , T. Kielmann , and H. Bal . Cuckoo: a computation offloading framework for smartphones . In Mobile Computing, Applications, and Services , pages 59 -- 79 . Springer , 2012 . R. Kemp, N. Palmer, T. Kielmann, and H. Bal. Cuckoo: a computation offloading framework for smartphones. In Mobile Computing, Applications, and Services, pages 59--79. Springer, 2012."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195845"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2012.171"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.98"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09970-5_15"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2064942.2064951"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40276-0_12"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/98.943998"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2444776.2444789"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4427231"}],"event":{"name":"CompArch '15: Federated Events on Component-Based Software Engineering and Software Architecture","location":"Montr\u00e9al QC Canada","acronym":"CompArch '15","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\DATC IEEE Computer Society"]},"container-title":["Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2737182.2737188","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2737182.2737188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:11Z","timestamp":1750225691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2737182.2737188"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,4]]},"references-count":21,"alternative-id":["10.1145\/2737182.2737188","10.1145\/2737182"],"URL":"https:\/\/doi.org\/10.1145\/2737182.2737188","relation":{},"subject":[],"published":{"date-parts":[[2015,5,4]]},"assertion":[{"value":"2015-05-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}