{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:45:26Z","timestamp":1766486726342,"version":"3.41.0"},"reference-count":50,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62102445 and 62002369"],"award-info":[{"award-number":["62102445 and 62002369"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2023,11,30]]},"abstract":"<jats:p>\n            Opportunistic Mobile Edge Cloud in which opportunistically connected mobile devices run in a cooperative way to augment the capability of a single device has become a timely and essential topic due to its widespread prospect under resource-constrained scenarios (e.g., disaster rescue). Because of the mobility of devices and the uncertainty of environments, it is inevitable that failures occur among the mobile nodes. Being different from existing studies that mainly focus on either data offloading or computing offloading among mobile devices in an ideal environment, we concentrate on how to guarantee the reliability of the task execution with the consideration of both data offloading and computing offloading under opportunistically connected mobile edge cloud. To this end, an optimization of mobile task offloading when considering reliability is formulated. Then, we propose a probabilistic model for task offloading and a reliability model for task execution, which estimates the probability of successful execution for a specific opportunistic path and describes the dynamic reliability of the task execution. Based on these models, a heuristic algorithm\n            <jats:italic>UNION<\/jats:italic>\n            (Fa\n            <jats:bold>u<\/jats:bold>\n            lt-Tolera\n            <jats:bold>n<\/jats:bold>\n            t Cooperat\n            <jats:bold>i<\/jats:bold>\n            ve C\n            <jats:bold>o<\/jats:bold>\n            mputi\n            <jats:bold>n<\/jats:bold>\n            g) is proposed to solve this NP-hard problem. Theoretical analysis shows that the complexity of\n            <jats:italic>UNION<\/jats:italic>\n            is \ud835\udcaa(|\u2110|\n            <jats:sup>2<\/jats:sup>\n            +|\ud835\udca9|) with guaranteeing the reliability of 0.99. Also, extensive experiments on real-world traces validate the superiority of the proposed algorithm\n            <jats:italic>UNION<\/jats:italic>\n            over existing typical strategies.\n          <\/jats:p>","DOI":"10.1145\/3617994","type":"journal-article","created":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T11:33:24Z","timestamp":1695209604000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["UNION: Fault-tolerant Cooperative Computing in Opportunistic Mobile Edge Cloud"],"prefix":"10.1145","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6359-4203","authenticated-orcid":false,"given":"Wenhua","family":"Xiao","sequence":"first","affiliation":[{"name":"Academy of Military Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3660-0903","authenticated-orcid":false,"given":"Xudong","family":"Fang","sequence":"additional","affiliation":[{"name":"Academy of Military Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3134-3734","authenticated-orcid":false,"given":"Bixin","family":"Liu","sequence":"additional","affiliation":[{"name":"Academy of Military Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4199-2793","authenticated-orcid":false,"given":"Ji","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1301-7840","authenticated-orcid":false,"given":"Xiaomin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Academy of Military Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,17]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3286709"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3069911"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2326169"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2841758"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxac085"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155397"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2521736"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0900282106"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2905590"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.265"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2183643"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.101"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3180288"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2575779"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.2991037"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849257"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2009.55"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218572"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.82"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218570"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2281104"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3016840"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3266582"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.08.010"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569938"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2016.7456503"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524494"},{"key":"e_1_3_1_31_2","volume-title":"Proceedings of the ACM MCS Workshop\u201913","author":"Macario H. R. Flores","year":"2013","unstructured":"H. R. Flores Macario and S. Srirama. 2013. Adaptive code offloading for mobile cloud applications: Exploiting fuzzy sets and evidence-based learning. In Proceedings of the ACM MCS Workshop\u201913."},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.68"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.039"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.040"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.84"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/AEEICB.2017.7972366"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000000"},{"key":"e_1_3_1_38_2","first-page":"23","volume-title":"Proceedings of the 1st ACM Workshop on Mobile Cloud Computing","author":"Shi Cong","year":"2012","unstructured":"Cong Shi, Mostafa H. Ammar, Ellen W. Zegura, and Mayur Naik. 2012. Computing in cirrusclouds: The challenge of intermittent connectivity. In Proceedings of the 1st ACM Workshop on Mobile Cloud Computing. 23\u201328."},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248394"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2868013"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2430834"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287882"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000949"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9458-1"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2907526"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3151053"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.072513.121842"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2010.72"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3514242"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2543731"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089057"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:58Z","timestamp":1750178278000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617994"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,17]]},"references-count":50,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,11,30]]}},"alternative-id":["10.1145\/3617994"],"URL":"https:\/\/doi.org\/10.1145\/3617994","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2023,11,17]]},"assertion":[{"value":"2023-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-08-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}