{"id":"https://openalex.org/W2889944661","doi":"https://doi.org/10.1109/netsoft.2018.8459971","title":"Load Profiling and Migration for Effective Cyber Foraging in Disaster Scenarios with FORMICA","display_name":"Load Profiling and Migration for Effective Cyber Foraging in Disaster Scenarios with FORMICA","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2889944661","doi":"https://doi.org/10.1109/netsoft.2018.8459971","mag":"2889944661"},"language":"en","primary_location":{"id":"doi:10.1109/netsoft.2018.8459971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft.2018.8459971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004916391","display_name":"Agnese V. Ventrella","orcid":"https://orcid.org/0000-0003-2290-1574"},"institutions":[{"id":"https://openalex.org/I47838141","display_name":"Saint Louis University","ror":"https://ror.org/01p7jjy08","country_code":"US","type":"education","lineage":["https://openalex.org/I47838141"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Agnese V. Ventrella","raw_affiliation_strings":["Computer Science Department, Saint Louis University, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Saint Louis University, USA","institution_ids":["https://openalex.org/I47838141"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055238253","display_name":"Flavio Esposito","orcid":"https://orcid.org/0000-0002-7798-4584"},"institutions":[{"id":"https://openalex.org/I47838141","display_name":"Saint Louis University","ror":"https://ror.org/01p7jjy08","country_code":"US","type":"education","lineage":["https://openalex.org/I47838141"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Flavio Esposito","raw_affiliation_strings":["Computer Science Department, Saint Louis University, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Saint Louis University, USA","institution_ids":["https://openalex.org/I47838141"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016396522","display_name":"L. A. Grieco","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099310","display_name":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni","ror":"https://ror.org/0182a5n39","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210099310"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"L. Alfredo Grieco","raw_affiliation_strings":["CNIT, Consorzio Nazionale Interuniversitario per le Telecomunicazioni"],"affiliations":[{"raw_affiliation_string":"CNIT, Consorzio Nazionale Interuniversitario per le Telecomunicazioni","institution_ids":["https://openalex.org/I4210099310"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004916391"],"corresponding_institution_ids":["https://openalex.org/I47838141"],"apc_list":null,"apc_paid":null,"fwci":1.4763,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.84401876,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"12","issue":null,"first_page":"80","last_page":"87"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9779999852180481,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7728833556175232},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.7069518566131592},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5431865453720093},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5251868963241577},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5011281967163086},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.48347336053848267},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.41624200344085693},{"id":"https://openalex.org/keywords/mobile-edge-computing","display_name":"Mobile edge computing","score":0.4141482710838318},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37688425183296204},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.3551521897315979},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.327094167470932},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.30912309885025024},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14517760276794434}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7728833556175232},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.7069518566131592},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5431865453720093},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5251868963241577},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5011281967163086},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.48347336053848267},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.41624200344085693},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.4141482710838318},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37688425183296204},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3551521897315979},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.327094167470932},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.30912309885025024},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14517760276794434},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/netsoft.2018.8459971","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft.2018.8459971","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1539689205","https://openalex.org/W1566442329","https://openalex.org/W1948092788","https://openalex.org/W2015597701","https://openalex.org/W2023380813","https://openalex.org/W2045129218","https://openalex.org/W2051069559","https://openalex.org/W2087469600","https://openalex.org/W2091333543","https://openalex.org/W2101788345","https://openalex.org/W2113064512","https://openalex.org/W2165600975","https://openalex.org/W2505834126","https://openalex.org/W2547727199","https://openalex.org/W2559827423","https://openalex.org/W2585277580","https://openalex.org/W2612354384","https://openalex.org/W2742681813","https://openalex.org/W2763832653","https://openalex.org/W2768569742","https://openalex.org/W6632151979","https://openalex.org/W6640611774","https://openalex.org/W6672452922","https://openalex.org/W6684492297","https://openalex.org/W6745454752"],"related_works":["https://openalex.org/W3154796165","https://openalex.org/W4361251304","https://openalex.org/W3139051647","https://openalex.org/W2902693277","https://openalex.org/W4378977105","https://openalex.org/W3024547383","https://openalex.org/W4210813012","https://openalex.org/W3174690704","https://openalex.org/W4221092438","https://openalex.org/W4385335479"],"abstract_inverted_index":{"Cyber":[0],"foraging":[1,25,77],"techniques":[2],"have":[3],"been":[4],"proposed":[5],"in":[6,173],"edge":[7,32,129,151],"computing":[8,152],"to":[9,45,64,82,141,154,183],"support":[10],"resource-intensive":[11],"and":[12,36,40,61,118,131],"latency-sensitive":[13,186],"mobile":[14,94,110,135],"applications.":[15,187],"In":[16,50,68],"a":[17,88,105,163],"natural":[18],"or":[19],"man-made":[20],"disaster":[21],"scenario,":[22],"all":[23],"cyber":[24,76],"challenges":[26],"are":[27,34,42,100],"exacerbated":[28],"by":[29,127,133],"two":[30],"problems:":[31],"nodes":[33],"scarce":[35],"hence":[37],"easily":[38],"overloaded":[39],"failures":[41],"common":[43],"due":[44],"the":[46,55,84,109,122,128,134,143,150,167],"ad-hoc":[47],"hostile":[48],"conditions.":[49],"this":[51],"paper,":[52],"we":[53,70],"study":[54],"use":[56],"of":[57,87,90,108,146,149,169],"efficient":[58],"load":[59,144,157],"profiling":[60,158],"migration":[62],"strategies":[63],"mitigate":[65],"such":[66],"problems.":[67],"particular,":[69],"propose":[71],"FORMICA,":[72],"an":[73],"architecture":[74,113,172],"for":[75],"orchestration,":[78],"whose":[79],"goal":[80],"is":[81,125,181],"minimize":[83],"completion":[85],"time":[86],"set":[89],"jobs":[91],"offloaded":[92],"from":[93],"devices.":[95],"Existing":[96],"service":[97],"offloading":[98,117,123],"solutions":[99],"mainly":[101],"concerned":[102],"with":[103],"outsourcing":[104],"job":[106],"out":[107],"responsibility.":[111],"Our":[112,160],"supports":[114],"both":[115],"mobile-based":[116],"backend-driven":[119],"onloading":[120],"i.e.,":[121],"decision":[124],"taken":[126],"infrastructure":[130,153],"not":[132],"node.":[136],"FORMICA":[137],"leverages":[138],"Gelenbe":[139],"networks":[140],"estimate":[142],"profile":[145],"each":[147],"node":[148],"make":[155],"proactive":[156],"decisions.":[159],"evaluation":[161],"on":[162],"proof-of-concept":[164],"implementation":[165],"shows":[166],"benefits":[168],"our":[170],"policy-based":[171],"several":[174],"(challenged":[175],"disaster)":[176],"scenarios":[177],"but":[178],"its":[179],"applicability":[180],"broad":[182],"other":[184],"IoT-based":[185]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
