{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:22:33Z","timestamp":1740140553502,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,2,13]],"date-time":"2016-02-13T00:00:00Z","timestamp":1455321600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100008122","name":"ITRC","doi-asserted-by":"crossref","award":["IITP-2015-H8501-15-1018"],"award-info":[{"award-number":["IITP-2015-H8501-15-1018"]}],"id":[{"id":"10.13039\/501100008122","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NRF","award":["NRF-2015R1D1A1A01060835"],"award-info":[{"award-number":["NRF-2015R1D1A1A01060835"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0543-2","type":"journal-article","created":{"date-parts":[[2016,2,13]],"date-time":"2016-02-13T04:08:51Z","timestamp":1455336531000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic social cloud management scheme based on transformable Stackelberg game"],"prefix":"10.1186","volume":"2016","author":[{"given":"Sungwook","family":"Kim","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,13]]},"reference":[{"key":"543_CR1","series-title":"IEEE ISDA\u20192010","first-page":"142","volume-title":"Towards a bounded-rationality model of multi-agent social learning in games","author":"M Hemmati","year":"2010","unstructured":"M Hemmati, N Sadati, M Nili, Towards a bounded-rationality model of multi-agent social learning in games. IEEE ISDA\u20192010, 2010, pp. 142\u2013148"},{"issue":"4","key":"543_CR2","doi-asserted-by":"crossref","first-page":"231","DOI":"10.5626\/JCSE.2013.7.4.231","volume":"7","author":"I Jang","year":"2013","unstructured":"I Jang, D Pyeon, S Kim, H Yoon, A survey on communication protocols for wireless sensor networks. JCSE 7(4), 231\u2013241 (2013)","journal-title":"JCSE"},{"key":"543_CR3","series-title":"IEEE ISCIT\u20192014","first-page":"279","volume-title":"Influence of relationship strengths to network structures in social network","author":"Z Shengbing","year":"2014","unstructured":"Z Shengbing, Influence of relationship strengths to network structures in social network. IEEE ISCIT\u20192014, 2014, pp. 279\u2013283"},{"key":"543_CR4","doi-asserted-by":"publisher","unstructured":"D Ardagna, M Ciavotta, M Passacantando, Generalized Nash equilibria for the service provisioning problem in multi-cloud systems. accepted in IEEE Transactions on Services Computing. 6(4), 429-422 (2013)","DOI":"10.1109\/TSC.2012.14"},{"issue":"3","key":"543_CR5","doi-asserted-by":"crossref","first-page":"155","DOI":"10.5626\/JCSE.2015.9.3.155","volume":"9","author":"K Lee","year":"2015","unstructured":"K Lee, I Shin, User mobility model based computation offloading decision for mobile cloud. JCSE 9(3), 155\u2013162 (2015)","journal-title":"JCSE"},{"issue":"3","key":"543_CR6","doi-asserted-by":"crossref","first-page":"119","DOI":"10.5626\/JCSE.2015.9.3.119","volume":"9","author":"Y Liu","year":"2015","unstructured":"Y Liu, Y Sun, J Ryoo, S Rizvi, AV Vasilakos, A survey of security and privacy challenges in cloud computing: solutions and future directions. JCSE 9(3), 119\u2013133 (2015)","journal-title":"JCSE"},{"issue":"4","key":"543_CR7","doi-asserted-by":"publisher","first-page":"974","DOI":"10.1109\/TPDS.2014.2316833","volume":"26","author":"C Xu","year":"2015","unstructured":"C Xu, Decentralized computation offloading game for mobile cloud computing. IEEE Trans Parallel Distrib Syst 26(4), 974\u2013983 (2015)","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"4","key":"543_CR8","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/TSC.2011.39","volume":"5","author":"K Chard","year":"2012","unstructured":"K Chard, K Bubendorfer, S Caton, OF Rana, Social cloud computing: a vision for socially motivated resource sharing. Services computing. IEEE Trans Serv Comput 5(4), 551\u2013563 (2012)","journal-title":"IEEE Trans Serv Comput"},{"key":"543_CR9","series-title":"IEEE CLOUD\u20192010","first-page":"99","volume-title":"Social cloud: cloud computing in social networks","author":"K Chard","year":"2010","unstructured":"K Chard, S Caton, O Rana, K Bubendorfer, Social cloud: cloud computing in social networks. IEEE CLOUD\u20192010, 2010, pp. 99\u2013106. In cloud computing"},{"key":"543_CR10","doi-asserted-by":"publisher","unstructured":"S Caton, C Haas, K Chard, K Bubendorfer, OF Rana, A social compute cloud: allocating and sharing infrastructure resources via social networks. IEEE Trans Serv Comput 7(3), 359\u2013372 (2014)","DOI":"10.1109\/TSC.2014.2303091"},{"key":"543_CR11","doi-asserted-by":"crossref","unstructured":"Kim Sungwook, Game Theory Applications in Network Design. IGI Global. Pennsylvania, (2014)","DOI":"10.4018\/978-1-4666-6050-2"},{"issue":"9","key":"543_CR12","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1109\/JSAC.2013.SUP.0513053","volume":"31","author":"Y Zhang","year":"2013","unstructured":"Y Zhang, M van der Schaar, Incentive provision and job allocation in social cloud systems. IEEE J Sel Areas Commun 31(9), 607\u2013617 (2013)","journal-title":"IEEE J Sel Areas Commun"},{"key":"543_CR13","series-title":"IEEE 9th WAINA","first-page":"242","volume-title":"Secure two-party computation in social cloud based on reputation","author":"Y Wang","year":"2015","unstructured":"Y Wang, C Guo, T Li, Q Xu, Secure two-party computation in social cloud based on reputation. IEEE 9th WAINA, 2015, pp. 242\u2013245"},{"key":"543_CR14","series-title":"IEEE iThings\/CPSCom","first-page":"1259","volume-title":"People\u2019s just-in-time decisions: computational social platform to guide people\u2019s just-in-time decisions","author":"K Lee","year":"2013","unstructured":"K Lee, A Lippman, AS Pentland, P Maes, People\u2019s just-in-time decisions: computational social platform to guide people\u2019s just-in-time decisions. IEEE iThings\/CPSCom, 2013, pp. 1259\u20131266"},{"key":"543_CR15","series-title":"IEEE Cloud and Green Computing","first-page":"160","volume-title":"Social networking for sharing cloud resources","author":"Z Ali","year":"2012","unstructured":"Z Ali, RU Rasool, P Bloodsworth, Social networking for sharing cloud resources. IEEE Cloud and Green Computing, 2012, pp. 160\u2013166"},{"key":"543_CR16","series-title":"IEEE WAINA","first-page":"242","volume-title":"Secure two-party computation in social cloud based on reputation","author":"W Yilei","year":"2015","unstructured":"W Yilei, G Chao, L Tao, X Qiuliang, Secure two-party computation in social cloud based on reputation. IEEE WAINA, 2015, pp. 242\u2013245"},{"key":"543_CR17","series-title":"Proceedings of the 32nd International Conference on Machine Learning","first-page":"218","volume-title":"A relative exponential weighing algorithm for adversarial utility-based dueling bandits","author":"P Gajane","year":"2015","unstructured":"P Gajane, T Urvoy, F Cl\u00e9rot, A relative exponential weighing algorithm for adversarial utility-based dueling bandits. Proceedings of the 32nd International Conference on Machine Learning, 2015, pp. 218\u2013227"},{"issue":"12","key":"543_CR18","first-page":"4293","volume":"8","author":"S Kim","year":"2014","unstructured":"S Kim, Intervenient Stackelberg game based bandwidth allocation scheme for hierarchical wireless networks. KSII Trans Internet Inf Syst 8(12), 4293\u20134304 (2014)","journal-title":"KSII Trans Internet Inf Syst"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0543-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0543-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0543-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0543-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,4]],"date-time":"2022-06-04T02:11:11Z","timestamp":1654308671000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0543-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,13]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["543"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0543-2","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,2,13]]},"article-number":"47"}}