{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:25:44Z","timestamp":1759335944815},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T00:00:00Z","timestamp":1727481600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T00:00:00Z","timestamp":1727481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-024-00705-w","type":"journal-article","created":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T09:01:36Z","timestamp":1727514096000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Optimization model for vehicular network data queries in edge environments"],"prefix":"10.1186","volume":"13","author":[{"given":"Yan","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chaoyue","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Yuxiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Chang","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Lang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,28]]},"reference":[{"issue":"1","key":"705_CR1","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MWC.2017.1600275","volume":"25","author":"J Wang","year":"2017","unstructured":"Wang J, Jiang C, Zhang K, Quek TQ, Ren Y, Hanzo L (2017) Vehicular sensing networks in a smart city: principles, technologies and applications. IEEE Wirel Commun 25(1):122\u2013132","journal-title":"IEEE Wirel Commun"},{"issue":"1","key":"705_CR2","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/JIOT.2018.2884200","volume":"6","author":"X Cheng","year":"2018","unstructured":"Cheng X, Zhang R, Yang L (2018) Wireless toward the era of intelligent vehicles. IEEE Internet Things J 6(1):188\u2013202","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"705_CR3","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/MNET.011.2000663","volume":"35","author":"S Xu","year":"2021","unstructured":"Xu S, Liu X, Guo S, Qiu X, Meng L (2021)\u00a0MECC: a mobile edge collaborative caching framework empowered by deep reinforcement learning. IEEE Netw 35(4):176\u2013183","journal-title":"IEEE Netw"},{"key":"705_CR4","first-page":"1","volume":"2020","author":"T Li","year":"2020","unstructured":"Li T, Chen Y, Wang Y, Wang Y, Zhao M, Zhu H, Tian Y, Yu X, Yang Y (2020) Rational protocols and attacks in blockchain system. Secur Commun Netw 2020:1\u201311","journal-title":"Secur Commun Netw"},{"key":"705_CR5","doi-asserted-by":"crossref","unstructured":"Chen Y, Yang X, Li T, Ren Y, Long Y (2022) A blockchain-empowered authentication scheme for worm detection in wireless sensor network. Digit Commun Netw 10(2):237\u2013508","DOI":"10.1016\/j.dcan.2022.04.007"},{"issue":"20","key":"705_CR6","doi-asserted-by":"publisher","first-page":"e6623","DOI":"10.1002\/cpe.6623","volume":"35","author":"C Tan","year":"2023","unstructured":"Tan C, Chen Y, Ren X, Peng C (2023) A mobile energy trading scheme based on lightning network. Concurr Comput Pract Experience 35(20):e6623","journal-title":"Concurr Comput Pract Experience"},{"issue":"109","key":"705_CR7","first-page":"344","volume":"252","author":"G Wang","year":"2022","unstructured":"Wang G, Li C, Huang Y, Wang X, Luo Y (2022) Smart contract-based caching and data transaction optimization in mobile edge computing. Knowl-Based Syst 252(109):344","journal-title":"Knowl-Based Syst"},{"key":"705_CR8","doi-asserted-by":"crossref","unstructured":"Remy SL, Gajananan K, Karve A (2022) Redefining edge computing. In: 2022 IEEE Cloud Summit, IEEE, pp 113\u2013117","DOI":"10.1109\/CloudSummit54781.2022.00023"},{"issue":"3","key":"705_CR9","doi-asserted-by":"publisher","first-page":"4512","DOI":"10.1109\/JIOT.2018.2883762","volume":"6","author":"L Hou","year":"2018","unstructured":"Hou L, Lei L, Zheng K, Wang X (2018) A q-learning-based proactive caching strategy for non-safety related services in vehicular networks. IEEE Internet Things J 6(3):4512\u20134520","journal-title":"IEEE Internet Things J"},{"key":"705_CR10","doi-asserted-by":"crossref","unstructured":"Abani N, Farhadi G, Ito A, Gerla M (2016) Popularity-based partial caching for information centric networks. In: 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), IEEE, pp 1\u20138","DOI":"10.1109\/MedHocNet.2016.7528426"},{"issue":"11","key":"705_CR11","doi-asserted-by":"publisher","first-page":"e3706","DOI":"10.1002\/dac.3706","volume":"31","author":"T Hou","year":"2018","unstructured":"Hou T, Feng G, Qin S, Jiang W (2018) Proactive content caching by exploiting transfer learning for mobile edge computing. Int J Commun Syst 31(11):e3706","journal-title":"Int J Commun Syst"},{"issue":"5","key":"705_CR12","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TMC.2016.2597851","volume":"16","author":"W Jiang","year":"2016","unstructured":"Jiang W, Feng G, Qin S (2016) Optimal cooperative content caching and delivery policy for heterogeneous cellular networks. IEEE Trans Mob Comput 16(5):1382\u20131393","journal-title":"IEEE Trans Mob Comput"},{"key":"705_CR13","doi-asserted-by":"publisher","first-page":"133212","DOI":"10.1109\/ACCESS.2020.3010329","volume":"8","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Feng B, Quan W, Tian A, Sood K, Lin Y, Zhang H (2020) Cooperative edge caching: a multi-agent deep learning based approach. IEEE Access 8:133212\u2013133224","journal-title":"IEEE Access"},{"key":"705_CR14","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.jnca.2019.02.004","volume":"136","author":"K Bilal","year":"2019","unstructured":"Bilal K, Baccour E, Erbad A, Mohamed A, Guizani M (2019) Collaborative joint caching and transcoding in mobile edge networks. J Netw Comput Appl 136:86\u201399","journal-title":"J Netw Comput Appl"},{"issue":"5","key":"705_CR15","doi-asserted-by":"publisher","first-page":"3401","DOI":"10.1109\/TWC.2017.2682240","volume":"16","author":"Z Chen","year":"2017","unstructured":"Chen Z, Lee J, Quek TQ, Kountouris M (2017) Cooperative caching and transmission design in cluster-centric small cell networks. IEEE Trans Wirel Commun 16(5):3401\u20133415","journal-title":"IEEE Trans Wirel Commun"},{"issue":"24","key":"705_CR16","doi-asserted-by":"publisher","first-page":"25698","DOI":"10.1109\/JIOT.2022.3196908","volume":"9","author":"J Chen","year":"2022","unstructured":"Chen J, Xing H, Lin X, Nallanathan A, Bi S (2022) Joint resource allocation and cache placement for location-aware multi-user mobile-edge computing. IEEE Internet Things J 9(24):25698\u201325714","journal-title":"IEEE Internet Things J"},{"key":"705_CR17","doi-asserted-by":"crossref","unstructured":"Shu P, Du Q (2020) Group behavior-based collaborative caching for mobile edge computing. In: 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), vol\u00a01. IEEE, pp 2441\u20132447","DOI":"10.1109\/ITNEC48623.2020.9085078"},{"issue":"3","key":"705_CR18","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/MITS.2018.2842036","volume":"10","author":"X Wang","year":"2018","unstructured":"Wang X (2018) Vehicular cloud construction and content acquisition. IEEE Intell Transp Syst Mag 10(3):135\u2013145","journal-title":"IEEE Intell Transp Syst Mag"},{"key":"705_CR19","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.adhoc.2018.08.008","volume":"82","author":"JM Duarte","year":"2019","unstructured":"Duarte JM, Braun T, Villas LA (2019)\u00a0MobiVNDN: A distributed framework to support mobility in vehicular named-data networking. Ad Hoc Netw 82:77\u201390","journal-title":"Ad Hoc Netw"},{"issue":"10","key":"705_CR20","doi-asserted-by":"publisher","first-page":"6469","DOI":"10.1109\/TWC.2020.3003454","volume":"19","author":"R Zhang","year":"2020","unstructured":"Zhang R, Yu FR, Liu J, Huang T, Liu Y (2020) Deep reinforcement learning (drl)-based device-to-device (d2d) caching with blockchain and mobile edge computing. IEEE Trans Wirel Commun 19(10):6469\u20136485","journal-title":"IEEE Trans Wirel Commun"},{"key":"705_CR21","doi-asserted-by":"publisher","first-page":"103774","DOI":"10.1016\/j.engappai.2020.103774","volume":"94","author":"P Zhang","year":"2020","unstructured":"Zhang P, Zhang A, Xu G (2020) Optimized task distribution based on task requirements and time delay in edge computing environments. Eng Appl Artif Intell 94:103774","journal-title":"Eng Appl Artif Intell"},{"key":"705_CR22","doi-asserted-by":"crossref","unstructured":"Monga SK, Ramachandra SK, Simmhan Y (2019) Elfstore: a resilient data storage service for federated edge and fog resources. In: 2019 IEEE International Conference on Web Services (ICWS), IEEE, pp 336\u2013345","DOI":"10.1109\/ICWS.2019.00062"},{"issue":"12","key":"705_CR23","doi-asserted-by":"publisher","first-page":"2728","DOI":"10.3390\/electronics12122728","volume":"12","author":"T Quan","year":"2023","unstructured":"Quan T, Zhang H, Yu Y, Tang Y, Liu F, Hao H (2023) Seismic data query algorithm based on edge computing. Electronics 12(12):2728","journal-title":"Electronics"},{"key":"705_CR24","unstructured":"Glover F, Hanafi S (2001) Finite convergence of tabu search. In: MIC\u20192001 - 4th Metaheuristics International Conference, ResearchGate,\u00a0Porto, p 333\u2013336"},{"key":"705_CR25","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.cie.2015.12.028","volume":"93","author":"R Abyazi-Sani","year":"2016","unstructured":"Abyazi-Sani R, Ghanbari R (2016) An efficient tabu search for solving the uncapacitated single allocation hub location problem. Comput Ind Eng 93:99\u2013109","journal-title":"Comput Ind Eng"},{"key":"705_CR26","doi-asserted-by":"crossref","unstructured":"Laayati O, Elmaghraoui A, El\u00a0Hadraoui H, Ledmaoui Y, Bouzi M, Chebak A (2023) Tabu search optimization for energy management in microgrids: A solution to grid-connected and standalone operation modes. In: 2023 5th Global Power, Energy and Communication Conference (GPECOM), IEEE, pp 401\u2013406","DOI":"10.1109\/GPECOM58364.2023.10175809"},{"key":"705_CR27","doi-asserted-by":"crossref","unstructured":"Fan B, Andersen DG, Kaminsky M, Mitzenmacher MD (2014) Cuckoo filter: practically better than bloom. In: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, Association for Computing Machinery,\u00a0New York, p 75\u201388","DOI":"10.1145\/2674005.2674994"},{"issue":"13","key":"705_CR28","doi-asserted-by":"publisher","first-page":"2809","DOI":"10.3390\/electronics12132809","volume":"12","author":"Y Zhao","year":"2023","unstructured":"Zhao Y, Dai W, Wang S, Xi L, Wang S, Zhang F (2023) A review of cuckoo filters for privacy protection and their applications. Electronics 12(13):2809","journal-title":"Electronics"},{"key":"705_CR29","doi-asserted-by":"crossref","unstructured":"Pagh R, Rodler FF (2004) Cuckoo hashing. J Algoritm 51(2):122\u2013144","DOI":"10.1016\/j.jalgor.2003.12.002"},{"issue":"2","key":"705_CR30","doi-asserted-by":"publisher","first-page":"2468","DOI":"10.1109\/TVT.2022.3213130","volume":"72","author":"F Zeng","year":"2022","unstructured":"Zeng F, Zhang K, Wu L, Wu J (2022) Efficient caching in vehicular edge computing based on edge-cloud collaboration. IEEE Trans Veh Technol 72(2):2468\u20132481","journal-title":"IEEE Trans Veh Technol"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00705-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00705-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00705-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T09:08:43Z","timestamp":1727514523000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00705-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,28]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["705"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00705-w","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,28]]},"assertion":[{"value":"29 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"145"}}