{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:05:21Z","timestamp":1758845121516},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2018]]},"DOI":"10.1587\/transcom.2017ebp3177","type":"journal-article","created":{"date-parts":[[2017,10,15]],"date-time":"2017-10-15T22:08:55Z","timestamp":1508105335000},"page":"1010-1020","source":"Crossref","is-referenced-by-count":6,"title":["Energy-Efficient Resource Management in Mobile Cloud Computing"],"prefix":"10.23919","volume":"E101.B","author":[{"given":"Xiaomin","family":"JIN","sequence":"first","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications"},{"name":"Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"}]},{"given":"Yuanan","family":"LIU","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications"},{"name":"Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"}]},{"given":"Wenhao","family":"FAN","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications"},{"name":"Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"}]},{"given":"Fan","family":"WU","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications"},{"name":"Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"}]},{"given":"Bihua","family":"TANG","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications"},{"name":"Beijing Key Laboratory of Work Safety Intelligent Monitoring, Beijing University of Posts and Telecommunications"}]}],"member":"263","reference":[{"key":"1","unstructured":"[1] Cisco, \u201cCisco visual networking index: Forecast and methodology,\u201d 2014-2019 White Paper, Feb. 2015."},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] G. Lewis and P. Lago, \u201cArchitectural tactics for cyber-foraging: Results of a systematic literature review,\u201d J. Syst. Softw., vol.107, no.2015, pp.158-186, June 2015. 10.1016\/j.jss.2015.06.005","DOI":"10.1016\/j.jss.2015.06.005"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] M.B. Terefe, H. Lee, N. Heo, G.C. Fox, and S. Oh, \u201cEnergy-efficient multisite offloading policy using Markov decision process for mobile cloud computing,\u201d Pervasive &amp; Mobile Computing, vol.27, no.2016, pp.75-89, April 2016. 10.1016\/j.pmcj.2015.10.008","DOI":"10.1016\/j.pmcj.2015.10.008"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] N.I.M. Enzai and M. Tang, \u201cA heuristic algorithm for multi-site computation offloading in mobile cloud computing,\u201d Procedia Computer Science, vol.80, no.2016, pp.1232-1241, Dec. 2016. 10.1016\/j.procs.2016.05.490","DOI":"10.1016\/j.procs.2016.05.490"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] S. Deng, L. Huang, J. Taheri, and A.Y. Zomaya, \u201cComputation offloading for service workflow in mobile cloud computing,\u201d IEEE Trans. Parallel Distrib. Syst., vol.26, no.12, pp.3317-3329, Dec. 2015. 10.1109\/tpds.2014.2381640","DOI":"10.1109\/TPDS.2014.2381640"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] M. Pedram, \u201cEnergy-efficient datacenters,\u201d IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol.31, no.10, pp.1465-1484, Oct. 2012. 10.1109\/tcad.2012.2212898","DOI":"10.1109\/TCAD.2012.2212898"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] K. Kumar and Y. Lu, \u201cCloud computing for mobile users: Can offloading computation save energy?,\u201d Computer, vol.43, no.4, pp.51-56, April 2010. 10.1109\/mc.2010.98","DOI":"10.1109\/MC.2010.98"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] H. Qi and A. Gani, \u201cResearch on mobile cloud computing: Review, trend and perspectives,\u201d Proc. 2nd International Conference on Digital Information and Communication Technology and It&apos;s Applications, pp.195-202, Bangkok, Thailand, May 2012. 10.1109\/dictap.2012.6215350","DOI":"10.1109\/DICTAP.2012.6215350"},{"key":"9","unstructured":"[9] M.R. Garey and D.S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, W.H. Freeman and Company, San Francisco, 1979."},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] D.K. Friesen and M.A. Langston, \u201cVariable sized bin packing,\u201d SIAM J. Comput., vol.15, no.1, pp.222-230, Feb. 1986. 10.1137\/0215016","DOI":"10.1137\/0215016"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] E. Falkenauer, \u201cA hybrid grouping genetic algorithm for bin packing,\u201d J. Heuristics, vol.2, no.1, pp.5-30, June 1996. 10.1007\/bf00226291","DOI":"10.1007\/BF00226291"},{"key":"12","unstructured":"[12] B. Liu, Uncertain Programming, Springer-Verlag, Berlin, 2010."},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] S.K. Sood and R. Sandhu, \u201cMatrix based proactive resource provisioning in mobile cloud environment,\u201d Simulation Modelling Practice &amp; Theory, vol.50, no.2015, pp.83-95, Jan. 2015. 10.1016\/j.simpat.2014.06.004","DOI":"10.1016\/j.simpat.2014.06.004"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] P. Si, Q. Zhang, F.R. Yu, and Y. Zhang, \u201cQoS-aware dynamic resource management in heterogeneous mobile cloud computing networks,\u201d China Commun., vol.11, no.5, pp.144-159, May 2014. 10.1109\/cc.2014.6880470","DOI":"10.1109\/CC.2014.6880470"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] H. Liang, D. Huang, L.X. Cai, X. Shen, and D. Peng, \u201cResource allocation for security services in mobile cloud computing,\u201d Proc. 2011 IEEE Conference on Computer Communications Workshops, pp.191-195, Shanghai, China, April 2011. 10.1109\/infcomw.2011.5928806","DOI":"10.1109\/INFCOMW.2011.5928806"},{"key":"16","unstructured":"[16] A. Khalifa and M. Eltoweissy, \u201cCollaborative autonomic resource management system for mobile cloud computing,\u201d Proc. 4th International Conference on Cloud Computing, GRIDs and Virtualization, pp.115-121, Valencia, Spain, May, 2013."},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] P. Zhang and Z. Yan, \u201cA QoS-aware system for mobile cloud computing,\u201d Proc. 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp.518-522, Beijing, China, Sept. 2011. 10.1109\/ccis.2011.6045122","DOI":"10.1109\/CCIS.2011.6045122"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] M. Kangas and S. Glisic, \u201cThroughput optimal resource management of cooperative networks with mobile clouds,\u201d Proc. 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, pp.1098-1103, Toronto, Canada, Sept. 2011. 10.1109\/pimrc.2011.6139667","DOI":"10.1109\/PIMRC.2011.6139667"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] D. Niyato, P. Wang, E. Hossain, W. Saad, and Z. Han, \u201cGame theoretic modeling of cooperation among service providers in mobile cloud computing environments,\u201d Proc. 2012 IEEE Wireless Communications and Networking Conference, pp.3128-3133, Paris, France, April 2012. 10.1109\/wcnc.2012.6214343","DOI":"10.1109\/WCNC.2012.6214343"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] R. Kaewpuang, D. Niyato, P. Wang, and E. Hossain, \u201cA framework for cooperative resource management in mobile cloud computing,\u201d IEEE J. Sel. Areas Commun., vol.31, no.12, pp.2685-2700, Dec. 2013. 10.1109\/jsac.2013.131209","DOI":"10.1109\/JSAC.2013.131209"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] J. Tang, D.K. C. So, E. Alsusa, K.A. Hamdi, and A. Shojaeifard, \u201cResource allocation for energy efficiency optimization in heterogeneous networks,\u201d IEEE J. Sel. Areas Commun., vol.33, no.10, pp.2104-2117, Oct. 2015. 10.1109\/jsac.2015.2435351","DOI":"10.1109\/JSAC.2015.2435351"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] J. Jiang, M. Peng, K. Zhang, and L. Li, \u201cEnergy-efficient resource allocation in heterogeneous network with cross-tier interference constraint,\u201d Proc. 24th International Symposium on Personal, Indoor and Mobile Radio Communications, pp.168-172, London, UK, Sept. 2013. 10.1109\/pimrcw.2013.6707858","DOI":"10.1109\/PIMRCW.2013.6707858"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] H. Ghazzai, M.J. Farooq, A. Alsharoa, E. Yaacoub, A. Kadri, and M.S. Alouini, \u201cGreen networking in cellular HetNets: A unified radio resource management framework with base station ON\/OFF switching,\u201d IEEE Trans. Veh. Technol., vol.66, no.7, pp.5879-5893, July 2017. 10.1109\/tvt.2016.2636455","DOI":"10.1109\/TVT.2016.2636455"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] M. Dalmasso, M. Meo, and D. Renga, \u201cRadio resource management for improving energy self-sufficiency of green mobile networks,\u201d ACM SIGMETRICS Performance Evaluation Review, vol.44, no.2, pp.82-87, Sept. 2016. 10.1145\/3003977.3004001","DOI":"10.1145\/3003977.3004001"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] C. Comaniciu, N.B. Mandayam, and H.V. Poor, \u201cRadio resource management for green wireless networks,\u201d Proc. 70th Vehicular Technology Conference Fall, pp.1-5, Anchorage, USA, Sept. 2009. 10.1109\/vetecf.2009.5379028","DOI":"10.1109\/VETECF.2009.5379028"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] X. Fan, W.D. Weber, and L.A. Barroso, \u201cPower provisioning for a warehouse-sized computer,\u201d Proc. 34th International Symposium on Computer Architecture, pp.13-23, San Diego, USA, June 2007. 10.1145\/1250662.1250665","DOI":"10.1145\/1250662.1250665"},{"key":"27","doi-asserted-by":"publisher","unstructured":"[27] M. Srinivas and L.M. Patnaik, \u201cAdaptive probabilities of crossover and mutation in genetic algorithms,\u201d IEEE Trans. Syst., Man, Cybern., Syst., vol.24, no.4, pp.656-667, April 1994. 10.1109\/21.286385","DOI":"10.1109\/21.286385"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E101.B\/4\/E101.B_2017EBP3177\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T15:01:25Z","timestamp":1704898885000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E101.B\/4\/E101.B_2017EBP3177\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2017ebp3177","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}