{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T07:09:29Z","timestamp":1725779369889},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.221","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"1778-1783","source":"Crossref","is-referenced-by-count":18,"title":["A Matrix Transformation Algorithm for Virtual Machine Placement in Cloud"],"prefix":"10.1109","author":[{"given":"Meng","family":"Sun","sequence":"first","affiliation":[]},{"given":"Weidong","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Xinchang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Huiling","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Validating heuristics for virtual machines consolidation","author":"lee","year":"2011","journal-title":"Microsoft Research"},{"journal-title":"Probability and Statistics","year":"2013","author":"biau","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.017"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.38"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.119"},{"key":"12","first-page":"348","article-title":"Evolutionary optimal virtual machine placement and demand forecaster for cloud computing","author":"chuen teck mark","year":"2011","journal-title":"The 25th International Conference on Advanced Information Networking and Applications Biopolis Sigapore"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1287\/moor.1050.0168"},{"key":"2","article-title":"Profiling applications for virtual machine placement in clouds","author":"vu do","year":"2011","journal-title":"The 4th IEEE International Conference on Cloud Computing Athens Greece"},{"key":"1","article-title":"Predicting application resource requirements in virtual environments","author":"wood","year":"2008","journal-title":"Proceedings of the ACM\/IFIP\/USENIX 9th International Middleware Conference Leuven Belgium"},{"key":"10","first-page":"721","article-title":"A novel mechanism for rapid provisioning virtual machines of cloud services","author":"liao","year":"2012","journal-title":"The 13th IEEE Network Operations and Management Symposium (NOMS) Application Session Maui Hawaii USA"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2011.02253"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2005.12.005"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2004.04.037"},{"journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness","year":"1990","author":"garey","key":"4"},{"journal-title":"Optimal Placement Algorithms for Virtual Machines","year":"2011","author":"bellur","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-CPSCom.2010.137"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06681051.pdf?arnumber=6681051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:36:52Z","timestamp":1490229412000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6681051\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.221","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}