{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:43:37Z","timestamp":1762782217388,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["8-1645-1-289"],"award-info":[{"award-number":["8-1645-1-289"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1145\/3264844.3264848","type":"proceedings-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T13:19:23Z","timestamp":1539263963000},"page":"33-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Delay Tolerant Computing"],"prefix":"10.1145","author":[{"given":"Mohammad","family":"Aazam","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Doha, Qatar"}]},{"given":"Khaled A.","family":"Harras","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Doha, Qatar"}]},{"given":"Ali E.","family":"Elgazar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Doha, Qatar"}]}],"member":"320","published-online":{"date-parts":[[2018,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon EC2 Pricing. https:\/\/aws.amazon.com\/ec2\/pricing\/ on-demand\/. {Online; accessed 13-March-2018}.  Amazon EC2 Pricing. https:\/\/aws.amazon.com\/ec2\/pricing\/ on-demand\/. {Online; accessed 13-March-2018}."},{"key":"e_1_3_2_1_2_1","unstructured":"Average file sizes today. http:\/\/filecatalyst.com\/ todays-media-file-sizes-whats-average\/. {Online; accessed 13- March-2018}.  Average file sizes today. http:\/\/filecatalyst.com\/ todays-media-file-sizes-whats-average\/. {Online; accessed 13- March-2018}."},{"key":"e_1_3_2_1_3_1","unstructured":"The Price Of Electricity In Your State. https:\/\/www.npr.org\/sections\/ money\/2011\/10\/27\/141766341\/the-price-of-electricity-in-your-state. {Online; accessed 13-March-2018}.  The Price Of Electricity In Your State. https:\/\/www.npr.org\/sections\/ money\/2011\/10\/27\/141766341\/the-price-of-electricity-in-your-state. {Online; accessed 13-March-2018}."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Aazam M. Zeadally S. and Harras K. A. Fog computing architecture evaluation and future research directions. IEEE Communications Magazine (2018).  Aazam M. Zeadally S. and Harras K. A. Fog computing architecture evaluation and future research directions. IEEE Communications Magazine (2018).","DOI":"10.1109\/MCOM.2018.1700707"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746285.2755969"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2016.7733000"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4082-y"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806262"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2018.00012"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950047"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.12"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132211.3134455"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Hasan R. Hossain M. and Khan R. Aura: An incentive-driven adhoc iot cloud framework for proximal mobile computation offloading. Future Generation Computer Systems (2017).  Hasan R. Hossain M. and Khan R. Aura: An incentive-driven adhoc iot cloud framework for proximal mobile computation offloading. Future Generation Computer Systems (2017).","DOI":"10.1016\/j.future.2017.11.024"},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"ICCCN","author":"Ibrahim M.","year":"2017"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1551609.1551624"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"e_1_3_2_1_17_1","unstructured":"Luan T. H. Gao L. Li Z. Xiang Y. Wei G. and Sun L. Fog computing: Focusing on mobile users at the edge. arXiv preprint arXiv:1502.01815 (2015).  Luan T. H. Gao L. Li Z. Xiang Y. Wei G. and Sun L. Fog computing: Focusing on mobile users at the edge. arXiv preprint arXiv:1502.01815 (2015)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038406"},{"key":"e_1_3_2_1_19_1","unstructured":"Obar J. A. and Clement A. Internet surveillance and boomerang routing: A call for canadian network sovereignty.  Obar J. A. and Clement A. Internet surveillance and boomerang routing: A call for canadian network sovereignty."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055031.3055078"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP.2017.8168153"}],"event":{"name":"MobiCom '18: The 24th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"New Delhi India","acronym":"MobiCom '18"},"container-title":["Proceedings of the 13th Workshop on Challenged Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264844.3264848","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264844.3264848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:58Z","timestamp":1750212478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264844.3264848"}},"subtitle":["The Untapped Potential"],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":21,"alternative-id":["10.1145\/3264844.3264848","10.1145\/3264844"],"URL":"https:\/\/doi.org\/10.1145\/3264844.3264848","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]},"assertion":[{"value":"2018-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}