{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:58:20Z","timestamp":1730343500188,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,27]]},"DOI":"10.23919\/fruct54823.2022.9770915","type":"proceedings-article","created":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T20:32:27Z","timestamp":1652301147000},"page":"371-379","source":"Crossref","is-referenced-by-count":5,"title":["Applications for Monitoring and Visualizing Events from the Cloud or Fog Environment"],"prefix":"10.23919","author":[{"given":"Nataly","family":"Zhukova","sequence":"first","affiliation":[{"name":"Saint-Petersburg Federal Research Centre of the Russian Academy of Sciences,St. Petersburg,Russia"}]},{"given":"Alexey","family":"Subbotin","sequence":"additional","affiliation":[{"name":"St. Petersburg State Electrotechnical University \"LETI\",St. Petersburg,Russia"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102915"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.comcom.2021.01.026","article-title":"Hybrid fog\/cloud computing resource allocation: Joint consideration of limited communication resources and user credibility","volume":"169","author":"chen","year":"2021","journal-title":"Computer Communications"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.01.036"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PUNECON.2018.8745409"},{"key":"ref11","first-page":"388","article-title":"Improving the Mobile Edge Computing Architecture Using Fog Computing Environments","author":"subbotin","year":"2021","journal-title":"14th Conference of Open Innovation Association FRUCT"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.10.011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2766923"},{"key":"ref16","first-page":"1","article-title":"Roland Math: Cloud, Fog or Edge: Where to Compute?","volume":"2101","author":"kimovski","year":"2021","journal-title":"IEEE Internet Computing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2991\/ijndc.k.210111.001"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"107731","DOI":"10.1016\/j.comnet.2020.107731","article-title":"A clogging resistant secure authentication scheme for fog computing services","volume":"185","author":"ali","year":"2021","journal-title":"Computer Networks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2020.100454"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"106789","DOI":"10.1016\/j.asoc.2020.106789","article-title":"A Fuzzy-AHP based prioritization of trust criteria in fog computing services","volume":"97","author":"oyinlola ogundoyin","year":"2020","journal-title":"Applied Soft Computing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCOS.2012.25"},{"key":"ref27","first-page":"109","article-title":"Resource provisioning for IoT services in the fog computing environment: An autonomic approach. Computer Communications","volume":"161","author":"etemadi","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.83"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05029-4_7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102139"},{"key":"ref5","first-page":"125","author":"saecker","year":"2013","journal-title":"Big Data Analytics on Modern Hardware Architectures A Technology Survey"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700322"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2485206"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2014.7033259"},{"key":"ref9","volume":"163","author":"tanwar","year":"2019","journal-title":"Multimedia Big Data Computing for IoT applications Concepts Paradigms and Solutions"},{"key":"ref1","first-page":"1","article-title":"Potential Escalator-related Injury Identication and Prevention Based on Multi-Module Integrated System for Public Health","author":"jiao","year":"2021","journal-title":"Machine Vision and Applications"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2020.101316"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2020.11.121"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.10.007"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"107526","DOI":"10.1016\/j.comnet.2020.107526","article-title":"Characterizing task completion latencies in multi-point multi-quality fog computing systems","volume":"181","author":"gorlatova","year":"2020","journal-title":"Computer Networks"},{"key":"ref23","first-page":"102994","article-title":"A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices","author":"raafat","year":"2021","journal-title":"Journal of Network and Computer Applications"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.06.016"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.07.039"}],"event":{"name":"2022 31st Conference of Open Innovations Association (FRUCT)","start":{"date-parts":[[2022,4,27]]},"location":"Helsinki, Finland","end":{"date-parts":[[2022,4,29]]}},"container-title":["2022 31st Conference of Open Innovations Association (FRUCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9770852\/9770880\/09770915.pdf?arnumber=9770915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:09:41Z","timestamp":1656965381000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9770915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,27]]},"references-count":32,"URL":"https:\/\/doi.org\/10.23919\/fruct54823.2022.9770915","relation":{},"subject":[],"published":{"date-parts":[[2022,4,27]]}}}