{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:55Z","timestamp":1750309435677,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T00:00:00Z","timestamp":1718928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,21]]},"DOI":"10.1145\/3690407.3690451","type":"proceedings-article","created":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T18:55:28Z","timestamp":1729796128000},"page":"259-266","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Study of Multi-type Computing Power Trading Mechanism in Computing Power Network Based on Blockchain and Combinatorial Double Auction"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-7874-5364","authenticated-orcid":false,"given":"Yue","family":"Zhao","sequence":"first","affiliation":[{"name":"Shandong Computer Science Center (National Supercomputer Center in Jinan), Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Provincial Key Laboratory of Industrial Network and Information System Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1425-7395","authenticated-orcid":false,"given":"Jizhi","family":"Wang","sequence":"additional","affiliation":[{"name":"Quancheng Laboratory, Jinan Key Laboratory of Digital Security, Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Shandong Provincial Key Laboratory of Industrial Network and Information System Security, Shandong Fundamental Research Center for Computer Science, Jinan, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4688-1239","authenticated-orcid":false,"given":"Lingrui","family":"Kong","sequence":"additional","affiliation":[{"name":"Shandong Computer Science Center (National Supercomputer Center in Jinan), Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Provincial Key Laboratory of Industrial Network and Information System Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0802-0200","authenticated-orcid":false,"given":"Tongtong","family":"Sui","sequence":"additional","affiliation":[{"name":"Shandong Computer Science Center (National Supercomputer Center in Jinan), Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Provincial Key Laboratory of Industrial Network and Information System Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, Shandong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,24]]},"reference":[{"issue":"3","key":"e_1_3_3_1_1_2","first-page":"6","article-title":"Analysis of key technologies and development challenges of computing power network","volume":"47","author":"C.","year":"2021","unstructured":"C. CAO and X. TANG, \u201cAnalysis of key technologies and development challenges of computing power network,\u201d Information and Communications Technology and Policy, vol. 47, no. 3, pp. 6\u201311, 2021.","journal-title":"Information and Communications Technology and Policy"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_2_2","DOI":"10.1007\/978-3-030-85896-4_8"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_3_2","DOI":"10.1109\/JIOT.2022.3167417"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_4_2","DOI":"10.1109\/MWC.001.2000466"},{"volume-title":"Frontiers of Data Computing","author":"Lei B.","unstructured":"B. Lei and Q. Zhao, \u201cCpn:a joint optimization solution of computing\/network resources,\u201d Frontiers of Data Computing, vol. 2, no. 55-64, 2020.","key":"e_1_3_3_1_5_2"},{"issue":"52","key":"e_1_3_3_1_6_2","article-title":"Computing power trading mechanism based on smart contract and blockchain","volume":"28","author":"Hang L. J. L. B. LYU","year":"2022","unstructured":"L. J. L. B. LYU, Hang and Y. XIE, \u201cComputing power trading mechanism based on smart contract and blockchain,\u201d ZTE Technology Journal, vol. 28, no. 52-57, 2022.","journal-title":"ZTE Technology Journal"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_7_2","DOI":"10.3390\/electronics12091990"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_8_2","DOI":"10.1016\/j.neucom.2023.02.010"},{"volume-title":"Systems science & control engineering","author":"Xue J.","unstructured":"J. Xue and B. Shen, \u201cA novel swarm intelligence optimization approach: sparrow search algorithm,\u201d Systems science & control engineering, vol. 8, no. 1, pp. 22\u201334, 2020.","key":"e_1_3_3_1_9_2"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_10_2","DOI":"10.1016\/j.cma.2020.113609"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_11_2","DOI":"10.1016\/j.knosys.2022.108457"},{"key":"e_1_3_3_1_12_2","first-page":"117","volume-title":"Search Methodologies","author":"Sastry K.","year":"2014","unstructured":"K. Sastry, D.E. Goldberg, G. Kendall, in: Search Methodologies, Springer US, Boston, MA, 2014, pp. 93\u2013117."}],"event":{"acronym":"CAIBDA 2024","name":"CAIBDA 2024: 2024 4th International Conference on Artificial Intelligence, Big Data and Algorithms","location":"Zhengzhou China"},"container-title":["Proceedings of the 2024 4th International Conference on Artificial Intelligence, Big Data and Algorithms"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690407.3690451","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690407.3690451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:37Z","timestamp":1750295377000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690407.3690451"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,21]]},"references-count":12,"alternative-id":["10.1145\/3690407.3690451","10.1145\/3690407"],"URL":"https:\/\/doi.org\/10.1145\/3690407.3690451","relation":{},"subject":[],"published":{"date-parts":[[2024,6,21]]},"assertion":[{"value":"2024-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}