{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:09:53Z","timestamp":1759133393264,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,2,12]],"date-time":"2020-02-12T00:00:00Z","timestamp":1581465600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,12]],"date-time":"2020-02-12T00:00:00Z","timestamp":1581465600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s10586-020-03067-5","type":"journal-article","created":{"date-parts":[[2020,2,12]],"date-time":"2020-02-12T14:02:46Z","timestamp":1581516166000},"page":"3029-3038","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Minimizing virtual machine migration probability in cloud computing environments"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5122-6486","authenticated-orcid":false,"given":"Marjan","family":"Jalali Moghaddam","sequence":"first","affiliation":[]},{"given":"Akram","family":"Esmaeilzadeh","sequence":"additional","affiliation":[]},{"given":"Mina","family":"Ghavipour","sequence":"additional","affiliation":[]},{"given":"Ahmad Khadem","family":"Zadeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,12]]},"reference":[{"key":"3067_CR1","doi-asserted-by":"crossref","unstructured":"Gou, Z., Yamaguchi, S., Gupta, B.B.: Analysis of various security issues and challenges in cloud computing environment: a survey. In: Identity Theft: Breakthroughs in Research and Practice, pp. 221\u2013247. IGI Global (2017)","DOI":"10.4018\/978-1-5225-0808-3.ch011"},{"key":"3067_CR2","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K.E., Kim, B.G., Gupta, B.: Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 78, 964\u2013975 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"3067_CR3","first-page":"174","volume":"19","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K.E., Gupta, B.B., Ishibashi, Y.: Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustain. Comput. Inform. Syst. 19, 174\u2013184 (2018)","journal-title":"Sustain. Comput. Inform. Syst."},{"volume-title":"Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives","year":"2018","key":"3067_CR4","unstructured":"Gupta, B.B. (ed.): Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. CRC Press, Boca Raton (2018)"},{"issue":"1","key":"3067_CR5","first-page":"1","volume":"7","author":"BB Gupta","year":"2017","unstructured":"Gupta, B.B., Gupta, S., Chaudhary, P.: Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud. Int. J. Cloud Appl. Comput. (IJCAC) 7(1), 1\u201331 (2017)","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"key":"3067_CR6","doi-asserted-by":"crossref","unstructured":"Hosseini, M., Salehi, M.A., Gottumukkala, R.: Enabling interactive video streaming for public safety monitoring through batch scheduling. In: 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), pp. 474\u2013481. IEEE (2017)","DOI":"10.1109\/HPCC-SmartCity-DSS.2017.62"},{"key":"3067_CR7","unstructured":"Rastegar, R., Meybodi, M.R.: A new evolutionary computing model based on cellular learning automata. In: 2004 IEEE Conference on Cybernetics and intelligent systems, Vol. 1, pp. 433\u2013438, IEEE (2004)"},{"key":"3067_CR8","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TSMC.1985.6313399","volume":"1","author":"T Takagi","year":"1985","unstructured":"Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. 1, 116\u2013132 (1985)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"1","key":"3067_CR9","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/0196-6774(85)90018-5","volume":"6","author":"BS Baker","year":"1985","unstructured":"Baker, B.S.: A new proof for the first-fit decreasing bin-packing algorithm. J. Algorithms 6(1), 49\u201370 (1985)","journal-title":"J. Algorithms"},{"issue":"5","key":"3067_CR10","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1016\/j.future.2011.04.017","volume":"28","author":"A Beloglazov","year":"2012","unstructured":"Beloglazov, A., Abawajy, J., Buyya, R.: Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future Gener. Comput. Syst. 28(5), 755\u2013768 (2012)","journal-title":"Future Gener. Comput. Syst."},{"issue":"4\u20135","key":"3067_CR11","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1504\/IJHPCN.2017.086541","volume":"10","author":"W Xue","year":"2017","unstructured":"Xue, W., Li, W., Qi, H., Li, K., Tao, X., Ji, X.: Communication-aware virtual machine migration in cloud data centres. Int. J. High Perform. Comput. Netw. 10(4\u20135), 372\u2013380 (2017)","journal-title":"Int. J. High Perform. Comput. Netw."},{"key":"3067_CR12","unstructured":"Dow, E.M., Fitzsimmons, T.D., Yu, J.: U.S. Patent No. 9,753,757. Washington, DC: U.S. Patent and Trademark Office (2017)"},{"key":"3067_CR13","doi-asserted-by":"crossref","unstructured":"Huang, W., Gao, Q., Liu, J., Panda, D.K.: High performance virtual machine migration with RDMA over modern interconnects. In: 2007 IEEE International Conference on Cluster Computing, pp. 11\u201320, IEEE (2007)","DOI":"10.1109\/CLUSTR.2007.4629212"},{"key":"3067_CR14","doi-asserted-by":"crossref","unstructured":"Hu, B., Lei, Z., Lei, Y., Xu, D., Li, J.: A time-series based precopy approach for live migration of virtual machines. In: IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS), pp. 947\u2013952, IEEE (2011)","DOI":"10.1109\/ICPADS.2011.19"},{"key":"3067_CR15","doi-asserted-by":"crossref","unstructured":"Wu, Y., Zhao, M.: Performance modeling of virtual machine live migration. In: 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 492\u2013499, IEEE (2011)","DOI":"10.1109\/CLOUD.2011.109"},{"key":"3067_CR16","unstructured":"Jing, Y.: Key technologies and optimization for dynamic migration of virtual machines in cloud computing. In: 2012 Second International Conference on Intelligent System Design and Engineering Application (ISDEA), pp. 643\u2013647, IEEE (2012)"},{"issue":"3","key":"3067_CR17","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1618525.1618528","volume":"43","author":"MR Hines","year":"2009","unstructured":"Hines, M.R., Deshpande, U., Gopalan, K.: Post-copy live migration of virtual machines. ACM SIGOPS Oper. Syst. Rev. 43(3), 14\u201326 (2009)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"3067_CR18","doi-asserted-by":"crossref","unstructured":"Baruchi, A., Toshimi Midorikawa, E., Netto, M.: Improving Virtual Machine live migration via application-level workload analysis. In: 2014 10th International Conference on Network and Service Management (CNSM), pp. 163\u2013168, IEEE (2014)","DOI":"10.1109\/CNSM.2014.7014153"},{"issue":"3","key":"3067_CR19","first-page":"1365","volume":"6","author":"N Agrawal","year":"2013","unstructured":"Agrawal, N., Pateriya, R.K.: Enhanced time series based pre-copy method for live migration of virtual machine. Int. J. Adv. Eng. Technol. 6(3), 1365\u20131372 (2013)","journal-title":"Int. J. Adv. Eng. Technol."},{"issue":"2L","key":"3067_CR20","first-page":"639","volume":"7","author":"L Hu","year":"2013","unstructured":"Hu, L., Zhao, J., Xu, G., Ding, Y., Chu, J.: HMDC: live virtual machine migration based on hybrid memory copy and delta compression. Appl. Math. 7(2L), 639\u2013646 (2013)","journal-title":"Appl. Math."},{"key":"3067_CR21","doi-asserted-by":"crossref","unstructured":"Sagana, C., Geetha, M., Suganthe, R.C.: Performance enhancement in live migration for cloud computing environments. In: 2013 International Conference on Information Communication and Embedded Systems (ICICES), pp. 361\u2013366, IEEE (2013)","DOI":"10.1109\/ICICES.2013.6508339"},{"key":"3067_CR22","unstructured":"Gustafsson, E.: Optimizing Total Migration Time in Virtual Machine Live Migration (2013)"},{"key":"3067_CR23","doi-asserted-by":"crossref","unstructured":"Ye, K., Jiang, X., Huang, D., Chen, J., Wang, B.: Live migration of multiple virtual machines with resource reservation in cloud computing environments\u201d, In: 2011 IEEE International Conference on Cloud Computing (CLOUD), pp. 267\u2013274, IEEE (2011)","DOI":"10.1109\/CLOUD.2011.69"},{"key":"3067_CR24","unstructured":"Salfner, F., Troeger, P., Richly, M.: Dependable estimation of downtime for virtual machine live migration. Int. J. Adv. Syst. Meas. 5(1) (2012)"},{"issue":"8","key":"3067_CR25","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.future.2011.04.016","volume":"27","author":"TC Ferreto","year":"2011","unstructured":"Ferreto, T.C., Netto, M.A., Calheiros, R.N., De Rose, C.A.: Server consolidation with migration control for virtualized data centers. Future Gener. Comput. Syst. 27(8), 1027\u20131034 (2011)","journal-title":"Future Gener. Comput. Syst."},{"issue":"10","key":"3067_CR26","first-page":"401","volume":"3","author":"G Metkar","year":"2013","unstructured":"Metkar, G., Agrawal, S., Singh, S.: A live migration of virtual machine based on the dynamic threshold at cloud data centres. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(10), 401\u2013405 (2013)","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"3067_CR27","first-page":"74","volume":"2","author":"K Maurya","year":"2013","unstructured":"Maurya, K., Sinha, R.: Energy conscious dynamic provisioning of virtual machines using adaptive migration thresholds in cloud data center. Int. J. Adv. Res. Comput. Sci. Mobile. Comput. 2, 74\u201382 (2013)","journal-title":"Int. J. Adv. Res. Comput. Sci. Mobile. Comput."},{"key":"3067_CR28","unstructured":"Zhang, X., Shae, Z.Y., Zheng, S., Jamjoom, H.: Virtual machine migration in an over-committed cloud. In: Network Operations and Management Symposium (NOMS), 2012 IEEE, pp. 196\u2013203, IEEE (2012)"},{"key":"3067_CR29","unstructured":"Daniel, S., Kwon, M.: Prediction-based virtual instance migration for balanced workload in the cloud datacenters (2011)"},{"issue":"2","key":"3067_CR30","first-page":"1023","volume":"6","author":"Sh Gupta","year":"2015","unstructured":"Gupta, Sh, Tiwari, D., Singh, Sh: Energy efficient dynamic threshold based load balancing technique in cloud computing environment. Int. J. Comput. Sci. Inf. Technol. 6(2), 1023\u20131026 (2015)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"3067_CR31","doi-asserted-by":"crossref","unstructured":"Chen, X., Chen, S., Tseng, F.H., Chou, L.D., Chao, H.C.: Minimizing virtual machine migration probability for cloud environments. In: 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), pp. 1430\u20131436, IEEE (2013)","DOI":"10.1109\/HPCC.and.EUC.2013.202"},{"issue":"5","key":"3067_CR32","first-page":"40","volume":"2","author":"RS Ts\u2019epoMofolo","year":"2013","unstructured":"Ts\u2019epoMofolo, R.S.: Heuristic based resource allocation using virtual machine migration: a cloud computing perspective. Int. Refereed J. Eng. Sci. (IRJES) 2(5), 40\u201345 (2013)","journal-title":"Int. Refereed J. Eng. Sci. (IRJES)"},{"key":"3067_CR33","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.elerap.2016.10.002","volume":"20","author":"M Ghavipour","year":"2016","unstructured":"Ghavipour, M., Meybodi, M.R.: An adaptive fuzzy recommender system based on learning automata. Electron. Commer. Res. Appl. 20, 105\u2013115 (2016)","journal-title":"Electron. Commer. Res. Appl."},{"key":"3067_CR34","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.engappai.2017.01.004","volume":"59","author":"M Ghavipour","year":"2017","unstructured":"Ghavipour, M., Meybodi, M.R.: Irregular cellular learning automata-based algorithm for sampling social networks. Eng. Appl. Artif. Intell. 59, 244\u2013259 (2017)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"3067_CR35","unstructured":"Jang, J.S.R., Mizutani, E.: Levenberg\u2013Marquardt method for ANFIS learning. In: Fuzzy Information Processing Society, 1996. NAFIPS, 1996 Biennial Conference of the North American, pp. 87\u201391, IEEE (1996)"},{"key":"3067_CR36","doi-asserted-by":"crossref","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles, SOSP 2003, Bolton Landing, NY, USA, p. 177 (2003)","DOI":"10.1145\/945445.945462"},{"issue":"13","key":"3067_CR37","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1002\/cpe.1867","volume":"24","author":"A Beloglazov","year":"2012","unstructured":"Beloglazov, A., Buyya, R.: Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers. Concurr. Computat. Pract. Exp. 24(13), 1397\u20131420 (2012)","journal-title":"Concurr. Computat. Pract. Exp."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03067-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-020-03067-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03067-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,11]],"date-time":"2021-02-11T14:33:26Z","timestamp":1613054006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-020-03067-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,12]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["3067"],"URL":"https:\/\/doi.org\/10.1007\/s10586-020-03067-5","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2020,2,12]]},"assertion":[{"value":"14 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}