{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T23:58:13Z","timestamp":1726099093447},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030602383"},{"type":"electronic","value":"9783030602390"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60239-0_42","type":"book-chapter","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T09:03:14Z","timestamp":1601370194000},"page":"619-632","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Stochastic Model-Based Quantitative Analysis of Edge UPF Service Dependability"],"prefix":"10.1007","author":[{"given":"Haoran","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Jing","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Xiaolin","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Jelena","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]},{"given":"Vojislav","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"key":"42_CR1","unstructured":"Weissberger, A.: Gartner: 5G IoT Endpoints to Triple between 2020 and 2021; Surveillance Cameras to be Largest Market over Next 3 Years, Ocotober 2019. \nhttps:\/\/techblog.comsoc.org\/2019\/10\/17\/gartner-5g-iot-endpoints-to-triple-between-2020-and-2021-surveillance-cameras-to-be-largest-market-over-next-3-years\/"},{"key":"42_CR2","unstructured":"Stephanie Overby, Edge Computing by the Numbers: 9 Compelling Stats, April 2020. \nhttps:\/\/enterprisersproject.com\/article\/2020\/4\/edge-computing-9-compelling-stats"},{"key":"42_CR3","unstructured":"3rd Generation Partnership Project(3GPP) TS 23.501 v15.7.0, System Architecture for the 5G System; stage 2(release 15), October 2019. \nhttp:\/\/www.3gpp.org\/ftp\/specs\/archive\/23series\/23_501\/"},{"key":"42_CR4","unstructured":"ETSI White Paper: MEC Deployments in 4G and Evolution Towards 5G. ETSI (2018)"},{"key":"42_CR5","unstructured":"Lee, D.,Park, J., Hiremath, C., Mangan, J., Lynch, M.: Accelerating the Virtualized User Plane for 5G Core Network Readliness. Intel solution brief (2018)"},{"key":"42_CR6","doi-asserted-by":"publisher","DOI":"10.1017\/9781316163047","volume-title":"Reliability and Availability Engineering: Modeling, Analysis, Applications","author":"KS Trivedi","year":"2017","unstructured":"Trivedi, K.S., Bobbio, A.: Reliability and Availability Engineering: Modeling, Analysis, Applications. Cambridge University Press, Cambridge (2017)"},{"key":"42_CR7","unstructured":"Yang C.: Building a Comprehensive Security System for MEC, March 2020. \nhttps:\/\/www.zte.com.cn\/global\/about\/magazine\/zte-technologies\/2020\/2-en\/Special-Topic\/3.html"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Fattore, U., Liebsch, M., Bernardos, C.J.: UPFlight: An Enabler for avionic MEC in a drone-extended 5G mobile network. In: VTC2020-Spring, pp. 1\u20137. IEEE (2020)","DOI":"10.1109\/VTC2020-Spring48590.2020.9128732"},{"key":"42_CR9","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1016\/j.future.2017.07.008","volume":"78","author":"M Ge","year":"2018","unstructured":"Ge, M., Hong, J.B., Yusuf, S.E., Kim, D.S.: Proactive defense mechanisms for the software-defined internet of things with non-patchable vulnerabilities. Future Gener. Comput. Syst. 78, 568\u2013582 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"23","key":"42_CR10","first-page":"16199","volume":"13","author":"W Kwan","year":"2018","unstructured":"Kwan, W., Sanguk, C., Sang, C.: Software architecture of a reliability prediction system. Int. J. Appl. Eng. Res. 13(23), 16199\u201316203 (2018)","journal-title":"Int. J. Appl. Eng. Res."},{"issue":"2","key":"42_CR11","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1093\/comjnl\/bxx049","volume":"61","author":"X Chang","year":"2018","unstructured":"Chang, X., Wang, T., Rodr\u00edguez, R.J., Zhang, Z.: Modeling and analysis of high availability techniques in a virtualized system. Comput. J. 61(2), 180\u2013198 (2018)","journal-title":"Comput. J."},{"key":"42_CR12","doi-asserted-by":"publisher","unstructured":"Chang, X., Shi, Y., Zhang Z., Xu Z., Trivedi, K.: Job completion time under migration-based dynamic platform technique. In: IEEE Transactions on Services Computing (2020) (Early Access). (\nhttps:\/\/doi.org\/10.1109\/tsc.2020.2989215\n\n)","DOI":"10.1109\/tsc.2020.2989215"},{"key":"42_CR13","doi-asserted-by":"publisher","first-page":"6448","DOI":"10.1109\/ACCESS.2019.2963397","volume":"8","author":"J Bai","year":"2020","unstructured":"Bai, J., Chang, X., Machida, F., Trivedi, K., Han, Z.: Analyzing software rejuvenation techniques in a virtualized system: service provider and user views. IEEE Access 8, 6448\u20136459 (2020)","journal-title":"IEEE Access"},{"key":"42_CR14","doi-asserted-by":"publisher","first-page":"89562","DOI":"10.1109\/ACCESS.2020.2993111","volume":"8","author":"L Jiang","year":"2020","unstructured":"Jiang, L., Chang, X., Bai, J., Mi\u0161i\u0107, J., Mi\u0161i\u0107, V., Chen, Z.: Dependability analysis of 5G-AKA authentication service from server and user perspectives. IEEE Access 8, 89562\u201389574 (2020)","journal-title":"IEEE Access"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Bovenzi, A., Alonso, J., Yamada, H., Russo, S., Trivedi, K.S.: Towards fast OS rejuvenation: An experimental evaluation of fast OS reboot techniques. In: ISSRE 2013, pp. 61\u201370. IEEE (2013)","DOI":"10.1109\/ISSRE.2013.6698905"},{"volume-title":"Probability and Statistics with Reliability, Queuing, and Computer Science Applications","year":"1982","author":"K Trivedi","key":"42_CR16","unstructured":"Trivedi, K.: Probability and Statistics with Reliability, Queuing, and Computer Science Applications. Prentice-hall, Englewood Cliffs (1982)"},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Kulkarni, V.: Introduction to Modeling and Analysis of Stochastic Systems. Springer New York (2011)","DOI":"10.1007\/978-1-4419-1772-0"},{"key":"42_CR18","doi-asserted-by":"crossref","unstructured":"Chang, X., Zhang, Z., Li, X., Trivedi, K.S.: Model-based survivability analysis of a virtualized system. In: LCN 2016, pp. 611\u2013614. IEEE (2016)","DOI":"10.1109\/LCN.2016.104"},{"key":"42_CR19","unstructured":"Maplesoft: The Essential Tool for Mathematics. \nhttp:\/\/www.maplesoft.com\/products\/maple"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60239-0_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T10:06:24Z","timestamp":1601373984000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-60239-0_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030602383","9783030602390"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60239-0_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/ica3pp2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"495","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"142","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"305","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}