{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:42Z","timestamp":1750221282813,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T00:00:00Z","timestamp":1510012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,7]]},"DOI":"10.1145\/3144457.3144496","type":"proceedings-article","created":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T12:22:08Z","timestamp":1534854128000},"page":"196-204","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards an Analysis of Traffic Shaping and Policing in Fog Networks Using Stochastic Fluid Models"],"prefix":"10.1145","author":[{"given":"Jiaojiao","family":"Jiang","sequence":"first","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Australia"}]},{"given":"Longxiang","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Australia"}]},{"given":"Jiong","family":"Jin","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Australia"}]},{"given":"Tom H.","family":"Luan","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Integrated Networks Services, Xidian University, China"}]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Australia"}]},{"given":"Dong","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Electrical and Information Engineering, University of Sydney, Australia"}]},{"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Australia"}]},{"given":"Dongfeng","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Shandong University, China"}]}],"member":"320","published-online":{"date-parts":[[2017,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1982.tb03089.x"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.141214"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.1991.188640"},{"volume-title":"The Cambridge dictionary of statistics","author":"Everitt Brian","key":"e_1_3_2_1_5_1","unstructured":"Brian Everitt and Anders Skrondal . 2002. The Cambridge dictionary of statistics . Vol. 106 . Cambridge University Press Cambridge . Brian Everitt and Anders Skrondal. 2002. The Cambridge dictionary of statistics. Vol. 106. Cambridge University Press Cambridge."},{"volume-title":"Fog computing and its applications in 5g. In 5G Mobile Communications","author":"Gao Longxiang","key":"e_1_3_2_1_6_1","unstructured":"Longxiang Gao , Tom H Luan , Bo Liu , Wanlei Zhou , and Shui Yu. 2017. Fog computing and its applications in 5g. In 5G Mobile Communications . Springer , 571--593. Longxiang Gao, Tom H Luan, Bo Liu, Wanlei Zhou, and Shui Yu. 2017. Fog computing and its applications in 5g. In 5G Mobile Communications. Springer, 571--593."},{"key":"e_1_3_2_1_7_1","first-page":"225","article-title":"FogRoute: DTN-based data dissemination model in fog computing","volume":"4","author":"Gao Longxiang","year":"2017","unstructured":"Longxiang Gao , Tom H Luan , Shui Yu , Wanlei Zhou , and Bo Liu . 2017 . FogRoute: DTN-based data dissemination model in fog computing . IEEE Internet of Things Journal 4 , 1 (2017), 225 -- 235 . Longxiang Gao, Tom H Luan, Shui Yu, Wanlei Zhou, and Bo Liu. 2017. FogRoute: DTN-based data dissemination model in fog computing. IEEE Internet of Things Journal 4, 1 (2017), 225--235.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_8_1","volume-title":"Fog computing: Focusing on mobile users at the edge. arXiv preprint arXiv:1502.01815","author":"Luan Tom H","year":"2015","unstructured":"Tom H Luan , Longxiang Gao , Zhi Li , Yang Xiang , Guiyi Wei , and Limin Sun . 2015. Fog computing: Focusing on mobile users at the edge. arXiv preprint arXiv:1502.01815 ( 2015 ). Tom H Luan, Longxiang Gao, Zhi Li, Yang Xiang, Guiyi Wei, and Limin Sun. 2015. Fog computing: Focusing on mobile users at the edge. arXiv preprint arXiv:1502.01815 (2015)."},{"key":"e_1_3_2_1_9_1","first-page":"187","article-title":"The leaky bucketpolicing method in the ATM (Asynchronous Transfer Mode) network","volume":"3","author":"Niestegge Gerd","year":"1990","unstructured":"Gerd Niestegge . 1990 . The leaky bucketpolicing method in the ATM (Asynchronous Transfer Mode) network . International Journal of Communication Systems 3 , 2 (1990), 187 -- 197 . Gerd Niestegge. 1990. The leaky bucketpolicing method in the ATM (Asynchronous Transfer Mode) network. International Journal of Communication Systems 3, 2 (1990), 187--197.","journal-title":"International Journal of Communication Systems"},{"key":"e_1_3_2_1_10_1","unstructured":"Ben Noble James W Daniel etal 1988. Applied linear algebra. Vol. 3. Prentice-Hall New Jersey.  Ben Noble James W Daniel et al. 1988. Applied linear algebra. Vol. 3. Prentice-Hall New Jersey."},{"key":"e_1_3_2_1_11_1","volume-title":"Use of coefficient of variation in assessing variability of quantitative assays. Clinical and diagnostic laboratory immunology 9, 6","author":"Reed George F","year":"2002","unstructured":"George F Reed , Freyja Lynn , and Bruce D Meade . 2002. Use of coefficient of variation in assessing variability of quantitative assays. Clinical and diagnostic laboratory immunology 9, 6 ( 2002 ), 1235--1239. George F Reed, Freyja Lynn, and Bruce D Meade. 2002. Use of coefficient of variation in assessing variability of quantitative assays. Clinical and diagnostic laboratory immunology 9, 6 (2002), 1235--1239."},{"volume-title":"Broadband integrated networks","author":"Schwartz Mischa","key":"e_1_3_2_1_12_1","unstructured":"Mischa Schwartz . 1996. Broadband integrated networks . Vol. 19 . Prentice Hall PTR New Jersey . Mischa Schwartz. 1996. Broadband integrated networks. Vol. 19. Prentice Hall PTR New Jersey."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.1994.577075"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3485"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1986.1092946"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"e_1_3_2_1_17_1","first-page":"82","article-title":"Performance limitation of leaky bucket algorithm for usage parameter control and bandwidth allocation methods","volume":"75","author":"Yamanaka Naoaki","year":"1992","unstructured":"Naoaki Yamanaka , Youichi Sato , and Ken-Ichi Sato . 1992 . Performance limitation of leaky bucket algorithm for usage parameter control and bandwidth allocation methods . IEICE Transactions on Communications 75 , 2 (1992), 82 -- 86 . Naoaki Yamanaka, Youichi Sato, and Ken-Ichi Sato. 1992. Performance limitation of leaky bucket algorithm for usage parameter control and bandwidth allocation methods. IEICE Transactions on Communications 75, 2 (1992), 82--86.","journal-title":"IEICE Transactions on Communications"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2659460.2659464"}],"event":{"name":"MobiQuitous 2017: Computing, Networking and Services","sponsor":["EAI The European Alliance for Innovation","SIGMM ACM Special Interest Group on Multimedia"],"location":"Melbourne VIC Australia","acronym":"MobiQuitous 2017"},"container-title":["Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3144457.3144496","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3144457.3144496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:22Z","timestamp":1750212682000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3144457.3144496"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,7]]},"references-count":18,"alternative-id":["10.1145\/3144457.3144496","10.1145\/3144457"],"URL":"https:\/\/doi.org\/10.1145\/3144457.3144496","relation":{},"subject":[],"published":{"date-parts":[[2017,11,7]]},"assertion":[{"value":"2017-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}