<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>September</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Scalability and Robustness of Ant Search in Edge-Fog-Cloud Distributed Knowledge Graphs</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Chepizhko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Péter Forgács</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Melanie Schranz</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lakeside Labs GmbH</institution>
          ,
          <addr-line>9020, Klagenfurt</addr-line>
          ,
          <country country="AT">Austria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>22</volume>
      <issue>2025</issue>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>This paper investigates the scalability of a variant of the well-known Ant Colony Optimization (ACO) algorithm for search operations in a distributed knowledge graph, with a focus on the algorithm's performance under increasing query loads. The data is represented as RDF triples, and the underlying network topology models a typical edge-fog-cloud architecture, reflecting scenarios relevant to the edge-cloud domain. Assuming nodes with infinite processing capacity, we show that the hit rate, the primary performance metric, initially increases with query frequency and eventually saturates. In contrast, when node processing capacity is finite, the hit rate exhibits a critical threshold after which performance declines. We analyze the behavior of the system under diferent query regimes, focusing on network utilization and pheromone-level dynamics. Finally, we discuss the feasibility of implementing such a system in practice and its potential implications for real-world applications.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Edge-Fog-Cloud Computing</kwd>
        <kwd>Ant Colony Optimization</kwd>
        <kwd>Distributed Knowledge Graphs</kwd>
        <kwd>Scalability in Swarms</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The Edge-Fog-Cloud continuum represents a transformative paradigm in distributed computing, driven
by the increase of complexity in IoT (Internet of Things) devices, its number in a running system,
and data-intesive applications to be processed. Traditional cloud-centric models face key limitations,
such as latency, privacy concerns, and energy ineficiency. Distributed computation paradigms are
closer to the data sources in the edge and fog layers, thus enhancing overall system performance
and responsiveness [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The edge layer, in particular, ofers critical advantages that include increased
security, reduced latency and energy consumption, support for autonomous operations, and adaptability
to dynamic data volumes and heterogeneous users [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Robustness in such distributed environments is essential due to the dynamic and often unpredictable
nature of edge-fog-cloud networks. Systems must withstand challenges posed by malicious agents that
can disrupt data integrity or routing, nodes that fail unexpectedly, intermittent link breaks, and the
continuous addition or removal of nodes reflecting network mobility and scaling. These factors create a
volatile environment where search and data management operations must adapt to maintain eficiency
and accuracy. Testing for node movement and network changes is thus critical to evaluate the resilience
of algorithms and protocols designed for this continuum. The search in dynamic environments of
distributed knowledge graphs requires scalable, robust, and eficient solutions capable of handling such
uncertainties [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <sec id="sec-1-1">
        <title>1.1. Contribution</title>
        <p>
          Ant Colony Optimization (ACO), inspired by the foraging behavior of ants, ofers a promising approach to
address these challenges. By leveraging decentralized, self-organizing mechanisms based on pheromone
trails, ACO algorithms can dynamically adapt to network changes, optimize routing paths, and maintain
high search performance even under varying loads and network conditions [
          <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
          ]. This paper investigates
the scalability and robustness of an ACO variant applied to search operations over Resource Description
Framework (RDF) triple-based knowledge graphs distributed across an edge-fog-cloud architecture,
analyzing performance under diferent query loads and network dynamics.
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>1.2. Outline</title>
        <p>The paper is organized as follows: Section 2 gives a general description of the problem and a detailed
system model of the DKG in the edge-fog-cloud continuum. Section 3 summarizes the related work for
RDF (Resource Description Framework), ACO and scalability analyses in swarms. Section 4 presents
the main principles for the ACO-related pheromone search in the network. The evaluation of the hit
rate and network utilization is described in Section 5 forming the base for the actual scalability analysis
in Section 6. The paper is concluded in Section 7.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <sec id="sec-2-1">
        <title>2.1. Problem Statement</title>
        <p>We study search and data movement on a distributed knowledge graph (DKG) using the ACO algorithm.
The architecture of our knowledge graph is reflecting an example of the edge-fog-cloud continuum. We
assess the complex system properties, such as scalability, fault tolerance and robustness, and adaptability.
Our approach is compared with other known search algorithms with respect to their eficiency.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. System Model</title>
        <p>
          The edge-fog-cloud continuum is modeled as a hierarchical network that dynamically maps diferent
slices of the DKG across the edge, fog, and cloud layers. An example of a hierarchical network is
shown in Figure 1, where the proportion of edge-fog-cloud nodes is 5 : 4 : 1. The DKG is a novel
approach to knowledge representation and data management [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], and provides a real-time perspective
of relevant data distributed throughout the network. Physically, each part of the DKG is stored on a
device such as an IoT device, or a (micro) data center, forming the edge-fog-cloud continuum. The DKG
is represented using the RDF, which stores data as a directed graph. RDF expresses data in the form of
triples: subject-predicate-object [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. In this work, the DKG triples are distributed across various devices,
without a central overview. Therefore, we model the DKG as an undirected graph (, ), where the
vertices  represent the physical nodes  = {1, 2, . . . ,  }, and the edges  represent the (physical)
connections between the nodes  , forming the neighborhoods ℵ ⊆  : ⇐⇒ ∀ ∈ ℵ :  ∈  . The
graph is finite, but dynamic, as nodes can be added or removed at runtime. For this study, we consider
a constant number of nodes. The data partitions  = {1, 2, . . . ,  , . . . ,  } are distributed over the
nodes  , where each partition consists of a set of triples  = ⋃︀|=1| ⟨ ,  ,  ⟩, with | | denoting
the number of triples on the node  . A query  represents a pattern in which one or more positions
of the triple subject-predicate-object are replaced by a wildcard (an asterisk). For example, a query
for an unknown subject with a known predicate  and an object  can be formalized as  = ⟨* , , ⟩.
Other types of query follow the same logic. If a node  contains at least one triple that matches the
query pattern, we call it a matching node  . For each query, there exists a set of all matching nodes,
ℳ = {1, 2, . . . ,  }, where ℳ ⊆  and  = |ℳ| is the number of matching nodes in the
network. If no matching triples are present on any node, then the set is empty ℳ = ∅. A node can
hold more than one matching triple.
        </p>
        <p>Each query  maps to a keyword  derived from its predicate  and object , typically via string
concatenation or hashing. This keyword uniquely identifies a pheromone in the ACO system.</p>
        <p>Each node  maintains: a list of direct neighbors ℵ; a record of forward ants ℱ, tracking which
=1 (), storing pheromone values for each keyword 
ants have visited; a pheromone table  = ⋃︀|ℵ|  
toward neighbor  ; a link cost table ℒ = ⋃︀|ℵ|   , listing the costs to each neighbor.
=1
cloud
fog
edge</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Related Work</title>
      <p>
        Processing large-scale RDF datasets [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] presents significant challenges that demand modern algorithmic
techniques and optimization strategies, given the ever increasing data volumes. Eficient slicing and
querying of such vast knowledge bases can be achieved through algorithmic improvements [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Several
enhancements to these engines have been proposed [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]; for instance, leveraging the FLINK framework
has shown promise for processing distributed RDF stores [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. In addition, advanced methods such as
evolutionary algorithms have been explored to support eficient search in DKG [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], and the use of
ACO techniques has also been suggested.
      </p>
      <p>
        Ant optimization is a robust model introduced in seminal works [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]. By employing virtual ants
that navigate a network in search of “food" and deposit pheromone trails, optimal routes between
key resources can be swiftly identified. ACO algorithms represent problems as graphs, where each
solution corresponds to a path. The cost of a solution is determined by the cumulative costs of the
path’s edges, with the objective being to discover the path with the minimum cost. This algorithm has
demonstrated success across diverse applications and variations, including vehicle routing [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], vehicle
routing with pickup and delivery [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], and job-shop scheduling [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Also, ACO has been proven to be
successful when used for dynamic routing for mobile networks [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Ant optimization has also been
applied efectively within the realm of knowledge graphs. For example, the use of ant optimization
algorithms has been explored to support chained queries for large RDF datasets [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. We would like to
utilize it for the search for data in DKGs, as already proposed by the authors in [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ].
      </p>
      <p>
        The properties of complex systems, such as scalability, robustness, or fault tolerance, require precise
formulations and measurements [
        <xref ref-type="bibr" rid="ref19 ref20">19, 20</xref>
        ]. The question of scalability both in computing and in robotics
has attracted much research attention [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. In these studies, it has been shown that the performance
of a swarming system may increase (to a limit) with increasing the number of involved agents and
that this is an important characteristic of a self-organized swarm system. We are interested to study
whether the ACO algorithm for DKG shows this important property.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Pheromone-based Search</title>
      <p>The ACO-based search algorithm operates through two primary mechanisms: trail following and
trail laying.</p>
      <p>Trail following When a query reaches a node , it generates a forward ant that follows one of
two strategies: exploration or exploitation. The ant randomly selects between these strategies with
probability . In the exploration strategy, the ant probabilistically selects its next node  ∈ ℵ based
on local pheromone levels  () and link costs   , as defined by:</p>
      <p>() =</p>
      <p>()
  ·</p>
      <p>()
∑︀|ℵ|  
=1
·</p>
      <p>,
()
  ≥</p>
      <p>1 ∑|ℵ︁|
|ℵ| =1
 () ,
where  controls how strongly the pheromone level influences the decision. In this study, we set  = 1
and the link costs to 1. Future extensions could dynamically adjust these costs based on experience, e.g.,
increasing the cost for links with high latency or low computational performance. The probability in
Eq. (1) is calculated across all neighbors of , meaning that the forward ant can split and send clones
to multiple neighbors simultaneously. In the exploitation strategy, the ant selects all neighbors 
satisfying:
thus focusing only on the best-performing options. In this study, the probability of choosing either
strategy is set to 0.5. When a forward ant arrives at node  , it checks the forward ant record of the
node (ℱ ) and terminates if a clone of the same ant has already visited that node, preventing redundant
exploration.</p>
      <p>Trail laying As the query traverses the network, a backward ant is launched to retrace the route and
update pheromone levels, reinforcing successful paths. The pheromone value at node  is updated as:
 () ←  () +  , where  =  0 + (1 − ) · 2·0 . Here,  is the weighting factor (with  = 0.5
in this study),  is the number of matching triples, 0 = 10 and 0 = 3 are constants, and  is the
query response time. This ensures that the amount of pheromones is proportional to both the quality
of the resources found and the eficiency of the path. Pheromone trails evaporate over time with an
evaporation factor  ∈ [0, 1), gradually removing less optimal paths:  ( + 1) =  ()(1 − ).</p>
    </sec>
    <sec id="sec-5">
      <title>5. Hit Rate and Network Utilization</title>
      <p>Hit Rate The global hit rate is a key performance metric as it reflects the proportion of matching
nodes found on average. Long-time behavior shows that time-dependent hit rate reaches a steady state,
ℎ := lim→∞⟨ℎ()⟩, where ⟨. . . ⟩ stands for the average over diferent simulation runs. In Figure 2 we
report ℎ for two diferent matching node numbers:  = 15 and  = 60, with a total number of nodes
 = 150. For each of them we consider the curves ℎ( ) for selected values of evaporation coeficient :
we consider three small values,  = 0.009, 0.05, 0.1, one intermediate,  = 0.5, and one large,  = 0.9.
For small values of , we see high hit rates, which increase only very slightly with  and decrease
steadily with  . The behavior at intermediate values of  is notable: it begins with low hit rates at
(1)
(2)
small  , but increases rapidly as the query frequency increases. At the largest , it exhibits quite large
hit rates, comparable to low  values. Then, as  increases, the hit rate quickly drops. Further increase
of  leads to a steady growth of the hit rate, again associated with the crossing of a critical threshold.
This drastic diference in ℎ( ) behavior can be explained if we refer to the characteristic time,  = 1/,
after which a significant quantity of the pheromone evaporates. For  ≤ 0.1, it is  ≥ 10 ticks, which is
enough to traverse the largest distance in the network,  = 5, twice. This ensures a stable pheromone
network and good performance reflected in hit rate even for low query frequencies. However, for
 = 0.5, the characteristic time is  = 2, which is small, but might be enough for the pheromones to
stay on the short paths with the situation improving when the query frequency increases. For  = 0.9
the characteristic time  ≈ 1.11. This leads to a very quick pheromone evaporation. Higher frequencies
are beneficial for the pheromone routes as they allow pheromone tables to be updated many times per
time step to resist evaporation.</p>
      <p>Forward Ants We measure the average number of forward ants  () present in the system at each
time step. This quantity serves as a proxy for network utilization, as each ant can be interpreted as a
message sent between nodes. To make things comparable, we introduce relative number of forward
ants,  () :=  () , we normalize the number of forward ants  () by the number of nodes 

and by query frequency  . We measure the long-term average values of  () and show them for
diferent parameter values in Figure 3. The curves for small  ≤ 0.1 values all follow each other at
the value of  ≈ 0.2 for  = 15 and the value of  ≈ 0.45 for  = 60. This can be compared
with a baseline value of / . For a small number of matching nodes,  = 15, we see that the actual
values of the forward ants are twice higher. For large  = 60, the value of  is much closer to the
baseline. The intermediate value,  = 0.5, shows a consistently small number of forward ants, which
grows with  . For the case of  = 15, the  ( ) values are still higher than the baseline. The behavior
of the curve  ( ) for the highest value of the evaporation coeficient,  = 0.9, is the most peculiar.
At first, we see a large number of forward ants, especially when  is relatively small. Thus, one can
speculate that the relatively higher hit rate for  = 0.9 at low  is connected to the fact that many
forward ants are created, while it is relatively low for  = 0.5, so there are very few forward ants. At
low query frequency and large evaporation coeficient, we might see the behavior of the algorithm
where it produces too many forward ants.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Scalability</title>
      <p>
        We follow [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] for scalability and adopt the general formula  := %%ΔΔ , where %Δ is the change
in performance and %Δ is the change in agent number. Our performance is measured as the hit
rate ℎ. Then, we can use  as a proxy for the number of agents  . We then re-write the formula as
 = (ℎ + − ℎ )/ℎ .
      </p>
      <p>/</p>
      <p>Scalability,  exhibits a diferent behavior for diferent sets of parameters (see Figure 4). We know
that for low  values, there is almost no dependence of ℎ on  , so scalability stays around zero in
p0.009
0.05
0.1
0.5
0.9</p>
      <p>S
iil,t
y
b
a
l
a
c
S</p>
      <p>S
iil,t
y
b
a
l
a
c
S
this case. Since the system already performs well at low values of  , increasing the query frequency
does not produce significant performance gains. Furthermore, because nodes are assumed to have
infinite processing capacity, higher values of  do not lead to any performance degradation. For the
intermediate value of  = 0.5 we see that scalability goes above zero and in some cases even above one
as  increases highlighting the emergence of the pheromone routes which facilitate the search. For the
highest value of the evaporation coeficient  = 0.9, the picture is even more interesting. As we know,
for very little  values a large number of forward ants is present, resulting in relatively high values of ℎ
and overall performance of the search algorithm. Thus, increasing  marks a transition from many to
few forward ants, while the routes are not stable enough to guide the ants. Then, with increasing  ,
stable pheromone routes start to appear, and the scalability not only becomes positive but also  &gt; 1,
indicating super-critical growth. For even higher values of  , the scalability steadily approaches zero,
which means that the system is reaching its peak performance.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusion</title>
      <p>In this work, we applied the Ant Colony Optimization (ACO) algorithm to the problem of searching
in distributed knowledge graphs (DKGs) structured according to an edge–fog–cloud continuum. We
demonstrated that in systems with infinite processing capacity, increasing the query frequency leads to
more eficient pheromone trails and improved hit rates. In particular, in settings with a high evaporation
coeficient, we observed an emergent scalability efect, where higher query frequency reinforced
pheromone-based routing.</p>
      <p>Future work will examine this hypothesis, along with the model’s robustness and fault tolerance,
such as resilience to node or link failures or to errors in pheromone signal interpretation. Another
key direction is the practical implementation of this search mechanism in real-world edge–cloud
infrastructures. Our ongoing work focuses on implementing ACO using forward and backward ants as
messages exchanged between nodes, dynamically updating local pheromone tables.</p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgments</title>
      <p>Funded by the European Union, project GLACIATION, by grant No. 101070141. Views and opinions
expressed are, however, those of the author(s) only and do not necessarily reflect those of the European
Union. Neither the European Union nor the granting authority can be held responsible for them.</p>
    </sec>
    <sec id="sec-9">
      <title>Declaration on Generative AI</title>
      <p>The authors used ChatGPT for grammar and spelling checks. All content was subsequently reviewed
and edited by the authors, who take full responsibility for the final publication.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>F.</given-names>
            <surname>Firouzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Farahani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Marinšek</surname>
          </string-name>
          ,
          <article-title>The convergence and interplay of edge, fog, and cloud in the AI-driven internet of things (IoT)</article-title>
          ,
          <source>Journal of Systems Architecture</source>
          <volume>122</volume>
          (
          <year>2022</year>
          )
          <fpage>102193</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>A. O'Mahony</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Buining</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Forgács</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Schranz</surname>
          </string-name>
          ,
          <article-title>Swarm intelligence for green data orchestration - a vision for energy-eficient computing in the edge continuum</article-title>
          ,
          <source>in: Proceedings of the Edge AI meets Swarm Intelligence Technical Workshop</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>O.</given-names>
            <surname>Chepizhko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Forgacs</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schranz</surname>
          </string-name>
          ,
          <article-title>Ant-search algorithm for distributed knowledge graphs</article-title>
          ,
          <source>in: Proceedings of the 14th International Conference on Swarm Intelligence</source>
          , Springer,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>O.</given-names>
            <surname>Chepizhko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Forgacs</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schranz</surname>
          </string-name>
          ,
          <article-title>Ant colony optimization for data search and movement in the edge-fog-cloud continuum</article-title>
          ,
          <source>in: Proceedings of the 9th IEEE International Conference on Fog and Edge Computing</source>
          <year>2025</year>
          ,
          <year>2025</year>
          , p.
          <fpage>5</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Fensel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Şimşek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Angele</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Huaman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Kärle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Panasiuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Toma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Umbrich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wahler</surname>
          </string-name>
          , Knowledge Graphs: Methodology, Tools and Selected Use Cases, Springer International Publishing,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>N.</given-names>
            <surname>Gibbins</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Shadbolt</surname>
          </string-name>
          ,
          <article-title>Resource description framework (RDF)</article-title>
          ,
          <source>Wide Web Consortium</source>
          <year>2004</year>
          (
          <year>2009</year>
          )
          <fpage>4539</fpage>
          -
          <lpage>4547</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>W.</given-names>
            <surname>Ali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Saleem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Yao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hogan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.-C. N.</given-names>
            <surname>Ngomo</surname>
          </string-name>
          ,
          <article-title>A survey of rdf stores: Sparql engines for querying knowledge graphs</article-title>
          ,
          <source>The International Journal on Very Large Data Bases</source>
          <volume>31</volume>
          (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>26</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E.</given-names>
            <surname>Marx</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shekarpour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Auer</surname>
          </string-name>
          , A.
          <string-name>
            <surname>-C. Ngonga Ngomo</surname>
          </string-name>
          ,
          <article-title>Large-scale RDF dataset slicing</article-title>
          ,
          <source>in: Proceedings of the 7th IEEE International Conference on Semantic Computing</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>228</fpage>
          -
          <lpage>235</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Potter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Motik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Nenov</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Horrocks</surname>
          </string-name>
          ,
          <article-title>Dynamic data exchange in distributed RDF stores</article-title>
          ,
          <source>IEEE Transactions on Knowledge and Data Engineering</source>
          <volume>30</volume>
          (
          <year>2018</year>
          )
          <fpage>2312</fpage>
          -
          <lpage>2325</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Azzam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kirrane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Polleres</surname>
          </string-name>
          ,
          <article-title>Towards making distributed RDF processing FLINKer</article-title>
          , Innovate
          <string-name>
            <surname>Data</surname>
          </string-name>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>C.</given-names>
            <surname>Gueret</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Schlobach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Dentler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schut</surname>
          </string-name>
          , G. Eiben,
          <article-title>Evolutionary and swarm computing for the semantic web</article-title>
          ,
          <source>IEEE Computational Intelligence Magazine</source>
          <volume>7</volume>
          (
          <year>2012</year>
          )
          <fpage>16</fpage>
          -
          <lpage>31</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dorigo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. M.</given-names>
            <surname>Gambardella</surname>
          </string-name>
          ,
          <article-title>Ant colonies for the travelling salesman problem</article-title>
          , biosystems
          <volume>43</volume>
          (
          <year>1997</year>
          )
          <fpage>73</fpage>
          -
          <lpage>81</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dorigo</surname>
          </string-name>
          , T. Stützle,
          <article-title>The ant colony optimization metaheuristic: Algorithms, applications</article-title>
          , and advances, Handbook of metaheuristics (
          <year>2003</year>
          )
          <fpage>250</fpage>
          -
          <lpage>285</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kao</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-H. Chen</surname>
            ,
            <given-names>Y.-T.</given-names>
          </string-name>
          <string-name>
            <surname>Huang</surname>
          </string-name>
          , et al.,
          <article-title>A hybrid algorithm based on ACO and PSO for capacitated vehicle routing problems</article-title>
          , Mathematical Problems in Engineering 2012 (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>H.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <article-title>An ant colony optimization based on local search for the vehicle routing problem with simultaneous pickup-delivery and time window</article-title>
          ,
          <source>Applied Soft Computing</source>
          <volume>139</volume>
          (
          <year>2023</year>
          )
          <fpage>110203</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. N.</given-names>
            <surname>Wong</surname>
          </string-name>
          ,
          <article-title>Flexible job-shop scheduling/rescheduling in dynamic environment: a hybrid MAS/ACO approach</article-title>
          ,
          <source>International Journal of Production Research</source>
          <volume>55</volume>
          (
          <year>2017</year>
          )
          <fpage>3173</fpage>
          -
          <lpage>3196</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chatterjee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Das</surname>
          </string-name>
          ,
          <article-title>Ant colony optimization based enhanced dynamic source routing algorithm for mobile ad-hoc network</article-title>
          ,
          <source>Information Sciences 295</source>
          (
          <year>2015</year>
          )
          <fpage>67</fpage>
          -
          <lpage>90</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Hogenboom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Frasincar</surname>
          </string-name>
          , U. Kaymak,
          <article-title>Ant colony optimization for RDF chain queries for decision support</article-title>
          ,
          <source>Expert Systems with Applications</source>
          <volume>40</volume>
          (
          <year>2013</year>
          )
          <fpage>1555</fpage>
          -
          <lpage>1563</lpage>
          . doi:http://dx.doi. org/10.1016/j.eswa.
          <year>2012</year>
          .
          <volume>08</volume>
          .074.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>E.</given-names>
            <surname>Milner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sooriyabandara</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. Hauert,</surname>
          </string-name>
          <article-title>Swarm performance indicators: Metrics for robustness, fault tolerance, scalability</article-title>
          and adaptability,
          <year>2023</year>
          . ArXiv:
          <fpage>2311</fpage>
          .
          <year>01944</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>G. M. Madroñero Pachajoa</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          <string-name>
            <surname>Achicanoy</surname>
            ,
            <given-names>D. G.</given-names>
          </string-name>
          <article-title>Ramos, Automating the evaluation of the scalability, flexibility, and robustness of collective behaviors for robot swarms</article-title>
          ,
          <source>in: Proceedings of the 2024 Brazilian Symposium on Robotics, and 2024 Workshop on Robotics in Education, IEEE</source>
          ,
          <year>2024</year>
          , p.
          <fpage>144</fpage>
          -
          <lpage>149</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hamann</surname>
          </string-name>
          , A. Reina,
          <article-title>Scalability in computing and robotics</article-title>
          ,
          <source>IEEE Transactions on Computers</source>
          <volume>71</volume>
          (
          <year>2022</year>
          )
          <fpage>1453</fpage>
          -
          <lpage>1465</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>