{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:27:13Z","timestamp":1743074833287,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662438794"},{"type":"electronic","value":"9783662438800"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43880-0_56","type":"book-chapter","created":{"date-parts":[[2014,6,25]],"date-time":"2014-06-25T09:42:01Z","timestamp":1403689321000},"page":"491-498","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Harnessing Wasted Computing Power for Scientific Computing"],"prefix":"10.1007","author":[{"given":"S\u00e1ndor","family":"Guba","sequence":"first","affiliation":[]},{"given":"M\u00e1t\u00e9","family":"\u0150ry","sequence":"additional","affiliation":[]},{"given":"Imre","family":"Szeber\u00e9nyi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,26]]},"reference":[{"key":"56_CR1","doi-asserted-by":"crossref","unstructured":"Bolte, M., Sievers, M., Birkenheuer, G., Nieh\u00f6rster, O., Brinkmann, A.: Non-intrusive virtualization management using libvirt. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 574\u2013579. European Design and Automation Association (2010)","DOI":"10.1109\/DATE.2010.5457142"},{"key":"56_CR2","doi-asserted-by":"crossref","unstructured":"Callaghan, B., Lingutla-Raj, T., Chiu, A., Staubach, P., Asad, O.: NFS over RDMA. In: Proceedings of ACM SIGCOMM Summer 2003 NICELI Workshop (2002)","DOI":"10.1145\/944747.944753"},{"issue":"5","key":"56_CR3","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1147\/rd.255.0483","volume":"25","author":"RJ Creasy","year":"1981","unstructured":"Creasy, R.J.: The origin of the vm\/370 time-sharing system. IBM J. Res. Dev. 25(5), 483\u2013490 (1981)","journal-title":"IBM J. Res. Dev."},{"key":"56_CR4","doi-asserted-by":"crossref","unstructured":"Duato, J., Pena, A.J., Silla, F., Fern\u00e1ndez, J.C., Mayo, R., Quintana-Orti, E.: Enabling CUDA acceleration within virtualmachines using rCUDA. In: 18th International Conference on High Performance Computing (HiPC) 2011, pp. 1\u201310. IEEE (2011)","DOI":"10.1109\/HiPC.2011.6152718"},{"key":"56_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-1937-8","volume-title":"The Definitive Guide to Django: Web Development Done Right","author":"A Holovaty","year":"2009","unstructured":"Holovaty, A., Kaplan-Moss, J.: The Definitive Guide to Django: Web Development Done Right. Apress, Berkeley (2009)"},{"key":"56_CR6","unstructured":"Hoskins, M.E.: SSHFS: super easy file access over SSH. Linux J. 146, 4 (2006)"},{"key":"56_CR7","unstructured":"Pfaff, B., Pettit, J., Koponen, T., Amidon, K., Casado, M., Shenker, S.: Extending networking into the virtualization layer. In: Proceedings of HotNets, October 2009 (2009)"},{"key":"56_CR8","unstructured":"Pinzari, G.F.: Introduction to NX technology. Technical report, NoMachine Technical, Report 309 (2003)"},{"key":"56_CR9","unstructured":"Victoria, B.: Creating and controlling kvm guests using libvirt. University of Victoria (2009)"},{"issue":"6","key":"56_CR10","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MIC.2006.116","volume":"10","author":"S Vinoski","year":"2006","unstructured":"Vinoski, S.: Advanced message queuing protocol. IEEE Internet Comput. 10(6), 87\u201389 (2006)","journal-title":"IEEE Internet Comput."},{"key":"56_CR11","doi-asserted-by":"crossref","unstructured":"Yang, C.T., Wang, H.Y., Ou, W.S., Liu, Y.T., Hsu, C.H.: On implementation of GPU virtualization using PCI pass-through. In: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 711\u2013716. IEEE (2012)","DOI":"10.1109\/CloudCom.2012.6427531"},{"key":"56_CR12","doi-asserted-by":"crossref","unstructured":"Younge, A.J., Henschel, R., Brown, J.T., von Laszewski, G., Qiu, J., Fox, G.C.: Analysis of virtualization technologies for high performance computing environments. In: 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 9\u201316. IEEE (2011)","DOI":"10.1109\/CLOUD.2011.29"}],"container-title":["Lecture Notes in Computer Science","Large-Scale Scientific Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43880-0_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T05:19:09Z","timestamp":1676870349000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-43880-0_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662438794","9783662438800"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43880-0_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"26 June 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}