{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T02:14:34Z","timestamp":1776910474445,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T00:00:00Z","timestamp":1540425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSW Industry and Community Engagement SEED Program BOOST 2018"},{"name":"University of Sydney DVC Research\/Bridging Support Grant."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,25]]},"DOI":"10.1145\/3242102.3242107","type":"proceedings-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T19:34:05Z","timestamp":1540582445000},"page":"127-136","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["sFog"],"prefix":"10.1145","author":[{"given":"Wei","family":"Bao","sequence":"first","affiliation":[{"name":"University of Sydney, Sydney, Australia"}]},{"given":"Dong","family":"Yuan","sequence":"additional","affiliation":[{"name":"University of Sydney, Sydney, Australia"}]},{"given":"Zhengjie","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Sydney, Sydney, Australia"}]},{"given":"Shen","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Sydney, Sydney, Australia"}]},{"given":"Bing","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Sydney, Sydney, Australia"}]},{"given":"Stewart","family":"Adams","sequence":"additional","affiliation":[{"name":"Chur Technologies Proprietary Limited, Sydney, Australia"}]},{"given":"Albert","family":"Zomaya","sequence":"additional","affiliation":[{"name":"University of Sydney, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2018,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.64"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700363"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of IEEE PIMRC","author":"Becvar Z.","unstructured":"Z. Becvar , J. Plachy , and P. Mach . 2014. Path selection using handover in mobile networks with cloud-enabled small cells . In Proc. of IEEE PIMRC . Washington, DC. Z. Becvar, J. Plachy, and P. Mach. 2014. Path selection using handover in mobile networks with cloud-enabled small cells. In Proc. of IEEE PIMRC. Washington, DC."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.464716"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134445"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of IEEE INFOCOM","author":"Chen Y.C.","year":"2012","unstructured":"Y.C. Chen , J. Kurose , and D Towsley . 2012 . A Mixed Queueing Network Model of Mobility in a Campus Wireless Network . In Proc. of IEEE INFOCOM . Orlando, FL. Y.C. Chen, J. Kurose, and D Towsley. 2012. A Mixed Queueing Network Model of Mobility in a Campus Wireless Network. In Proc. of IEEE INFOCOM. Orlando, FL."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134453"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2006.1576541"},{"key":"e_1_3_2_1_11_1","volume-title":"Ross","author":"Kurose Jim F.","year":"2012","unstructured":"Jim F. Kurose and Keith W . Ross . 2012 . Computer Networking : A Top-Down Approach (sixth ed.). Pearson . Jim F. Kurose and Keith W. Ross. 2012. Computer Networking: A Top-Down Approach (sixth ed.). Pearson."},{"key":"e_1_3_2_1_12_1","volume-title":"Probability, Statistics, and Random Processes For Electrical Engineering","author":"Leon-Garcia Alberto","unstructured":"Alberto Leon-Garcia . 2008. Probability, Statistics, and Random Processes For Electrical Engineering ( third ed.). Prentice Hall . Alberto Leon-Garcia. 2008. Probability, Statistics, and Random Processes For Electrical Engineering (third ed.). Prentice Hall."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134460"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"e_1_3_2_1_16_1","volume-title":"Stochastic Network Optimization with Application to Communication and Queueing Systems","author":"Neely Michael J.","unstructured":"Michael J. Neely . 2010. Stochastic Network Optimization with Application to Communication and Queueing Systems . Morgan & Claypool Publishers . Michael J. Neely. 2010. Stochastic Network Optimization with Application to Communication and Queueing Systems . Morgan & Claypool Publishers."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247385"},{"key":"e_1_3_2_1_18_1","unstructured":"Antonio L. Maia Neto and others. AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle.  Antonio L. Maia Neto and others. AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057164"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-2361-4"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.486807"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.907072"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511131"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831252"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6616110"},{"key":"e_1_3_2_1_26_1","unstructured":"T. Taleb A. Ksentini and P. Frangoudis. 2017. Follow-Me Cloud: When Cloud Services Follow Mobile Users. IEEE Trans. on Cloud Computing Vol. PP 99 (2017).  T. Taleb A. Ksentini and P. Frangoudis. 2017. Follow-Me Cloud: When Cloud Services Follow Mobile Users. IEEE Trans. on Cloud Computing Vol. PP 99 (2017)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2604814"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. of IFIP Networking Conference (IFIP Networking)","author":"Wang S.","unstructured":"S. Wang , R. Urgaonkar , M. Zafer , T. He , K. Chan , and K. K. Leung . 2015. Dynamic service migration in mobile edge-clouds . Proc. of IFIP Networking Conference (IFIP Networking) . Toulouse, France. S. Wang, R. Urgaonkar, M. Zafer, T. He, K. Chan, and K. K. Leung. 2015. Dynamic service migration in mobile edge-clouds. Proc. of IFIP Networking Conference (IFIP Networking). Toulouse, France."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-006-7326-7"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.70776"}],"event":{"name":"MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","location":"Montreal QC Canada","acronym":"MSWIM '18","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242107","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3242102.3242107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:35Z","timestamp":1750207415000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242107"}},"subtitle":["Seamless Fog Computing Environment for Mobile IoT Applications"],"short-title":[],"issued":{"date-parts":[[2018,10,25]]},"references-count":30,"alternative-id":["10.1145\/3242102.3242107","10.1145\/3242102"],"URL":"https:\/\/doi.org\/10.1145\/3242102.3242107","relation":{},"subject":[],"published":{"date-parts":[[2018,10,25]]},"assertion":[{"value":"2018-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}