{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:29Z","timestamp":1755993689306,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T00:00:00Z","timestamp":1704326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Hellenic Foundation for Research and Innovation","doi-asserted-by":"publisher","award":["15706"],"award-info":[{"award-number":["15706"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"European Commission","doi-asserted-by":"publisher","award":["101079214"],"award-info":[{"award-number":["101079214"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,1,4]]},"DOI":"10.1145\/3631461.3631562","type":"proceedings-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T18:08:30Z","timestamp":1705946910000},"page":"154-163","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SMT-as-a-Service for Fog-Supported Cyber-Physical Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5894-9504","authenticated-orcid":false,"given":"Stefan","family":"Holzer","sequence":"first","affiliation":[{"name":"Distributed Systems Group, TU Wien, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6901-7714","authenticated-orcid":false,"given":"Pantelis","family":"Frangoudis","sequence":"additional","affiliation":[{"name":"Distributed Systems Group, TU Wien, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9493-3404","authenticated-orcid":false,"given":"Christos","family":"Tsigkanos","sequence":"additional","affiliation":[{"name":"Department of Aerospace Science &amp; Technology, University of Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6872-8821","authenticated-orcid":false,"given":"Schahram","family":"Dustdar","sequence":"additional","affiliation":[{"name":"Distributed Systems Group, TU Wien, Austria"}]}],"member":"320","published-online":{"date-parts":[[2024,1,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3561972"},{"key":"e_1_3_2_1_2_1","unstructured":"Clark Barrett Pascal Fontaine and Cesare Tinelli. 2017. The SMT-LIB Standard: Version 2.6. Technical Report. Department of Computer Science The University of Iowa. https:\/\/www.smt-lib.org"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_14"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22999-3_58"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2021.3060963"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3142314"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2876279"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. USENIX Workshop on Hot Topics in Edge Computing (HotEdge), Irfan Ahmad and Swaminathan Sundararaman (Eds.).","author":"Chen Youdong","year":"2018","unstructured":"Youdong Chen, Qiangguo Feng, and Weisong Shi. 2018. An Industrial Robot System Based on Edge Computing: An Early Experience. In Proc. USENIX Workshop on Hot Topics in Edge Computing (HotEdge), Irfan Ahmad and Swaminathan Sundararaman (Eds.)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_7"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3154536"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3311131"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. SMT Workshop.","author":"Gario Marco","year":"2015","unstructured":"Marco Gario and Andrea Micheli. 2015. PySMT: a solver-agnostic library for fast prototyping of SMT-based algorithms. In Proc. SMT Workshop."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6201212"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3146461"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2014.6906597"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2019.2896401"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3239579"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3102996"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2021.3116251"},{"key":"e_1_3_2_1_22_1","volume-title":"Task offloading in fog computing: A survey of algorithms and optimization techniques. Comput. Networks 214","author":"Kumari Nidhi","year":"2022","unstructured":"Nidhi Kumari, Anirudh Yadav, and Prasanta\u00a0K. Jana. 2022. Task offloading in fog computing: A survey of algorithms and optimization techniques. Comput. Networks 214 (2022)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3376127"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377343"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993422.2993426"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229015"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2999784"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00082"},{"key":"e_1_3_2_1_29_1","volume-title":"Human-level control through deep reinforcement learning. Nature 518, 7540","author":"Mnih Volodymyr","year":"2015","unstructured":"Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei\u00a0A. Rusu, Joel Veness, Marc\u00a0G. Bellemare, Alex Graves, Martin\u00a0A. Riedmiller, Andreas Fidjeland, Georg Ostrovski, Stig Petersen, Charles Beattie, Amir Sadik, Ioannis Antonoglou, Helen King, Dharshan Kumaran, Daan Wierstra, Shane Legg, and Demis Hassabis. 2015. Human-level control through deep reinforcement learning. Nature 518, 7540 (2015), 529\u2013533."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860484"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2930521"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317572"},{"key":"e_1_3_2_1_33_1","volume-title":"Exploring computation offloading in IoT systems. Inf. Syst. 107","author":"Shahhosseini Sina","year":"2022","unstructured":"Sina Shahhosseini, Arman Anzanpour, Iman Azimi, Sina Labbaf, Dongjoo Seo, Sung-Soo Lim, Pasi Liljeberg, Nikil\u00a0D. Dutt, and Amir\u00a0M. Rahmani. 2022. Exploring computation offloading in IoT systems. Inf. Syst. 107 (2022)."},{"volume-title":"Reinforcement learning - an introduction","author":"Sutton S.","key":"e_1_3_2_1_34_1","unstructured":"Richard\u00a0S. Sutton and Andrew\u00a0G. Barto. 2020. Reinforcement learning - an introduction (second ed.). MIT Press."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3067654"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3254999"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3074956"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345662"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.1081069"},{"key":"e_1_3_2_1_40_1","article-title":"Reinforcement Learning Methods for Computation Offloading","volume":"56","author":"Zabihi Zeinab","year":"2024","unstructured":"Zeinab Zabihi, Amir\u00a0Masoud Eftekhari\u00a0Moghadam, and Mohammad\u00a0Hossein Rezvani. 2024. Reinforcement Learning Methods for Computation Offloading: A Systematic Review. ACM Comput. Surv. 56, 1 (2024).","journal-title":"A Systematic Review. ACM Comput. Surv."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2597169"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2022.3232700"}],"event":{"name":"ICDCN '24: International Conference on Distributed Computing and Networking","acronym":"ICDCN '24","location":"Chennai India"},"container-title":["Proceedings of the 25th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631461.3631562","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3631461.3631562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:40:17Z","timestamp":1755909617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3631461.3631562"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,4]]},"references-count":42,"alternative-id":["10.1145\/3631461.3631562","10.1145\/3631461"],"URL":"https:\/\/doi.org\/10.1145\/3631461.3631562","relation":{},"subject":[],"published":{"date-parts":[[2024,1,4]]},"assertion":[{"value":"2024-01-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}