{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T00:55:09Z","timestamp":1773968109005,"version":"3.50.1"},"reference-count":20,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,9,2]],"date-time":"2018-09-02T00:00:00Z","timestamp":1535846400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["61872002"],"award-info":[{"award-number":["61872002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["1808085MF197"],"award-info":[{"award-number":["1808085MF197"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Foundation of Anhui Province of China","award":["61872002"],"award-info":[{"award-number":["61872002"]}]},{"name":"Natural Science Foundation of Anhui Province of China","award":["1808085MF197"],"award-info":[{"award-number":["1808085MF197"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018,9,2]]},"abstract":"<jats:p>The applications of mobile devices are increasingly becoming computationally intensive while the computing capability of the user\u2019s mobile device is limited. Traditional approaches offload the tasks of mobile applications to the remote cloud. However, the rapid growth of mobile devices has made it a challenge for the remote cloud to provide computing and storage capacities with low communication delays due to the fact that the remote cloud is geographically far away from mobile devices. Reducing the completion time of applications in mobile devices through the technical expending mobile cloudlets which are moving collocated with Access Points (APs) is necessary. To address the above issues, this paper proposes EACP-CA (<jats:bold>E<\/jats:bold>nhanced<jats:bold> A<\/jats:bold>daptive<jats:bold> C<\/jats:bold>loudlets<jats:bold> P<\/jats:bold>lacement approach based on<jats:bold> C<\/jats:bold>overing<jats:bold> A<\/jats:bold>lgorithm), an enhanced adaptive cloudlet placement approach for mobile applications in a given network area. We apply the CA (Covering Algorithm) to adaptively cluster the mobile devices based on their geographical locations, the aggregation regions of the mobile devices are identified, and the cloudlet destination locations are also confirmed according to the clustering centers. In addition, we can also obtain the traces between the original and destination locations of these mobile cloudlets. To increase the efficiency, we parallelize CA on Spark. Extensive experiments show that the proposed approach outperforms the existing approach in both effectiveness and efficiency.<\/jats:p>","DOI":"10.1155\/2018\/1937670","type":"journal-article","created":{"date-parts":[[2018,9,2]],"date-time":"2018-09-02T19:31:26Z","timestamp":1535916686000},"page":"1-12","source":"Crossref","is-referenced-by-count":12,"title":["Enhanced Adaptive Cloudlet Placement Approach for Mobile Application on Spark"],"prefix":"10.1155","volume":"2018","author":[{"given":"Yiwen","family":"Zhang","sequence":"first","affiliation":[{"name":"Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei, Anhui 230031, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7716-3850","authenticated-orcid":true,"given":"Kaibin","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei, Anhui 230031, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8378-6296","authenticated-orcid":true,"given":"Yuanyuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei, Anhui 230031, China"}]},{"given":"Qiang","family":"He","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia"}]}],"member":"311","reference":[{"issue":"4","key":"1","first-page":"606","volume":"2","year":"2013","journal-title":"International Journal of Engineering and Advanced Technology"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.98"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/tcc.2015.2449834"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2015.7064900"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-015-0590-7"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760458"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2405539"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.09.015"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2510638"},{"issue":"16","key":"12","volume":"29","year":"2017","journal-title":"Concurrency Computation"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2318320"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.12.017"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.208"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2651880"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.05.016"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0796-5"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7698274"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.02.014"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2822945"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/1937670.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/1937670.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/1937670.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,2]],"date-time":"2018-09-02T19:31:30Z","timestamp":1535916690000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/1937670\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,2]]},"references-count":20,"alternative-id":["1937670","1937670"],"URL":"https:\/\/doi.org\/10.1155\/2018\/1937670","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,2]]}}}