{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:50:30Z","timestamp":1767581430382,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T00:00:00Z","timestamp":1671753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,23]]},"DOI":"10.1145\/3590837.3590934","type":"proceedings-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T18:36:51Z","timestamp":1685471811000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["CFES: Cloud, Fog, Edge Computing Simulators"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2096-3088","authenticated-orcid":false,"given":"Amit Kumar Singh","family":"Sanger","sequence":"first","affiliation":[{"name":"University School of Information, Communication &amp; Technology (USICT), SWINGER (Security, Wireless, IoT, Network Group of Engineering and Research), India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7675-8550","authenticated-orcid":false,"given":"Rahul","family":"Johari","sequence":"additional","affiliation":[{"name":"University School of Information, Communication &amp; Technology (USICT), SWINGER (Security, Wireless, IoT, Network Group of Engineering and Research), India"}]}],"member":"320","published-online":{"date-parts":[[2023,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2016.2619369"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2018.3191268"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi11030055"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0086-3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1063\/5.0109181"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.07.002"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-04802-"},{"key":"e_1_3_2_1_8_1","volume-title":"Edge computing vs. fog computing: Definitions and enterprise uses. (2018). Retrieved","author":"Linthicum David","year":"2020","unstructured":"David Linthicum. 2018. Edge computing vs. fog computing: Definitions and enterprise uses. (2018). Retrieved January 3, 2020 from https:\/\/www.cisco.com\/c\/en\/us\/solutions\/enterprisenetworks\/edge-computing.html."},{"key":"e_1_3_2_1_9_1","unstructured":"OpenFog Reference Architecture for Fog Computing. Retrieved August 27 2017 from https:\/\/www.iiconsortium.org\/pdf\/OpenFog_Reference_Architecture_2_09_17.pdf"},{"volume-title":"Retrieved","year":"2017","key":"e_1_3_2_1_10_1","unstructured":"Dickson, Ben. 2017. \"How fog computing pushes IoT intelligence to the edge.\" Crunch Network (2017). Retrieved November 04, 2016 from https:\/\/techcrunch.com\/2016\/08\/02\/how-fog-computing-pushes-iot-intelligence-to-the-edge\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.07.004"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.08.040Jim"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi11030055"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-1012-8_34"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2018.07.006"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-39863-7_5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.995"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/fwc.2017.8368525"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100391"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2174\/2666255813999201002152003"}],"event":{"name":"ICIMMI 2022: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2022","location":"Jaipur India"},"container-title":["Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590934","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590837.3590934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:46:18Z","timestamp":1767581178000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590934"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,23]]},"references-count":20,"alternative-id":["10.1145\/3590837.3590934","10.1145\/3590837"],"URL":"https:\/\/doi.org\/10.1145\/3590837.3590934","relation":{},"subject":[],"published":{"date-parts":[[2022,12,23]]},"assertion":[{"value":"2023-05-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}