iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1016/J.COMNET.2022.109038
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T02:55:44Z","timestamp":1720580144910},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1016\/j.comnet.2022.109038","type":"journal-article","created":{"date-parts":[[2022,5,18]],"date-time":"2022-05-18T02:45:21Z","timestamp":1652841921000},"page":"109038","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["An Opportunistic Vehicle-Based Task Assignment for IoT offloading"],"prefix":"10.1016","volume":"212","author":[{"given":"Khaled","family":"Sarieddine","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7648-1187","authenticated-orcid":false,"given":"Hassan","family":"Artail","sequence":"additional","affiliation":[]},{"given":"Haidar","family":"Safa","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2022.109038_b1","series-title":"Qualcomm launches autonomous driving computer, aiming to hit roads by 2023","author":"Nellis","year":"2020"},{"key":"10.1016\/j.comnet.2022.109038_b2","doi-asserted-by":"crossref","unstructured":"S. Yi, C. Li, Q. Li, A survey of fog computing: concepts, applications and issues, in: Proceedings of the 2015 Workshop on Mobile Big Data, 2015, pp. 37\u201342.","DOI":"10.1145\/2757384.2757397"},{"key":"10.1016\/j.comnet.2022.109038_b3","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.comnet.2018.01.004","article-title":"Vehicular cloud computing: Architectures, applications, and mobility","volume":"135","author":"Boukerche","year":"2018","journal-title":"Comput. Netw."},{"issue":"2","key":"10.1016\/j.comnet.2022.109038_b4","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MITS.2013.2240041","article-title":"Finding a STAR in a vehicular cloud","volume":"5","author":"Mershad","year":"2013","journal-title":"IEEE Intell. Transp. Syst. Mag."},{"key":"10.1016\/j.comnet.2022.109038_b5","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.adhoc.2018.03.010","article-title":"Heterogeneous vehicular communications: A comprehensive study","volume":"75","author":"Zekri","year":"2018","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.comnet.2022.109038_b6","doi-asserted-by":"crossref","first-page":"28019","DOI":"10.1109\/ACCESS.2018.2840504","article-title":"Efficient and privacy-preserving medical data sharing in Internet of Things with limited computing power","volume":"6","author":"Zheng","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2022.109038_b7","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1016\/j.future.2019.09.039","article-title":"Scheduling Internet of Things requests to minimize latency in hybrid Fog\u2013Cloud computing","volume":"111","author":"Aburukba","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.comnet.2022.109038_b8","series-title":"China\u2019s data centers emit as much carbon as 21 million cars","author":"Zaugg","year":"2019"},{"key":"10.1016\/j.comnet.2022.109038_b9","series-title":"How google powers its \u2019monopoly\u2019 with enough electricity for entire countries","author":"Bryce","year":"2020"},{"key":"10.1016\/j.comnet.2022.109038_b10","unstructured":"Efficiency \u2013 Data centers. URL https:\/\/www.google.com\/about\/datacenters\/efficiency\/#."},{"issue":"5","key":"10.1016\/j.comnet.2022.109038_b11","doi-asserted-by":"crossref","first-page":"1728","DOI":"10.1109\/JSAC.2016.2545559","article-title":"Fog computing may help to save energy in cloud computing","volume":"34","author":"Jalali","year":"2016","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.comnet.2022.109038_b12","series-title":"2012 the 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net)","first-page":"152","article-title":"Vehicular cloud computing","author":"Gerla","year":"2012"},{"key":"10.1016\/j.comnet.2022.109038_b13","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.jnca.2013.08.004","article-title":"A survey on vehicular cloud computing","volume":"40","author":"Whaiduzzaman","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.comnet.2022.109038_b14","doi-asserted-by":"crossref","unstructured":"V. Soto, R.E. De\u00a0Grande, A. Boukerche, REPRO: time-constrained data retrieval for edge offloading in vehicular clouds, in: Proceedings of the 14th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, 2017, pp. 47\u201354.","DOI":"10.1145\/3134829.3134834"},{"issue":"1","key":"10.1016\/j.comnet.2022.109038_b15","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MVT.2018.2879647","article-title":"Mobile edge computing for the Internet of vehicles: Offloading framework and job scheduling","volume":"14","author":"Feng","year":"2018","journal-title":"IEEE Veh. Technol. Mag."},{"key":"10.1016\/j.comnet.2022.109038_b16","series-title":"International Conference on Algorithms and Architectures for Parallel Processing","first-page":"728","article-title":"Computation offloading management for vehicular ad hoc cloud","author":"Li","year":"2014"},{"issue":"1","key":"10.1016\/j.comnet.2022.109038_b17","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MWC.2015.7054724","article-title":"VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks","volume":"22","author":"Bitam","year":"2015","journal-title":"IEEE Wirel. Commun."},{"key":"10.1016\/j.comnet.2022.109038_b18","article-title":"A novel contract theory-based incentive mechanism for cooperative task-offloading in electrical vehicular networks","author":"Kazmi","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.comnet.2022.109038_b19","series-title":"2016 IEEE 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","first-page":"1","article-title":"Storage on wheels: Offloading popular contents through a vehicular cloud","author":"Vigneri","year":"2016"},{"issue":"8","key":"10.1016\/j.comnet.2022.109038_b20","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.5014","article-title":"An opportunistic resource management model to overcome resource-constraint in the Internet of Things","volume":"31","author":"Safa","year":"2019","journal-title":"Concurr. Comput.: Pract. Exper."},{"issue":"5","key":"10.1016\/j.comnet.2022.109038_b21","doi-asserted-by":"crossref","first-page":"8897","DOI":"10.1109\/JIOT.2019.2924182","article-title":"Opportunistic fog for IoT: Challenges and opportunities","volume":"6","author":"Fernando","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2022.109038_b22","doi-asserted-by":"crossref","first-page":"104405","DOI":"10.1109\/ACCESS.2019.2929683","article-title":"Data and task offloading in collaborative mobile fog-based networks","volume":"7","author":"Ciobanu","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2022.109038_b23","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107496","article-title":"A survey on the computation offloading approaches in mobile edge computing: A machine learning-based perspective","author":"Shakarami","year":"2020","journal-title":"Comput. Netw."},{"issue":"9","key":"10.1016\/j.comnet.2022.109038_b24","doi-asserted-by":"crossref","first-page":"1719","DOI":"10.1002\/spe.2839","article-title":"A review on the computation offloading approaches in mobile edge computing: A game-theoretic perspective","volume":"50","author":"Shakarami","year":"2020","journal-title":"Softw. - Pract. Exp."},{"issue":"4","key":"10.1016\/j.comnet.2022.109038_b25","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1007\/s10723-020-09530-2","article-title":"A survey on the computation offloading approaches in mobile edge\/cloud computing environment: a stochastic-based perspective","volume":"18","author":"Shakarami","year":"2020","journal-title":"J. Grid Comput."},{"issue":"12","key":"10.1016\/j.comnet.2022.109038_b26","doi-asserted-by":"crossref","first-page":"2212","DOI":"10.1002\/spe.2888","article-title":"Joint computation offloading and resource provisioning for edge-cloud computing environment: A machine learning-based approach","volume":"50","author":"Shahidinejad","year":"2020","journal-title":"Softw. - Pract. Exp."},{"key":"10.1016\/j.comnet.2022.109038_b27","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2021.102974","article-title":"An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach","volume":"178","author":"Shakarami","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"issue":"8","key":"10.1016\/j.comnet.2022.109038_b28","doi-asserted-by":"crossref","first-page":"8265","DOI":"10.1007\/s12652-020-02561-3","article-title":"Autonomous computation offloading and auto-scaling the in the mobile fog computing: a deep reinforcement learning-based approach","volume":"12","author":"Jazayeri","year":"2021","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"10.1016\/j.comnet.2022.109038_b29","series-title":"2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)","first-page":"288","article-title":"Delay constrained offloading for mobile edge computing in cloud-enabled vehicular networks","author":"Zhang","year":"2016"},{"key":"10.1016\/j.comnet.2022.109038_b30","series-title":"2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","first-page":"1","article-title":"Fog following me: Latency and quality balanced task allocation in vehicular fog computing","author":"Zhu","year":"2018"},{"issue":"5","key":"10.1016\/j.comnet.2022.109038_b31","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1109\/JIOT.2017.2726014","article-title":"A survey of clustering techniques in WSNs and consideration of the challenges of applying such to 5G IoT scenarios","volume":"4","author":"Xu","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2022.109038_b32","series-title":"2014 IEEE Global Communications Conference","first-page":"4758","article-title":"Stochastic analysis of a cellular network with mobile relays","author":"Chen","year":"2014"},{"key":"10.1016\/j.comnet.2022.109038_b33","series-title":"2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","first-page":"59","article-title":"Mobile relay node in public transportation for serving outside LTE cell edge users","author":"Charaf","year":"2015"},{"key":"10.1016\/j.comnet.2022.109038_b34","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107359","article-title":"A framework for mobile relay node selection for serving outdoor cell edge users","volume":"178","author":"Sarieddine","year":"2020","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2022.109038_b35","series-title":"Ns-3 simulator","year":"2019"},{"key":"10.1016\/j.comnet.2022.109038_b36","series-title":"Sumo traffic simulator","year":"2019"},{"key":"10.1016\/j.comnet.2022.109038_b37","series-title":"2012 Proceedings of IEEE Southeastcon","first-page":"1","article-title":"Vehicular network simulation propagation loss model parameter standardization in ns-3 and beyond","author":"Benin","year":"2012"},{"issue":"5","key":"10.1016\/j.comnet.2022.109038_b38","doi-asserted-by":"crossref","first-page":"1448","DOI":"10.1109\/TITS.2015.2507939","article-title":"A stochastic geometry approach to the modeling of DSRC for vehicular safety communication","volume":"17","author":"Tong","year":"2016","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.comnet.2022.109038_b39","series-title":"2010 International Conference on Measuring Technology and Mechatronics Automation, Vol. 2","first-page":"1031","article-title":"Research and application of zigbee protocol stack","author":"Li","year":"2010"},{"key":"10.1016\/j.comnet.2022.109038_b40","series-title":"Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014","first-page":"1","article-title":"Multihop transmission and retransmission measurement of real-time video streaming over DSRC devices","author":"Jiang","year":"2014"},{"issue":"1","key":"10.1016\/j.comnet.2022.109038_b41","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1186\/s13174-018-0087-2","article-title":"A comprehensive survey on machine learning for networking: evolution, applications and research opportunities","volume":"9","author":"Boutaba","year":"2018","journal-title":"J. Internet Serv. Appl."},{"key":"10.1016\/j.comnet.2022.109038_b42","doi-asserted-by":"crossref","first-page":"97307","DOI":"10.1109\/ACCESS.2019.2929480","article-title":"Deep learning-based dynamic bandwidth allocation for future optical access networks","volume":"7","author":"Hatem","year":"2019","journal-title":"IEEE Access"},{"issue":"7","key":"10.1016\/j.comnet.2022.109038_b43","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MC.2006.242","article-title":"On the credibility of manet simulations","volume":"39","author":"Andel","year":"2006","journal-title":"Computer"},{"issue":"8","key":"10.1016\/j.comnet.2022.109038_b44","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/TMC.2008.18","article-title":"COACS: A cooperative and adaptive caching system for MANETs","volume":"7","author":"Artail","year":"2008","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.comnet.2022.109038_b45","series-title":"2020 International Wireless Communications and Mobile Computing (IWCMC)","first-page":"1672","article-title":"Securing smart grid communication using ethereum smart contracts","author":"Akhras","year":"2020"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138912862200189X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S138912862200189X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,2]],"date-time":"2023-04-02T17:49:09Z","timestamp":1680457749000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S138912862200189X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":45,"alternative-id":["S138912862200189X"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.comnet.2022.109038","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2022,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An Opportunistic Vehicle-Based Task Assignment for IoT offloading","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2022.109038","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"109038"}}