{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T08:25:45Z","timestamp":1767169545604,"version":"build-2238731810"},"update-to":[{"DOI":"10.1155\/2021\/4348511","type":"corrigendum","label":"Corrigendum","source":"publisher","updated":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:00:00Z","timestamp":1641772800000}}],"reference-count":1,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:00:00Z","timestamp":1641772800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["hindawi.com"],"crossmark-restriction":true},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2022,1,10]]},"DOI":"10.1155\/2022\/9879521","type":"journal-article","created":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T12:20:09Z","timestamp":1641817209000},"page":"1-1","update-policy":"https:\/\/doi.org\/10.1155\/corrections_policy","source":"Crossref","is-referenced-by-count":0,"title":["Corrigendum to \u201cRandomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing\u201d"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8889-2530","authenticated-orcid":true,"given":"Wenle","family":"Bai","sequence":"first","affiliation":[{"name":"Information Science and Technology, North China University of Technology, Shijingshan District, Beijing 100043, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4541-0316","authenticated-orcid":true,"given":"Zhongjun","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, North China University of Technology, Shijingshan District, Beijing 100043, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8674-3988","authenticated-orcid":true,"given":"Jianhong","family":"Zhang","sequence":"additional","affiliation":[{"name":"North China University of Technology, Beijjing, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4348511"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/9879521.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/9879521.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2022\/9879521.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T10:20:49Z","timestamp":1704363649000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2022\/9879521\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,10]]},"references-count":1,"alternative-id":["9879521","9879521"],"URL":"https:\/\/doi.org\/10.1155\/2022\/9879521","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,10]]}}}