{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:27:04Z","timestamp":1742934424576,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319240718"},{"type":"electronic","value":"9783319240725"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24072-5_17","type":"book-chapter","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T10:29:44Z","timestamp":1441276184000},"page":"243-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Data Movement in the Internet of Things Domain"],"prefix":"10.1007","author":[{"given":"Francesco","family":"D\u2019Andria","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Field","sequence":"additional","affiliation":[]},{"given":"Aliki","family":"Kopaneli","sequence":"additional","affiliation":[]},{"given":"George","family":"Kousiouris","sequence":"additional","affiliation":[]},{"given":"David","family":"Garcia-Perez","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Pernici","sequence":"additional","affiliation":[]},{"given":"Pierluigi","family":"Plebani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,23]]},"reference":[{"issue":"2","key":"17_CR1","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s00766-010-0112-x","volume":"16","author":"Y Asnar","year":"2011","unstructured":"Asnar, Y., Giorgini, P., Mylopoulos, J.: Goal-driven risk assessment in requirements engineering. Requir. Eng. 16(2), 101\u2013116 (2011)","journal-title":"Requir. Eng."},{"issue":"1","key":"17_CR2","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s10586-014-0404-x","volume":"18","author":"D Boru","year":"2015","unstructured":"Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., Zomaya, A.Y.: Energy-efficient data replication in cloud computing datacenters. Cluster Computing 18(1), 385\u2013402 (2015). \n                      http:\/\/dx.doi.org\/10.1007\/s10586-014-0404-x","journal-title":"Cluster Computing"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Cappiello, C., Schreiber, F.A.: Quality- and energy-aware data compression by aggregation in wsn data streams. In: Proc. of the 2009 IEEE Int\u2019l Conf. on Pervasive Computing and Communications, PERCOM 2009, pp. 1\u20136. IEEE Computer Society, Washington, DC (2009)","DOI":"10.1109\/PERCOM.2009.4912866"},{"key":"17_CR4","unstructured":"Gantz, J., Reinsel, D.: Extracting values from chaos. IDC, June 2011. \n                      http:\/\/www.emc.com\/collateral\/analyst-reports\/idc-extracting-value-from-chaos-ar.pdf"},{"key":"17_CR5","unstructured":"Guyer, S.Z., Lin, C.: An annotation language for optimizing software libraries. In: Proc. of the 2nd Conf, on Domain-specific Languages, DSL 1999, pp. 39\u201352. ACM, New York (1999). \n                      http:\/\/doi.acm.org\/10.1145\/331960.331970"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Heinrich, M., Gr\u00fcneberger, F.J., Springer, T., Gaedke, M.: Exploiting annotations for the rapid development of collaborative web applications. In: Proc. of the 22nd Int\u2019l Conf. on World Wide Web, WWW 2013, Rio de Janeiro, Brazil, pp. 551\u2013560 (2013)","DOI":"10.1145\/2488388.2488437"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Kousiouris, G., Kyriazis, D., Gogouvitis, S., Menychtas, A., Konstanteli, K., Varvarigou, T.: Translation of application-level terms to resource-level attributes across the cloud stack layers. In: 2011 IEEE Symposium on Computers and Communications (ISCC), pp. 153\u2013160, June 2011","DOI":"10.1109\/ISCC.2011.5984009"},{"issue":"4","key":"17_CR8","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1109\/TSC.2012.21","volume":"6","author":"G Kousiouris","year":"2013","unstructured":"Kousiouris, G., Menychtas, A., Kyriazis, D., Konstanteli, K., Gogouvitis, S., Katsaros, G., Varvarigou, T.: Parametric design and performance analysis of a decoupled service-oriented prediction framework based on embedded numerical software. IEEE Transactions on Services Computing 6(4), 511\u2013524 (2013)","journal-title":"IEEE Transactions on Services Computing"},{"key":"17_CR9","unstructured":"Nguyen, T., Cicotti, P., Bylaska, E., Quinlan, D., Baden, S.B.: Bamboo: translating mpi applications to a latency-tolerant, data-driven form. In: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, SC 2012, pp. 39:1\u201339:11. IEEE Computer Society Press, Los Alamitos (2012). \n                      http:\/\/dl.acm.org\/citation.cfm?id=2388996.2389050"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Quinlan, D., Schordan, M., Vuduc, R., Yi, Q.: Annotating user-defined abstractions for optimization. In: 20th International on Parallel and Distributed Processing Symposium, IPDPS 2006, p. 8, April 2006","DOI":"10.1109\/IPDPS.2006.1639722"},{"issue":"4","key":"17_CR11","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/07421222.1996.11518099","volume":"12","author":"R Wang","year":"1996","unstructured":"Wang, R., Strong, D.: Beyond accuracy: What data quality means to data consumers. Journal of Management Information Systems 12(4), 5\u201333 (1996)","journal-title":"Journal of Management Information Systems"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Ren, Y., Li, T., Yu, D., Jin, S., Robertazzi, T., Tierney, B.L., Pouyoul, E.: Protocols for wide-area data-intensive applications: design and performance issues. In: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, SC 2012, pp. 34:1\u201334:11. IEEE Computer Society Press, Los Alamitos (2012)","DOI":"10.1109\/SC.2012.98"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Tai, J., Sheng, B., Yao, Y., Mi, N.: Live data migration for reducing sla violations in multi-tiered storage systems. In: Proceedings of the 2014 IEEE International Conference on Cloud Engineering, IC2E 2014, pp. 361\u2013366. IEEE Computer Society, Washington, DC (2014). \n                      http:\/\/dx.doi.org\/10.1109\/IC2E.2014.8","DOI":"10.1109\/IC2E.2014.8"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Vitali, M., Pernici, B., OReilly, U.M.: Learning a goal-oriented model for energy efficient adaptive applications in data centers. Information Sciences (2015)","DOI":"10.1016\/j.ins.2015.01.023"}],"container-title":["Lecture Notes in Computer Science","Service Oriented and Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24072-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T20:03:05Z","timestamp":1567886585000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24072-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319240718","9783319240725"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24072-5_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 September 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}