{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T20:50:40Z","timestamp":1773262240266,"version":"3.50.1"},"reference-count":144,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T00:00:00Z","timestamp":1671062400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2023,7,31]]},"abstract":"<jats:p>Fog computing, as a distributed paradigm, offers cloud-like services at the edge of the network with low latency and high-access bandwidth to support a diverse range of IoT application scenarios. To fully utilize the potential of this computing paradigm, scalable, adaptive, and accurate scheduling mechanisms and algorithms are required to efficiently capture the dynamics and requirements of users, IoT applications, environmental properties, and optimization targets. This article presents a taxonomy of recent literature on scheduling IoT applications in Fog computing. Based on our new classification schemes, current works in the literature are analyzed, research gaps of each category are identified, and respective future directions are described.<\/jats:p>","DOI":"10.1145\/3544836","type":"journal-article","created":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T13:26:06Z","timestamp":1655904366000},"page":"1-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":93,"title":["Scheduling IoT Applications in Edge and Fog Computing Environments: A Taxonomy and Future Directions"],"prefix":"10.1145","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7178-3386","authenticated-orcid":false,"given":"Mohammad","family":"Goudarzi","sequence":"first","affiliation":[{"name":"The University of Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3635-4252","authenticated-orcid":false,"given":"Marimuthu","family":"Palaniswami","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9754-6496","authenticated-orcid":false,"given":"Rajkumar","family":"Buyya","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2022,12,15]]},"reference":[{"key":"e_1_3_3_2_2","unstructured":"Business Insider. 2020. The Internet of Things 2020. Retrieved from https:\/\/www.businessinsider.com\/internet-of-things-report."},{"key":"e_1_3_3_3_2","unstructured":"IDC. 2020. IoT Growth Demands Rethink of Long-Term Storage Strategies. Retrieved from https:\/\/www.idc.com\/getdoc.jsp?containerId=prAP46737220."},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.057"},{"key":"e_1_3_3_5_2","article-title":"Advanced optimization technique for scheduling IoT tasks in cloud-fog computing environments","author":"Elaziz Mohamed Abd","year":"2021","unstructured":"Mohamed Abd Elaziz, Laith Abualigah, and Ibrahim Attiya. 2021. Advanced optimization technique for scheduling IoT tasks in cloud-fog computing environments. Fut. Gen. Comput. Syst. 124 (2021), 142\u2013154.","journal-title":"Fut. Gen. Comput. Syst."},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.102994"},{"key":"e_1_3_3_7_2","article-title":"A comprehensive survey on nature-inspired algorithms and their applications in edge computing: Challenges and future directions","author":"Adhikari Mainak","year":"2021","unstructured":"Mainak Adhikari, Satish Narayana Srirama, and Tarachand Amgoth. 2021. A comprehensive survey on nature-inspired algorithms and their applications in edge computing: Challenges and future directions. Softw. Pract. Exper. 52, 4 (2021), 1004\u20131034.","journal-title":"Softw. Pract. Exper."},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5220"},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2959772"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2702013"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2950937"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3099731"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3089338"},{"key":"e_1_3_3_14_2","first-page":"e3824","article-title":"Resource allocation through logistic regression and multicriteria decision making method in IoT fog computing","author":"Bashir Hayat","year":"2019","unstructured":"Hayat Bashir, Seonah Lee, and Kyong Hoon Kim. 2019. Resource allocation through logistic regression and multicriteria decision making method in IoT fog computing. Trans. Emerg. Telecommun. Technol. 33, 2 (2019), e3824.","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"e_1_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108361"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.995"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2945956"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2826544"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2876279"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3119948"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3091508"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"e_1_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460866.3461768"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2970698"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.10.007"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2018.8580724"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3048613"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3128037"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.060"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2984134"},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3028575"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-019-09491-1"},{"key":"e_1_3_3_33_2","article-title":"Resource management in edge and fog computing using FogBus2 framework","author":"Goudarzi Mohammad","year":"2021","unstructured":"Mohammad Goudarzi, Qifan Deng, and Rajkumar Buyya. 2021. Resource management in edge and fog computing using FogBus2 framework. arXiv preprint arXiv:2108.00591 (2021).","journal-title":"arXiv preprint arXiv:2108.00591"},{"key":"e_1_3_3_34_2","first-page":"660","volume-title":"Proceedings of the 8th International Symposium on Telecommunications (IST)","author":"Goudarzi Mohammad","year":"2016","unstructured":"Mohammad Goudarzi, Zeinab Movahedi, and Masoud Nazari. 2016. Mobile cloud computing: A multisite computation offloading. In Proceedings of the 8th International Symposium on Telecommunications (IST). IEEE, 660\u2013665."},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102407"},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.15439\/2021F005"},{"key":"e_1_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3123165"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2967041"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2873002"},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2509"},{"key":"e_1_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983253"},{"key":"e_1_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2953806"},{"key":"e_1_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3130255"},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3043736"},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3326066"},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2926979"},{"key":"e_1_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484436"},{"key":"e_1_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2893925"},{"key":"e_1_3_3_50_2","article-title":"An efficient online computation offloading approach for large-scale mobile edge computing via deep reinforcement learning","author":"Hu Zheyuan","year":"2021","unstructured":"Zheyuan Hu, Jianwei Niu, Tao Ren, Bin Dai, Qingfeng Li, Mingliang Xu, and Sajal K. Das. 2021. An efficient online computation offloading approach for large-scale mobile edge computing via deep reinforcement learning. IEEE Trans. Serv. Comput. 15, 2 (2021), 669\u2013683.","journal-title":"IEEE Trans. Serv. Comput."},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2928811"},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1177-x"},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2018.10.003"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19061446"},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975741"},{"key":"e_1_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-021-00930-0"},{"key":"e_1_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103008"},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN52437.2021.9463602"},{"key":"e_1_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICFEC50348.2020.00010"},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-805395-9.00001-0"},{"key":"e_1_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3094322"},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08714-7"},{"key":"e_1_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2704100"},{"key":"e_1_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2901850"},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102781"},{"key":"e_1_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101970"},{"key":"e_1_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3119200"},{"key":"e_1_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885747"},{"key":"e_1_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.019"},{"key":"e_1_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2981557"},{"key":"e_1_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3105325"},{"key":"e_1_3_3_72_2","article-title":"IFogSim2: An extended iFogSim simulator for mobility, clustering, and microservice management in edge and fog computing environments","author":"Mahmud Redowan","year":"2021","unstructured":"Redowan Mahmud, Samodha Pallewatta, Mohammad Goudarzi, and Rajkumar Buyya. 2021. IFogSim2: An extended iFogSim simulator for mobility, clustering, and microservice management in edge and fog computing environments. arXiv preprint arXiv:2109.05636 (2021).","journal-title":"arXiv preprint arXiv:2109.05636"},{"key":"e_1_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3186592"},{"key":"e_1_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3403955"},{"key":"e_1_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.03.004"},{"key":"e_1_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2952412"},{"key":"e_1_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108146"},{"key":"e_1_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100091"},{"key":"e_1_3_3_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3085527"},{"key":"e_1_3_3_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3022699"},{"key":"e_1_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2961905"},{"key":"e_1_3_3_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2890685"},{"key":"e_1_3_3_83_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2906790"},{"key":"e_1_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2771153"},{"key":"e_1_3_3_85_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.09.009"},{"key":"e_1_3_3_86_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102972"},{"key":"e_1_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2815015"},{"key":"e_1_3_3_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/SCC53864.2021.00065"},{"key":"e_1_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2692960"},{"key":"e_1_3_3_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869954"},{"key":"e_1_3_3_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3344341.3368800"},{"key":"e_1_3_3_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3132175"},{"key":"e_1_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3079110"},{"key":"e_1_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3067732"},{"key":"e_1_3_3_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3057266"},{"key":"e_1_3_3_96_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2018.09.009"},{"key":"e_1_3_3_97_2","doi-asserted-by":"publisher","DOI":"10.1145\/3301443"},{"key":"e_1_3_3_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD53861.2021.00085"},{"key":"e_1_3_3_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2894437"},{"key":"e_1_3_3_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3042599"},{"key":"e_1_3_3_101_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00721-7"},{"key":"e_1_3_3_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/3391196"},{"key":"e_1_3_3_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2973800"},{"key":"e_1_3_3_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3075988"},{"key":"e_1_3_3_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3104324"},{"key":"e_1_3_3_106_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-018-9437-3"},{"key":"e_1_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107496"},{"key":"e_1_3_3_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2019.00033"},{"key":"e_1_3_3_109_2","doi-asserted-by":"publisher","DOI":"10.3390\/info10060191"},{"key":"e_1_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760478"},{"key":"e_1_3_3_111_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2021.06.005"},{"key":"e_1_3_3_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3101460"},{"key":"e_1_3_3_113_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7051-9"},{"key":"e_1_3_3_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3036871"},{"key":"e_1_3_3_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3011208"},{"key":"e_1_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3106746"},{"key":"e_1_3_3_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3128603"},{"key":"e_1_3_3_118_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3017079"},{"key":"e_1_3_3_119_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.04.050"},{"key":"e_1_3_3_120_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imu.2021.100619"},{"key":"e_1_3_3_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3012410"},{"key":"e_1_3_3_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908263"},{"key":"e_1_3_3_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3131040"},{"key":"e_1_3_3_124_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3014896"},{"key":"e_1_3_3_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3025985"},{"key":"e_1_3_3_126_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2957804"},{"key":"e_1_3_3_127_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2916577"},{"key":"e_1_3_3_128_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2970550"},{"key":"e_1_3_3_129_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3012509"},{"key":"e_1_3_3_130_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.02.014"},{"key":"e_1_3_3_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2891695"},{"key":"e_1_3_3_132_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22971-9_32"},{"key":"e_1_3_3_133_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986615"},{"key":"e_1_3_3_134_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.055"},{"key":"e_1_3_3_135_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3093452"},{"key":"e_1_3_3_136_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2990630"},{"key":"e_1_3_3_137_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2900530"},{"key":"e_1_3_3_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2890603"},{"key":"e_1_3_3_139_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2888481"},{"issue":"1","key":"e_1_3_3_140_2","first-page":"1","article-title":"COVID-X: Novel health-fog framework based on neutrosophic classifier for confrontation Covid-19","volume":"35","author":"Yasser Ibrahim","year":"2020","unstructured":"Ibrahim Yasser, Abeer Twakol, Abd El-Khalek, Ahmed Samrah, A. A. Salama, et\u00a0al. 2020. COVID-X: Novel health-fog framework based on neutrosophic classifier for confrontation Covid-19. Neutros. Sets Syst. 35, 1 (2020), 1.","journal-title":"Neutros. Sets Syst."},{"key":"e_1_3_3_141_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.02.009"},{"key":"e_1_3_3_142_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.059"},{"key":"e_1_3_3_143_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3076687"},{"key":"e_1_3_3_144_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3036390"},{"key":"e_1_3_3_145_2","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2018.8397129"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544836","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:06Z","timestamp":1750186806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544836"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,15]]},"references-count":144,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,7,31]]}},"alternative-id":["10.1145\/3544836"],"URL":"https:\/\/doi.org\/10.1145\/3544836","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,15]]},"assertion":[{"value":"2022-01-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-14","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-12-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}