{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:28:51Z","timestamp":1742941731121,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030688837"},{"type":"electronic","value":"9783030688844"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68884-4_5","type":"book-chapter","created":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:29:09Z","timestamp":1612826949000},"page":"53-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["QoS-Aware Dynamical Resource Scheduling in Cloud Data Centers"],"prefix":"10.1007","author":[{"given":"Kaidi","family":"Wu","sequence":"first","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huijie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,7]]},"reference":[{"issue":"4","key":"5_CR1","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1109\/TIFS.2017.2774439","volume":"13","author":"J Shen","year":"2018","unstructured":"Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(4), 912\u2013925 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR2","unstructured":"Ling, L., Xiaozhen, M., Yulan, H.: CDN cloud: a novel scheme for combining CDN and cloud computing. In: 5th International Conference on Modelling, Identification and Control, vol. 01, pp. 687\u2013690 (2013)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Ma, K., Yang, B.: Live data replication approach from relational tables to schema-free collections using stream processing framework. In: 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 26\u201331 (2015)","DOI":"10.1109\/3PGCIC.2015.64"},{"key":"5_CR4","unstructured":"Pagani, S., Shafique, M., Khdr, H., Chen, J.-J., Henkel, J.: seBoost: selective boosting for heterogeneous manycores. In: Hardware\/Software Codesign and System Synthesis, pp. 104\u2013113 (2019)"},{"issue":"4","key":"5_CR5","first-page":"96","volume":"10","author":"M Jianhong","year":"2017","unstructured":"Jianhong, M., Bangbang, R.: Strategies of controller selection balance for cloud data center network. Command Inf. Syst. Technol. 10(4), 96\u2013100 (2017)","journal-title":"Command Inf. Syst. Technol."},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Mizusawa, N., Kon, J., Seki, Y., Tao, J., Yamaguchi, S.: Performance improvement of file operations on OverlayFS for containers. In: IEEE International Conference on Smart Computing, pp. 297\u2013302 (2018)","DOI":"10.1109\/SMARTCOMP.2018.00019"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Li, B., Zhang, W., Gu, X., Cong, L.: Research on the production scheduling for automobile parts based on hybrid algorithm. In: 5th International Conference on Intelligent Human-Machine Systems and Cybernetics, vol. 2, pp. 267\u2013270 (2013)","DOI":"10.1109\/IHMSC.2013.211"},{"key":"5_CR8","unstructured":"Wendi, C., Shaojie, M., Ran, D.: Generation and deployment technology for cloud simulation test environment. Command Inf. Syst. Technol. 10(3), 37\u201340 (2019)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Wu, X., Deng, S.: Research on optimizing strategy of database-oriented GIS graph database query. In: IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 305\u2013309 (2018)","DOI":"10.1109\/CCIS.2018.8691206"},{"key":"5_CR10","unstructured":"Jangra, A., Kumar, A.: Dynamic prioritization based efficient task scheduling for grid computing. In: 2nd International Conference on Information Management in the Knowledge Economy, pp. 150\u2013155 (2013)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, L., Han, T., Ansari, N.: Renewable energy-aware inter-datacenter virtual machine migration over elastic optical networks. In: IEEE 7th International Conference on Cloud Computing Technology and Science, pp. 440\u2013443 (2015)","DOI":"10.1109\/CloudCom.2015.13"},{"issue":"4","key":"5_CR12","first-page":"63","volume":"9","author":"Z Li","year":"2017","unstructured":"Li, Z.: Time synchronization method for cloud computing server clusters. Command Inf. Syst. Technol. 9(4), 63\u201367 (2017)","journal-title":"Command Inf. Syst. Technol."},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Filho, M.C.S., Monteiro, C.C., In\u00e1cio, P.R.M., Freire, M.M.: Approaches for optimizing virtual machine placement and migration in cloud environments: a survey. J. Parallel Distrib. Comput. 111, 222 (2018)","DOI":"10.1016\/j.jpdc.2017.08.010"},{"key":"5_CR14","unstructured":"Heikkil\u00e4, M., R\u00e4tty\u00e4, A., Piesk\u00e4, S., Joni J\u00e4ms\u00e4, J.: Security challenges in small- and medium-sized manufacturing enterprises. In: 3rd International Symposium on Small-scale Intelligent Manufacturing Systems, pp. 25\u201330 (2020)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Aldahari, E.: Dynamic voltage and frequency scaling enhanced task scheduling technologies toward green cloud computing. In: International Conference on Computational Science and Intelligence, pp. 20\u201325 (2016)","DOI":"10.1109\/ACIT-CSII-BCD.2016.017"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Bo\u017cejko, W., Chaczko, Z., Nadybski, P., Wodecki, M.: Contemporary Complex Systems and Their Dependability 761, 74 (2018)","DOI":"10.1007\/978-3-319-91446-6_8"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Lv, L., Liang, Q.: Communication-aware container placement and reassignment in large-scale internet data centers. IEEE J. Sel. Areas Commun. 37(3), 540\u2013555 (2019)","DOI":"10.1109\/JSAC.2019.2895473"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Zhao, H., Wang, Q.: VM performance maximization and PM load balancing virtual machine placement in cloud. In: 2020 20th IEEE\/ACM International Symposium on Cluster, Cloud and Internet Computing, pp. 857\u2013864 (2020)","DOI":"10.1109\/CCGrid49817.2020.00011"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68884-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T17:55:19Z","timestamp":1671126919000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68884-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688837","9783030688844"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68884-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spaccs2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}