{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T18:40:08Z","timestamp":1748803208148,"version":"3.41.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T00:00:00Z","timestamp":1457481600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 103-2221-E-415-021-"],"award-info":[{"award-number":["MOST 103-2221-E-415-021-"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["104-2221-E-415-003-"],"award-info":[{"award-number":["104-2221-E-415-003-"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11042-016-3347-9","type":"journal-article","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T07:19:42Z","timestamp":1457507982000},"page":"19689-19706","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A novel resource allocation mechanism for live cloud-based video streaming service"],"prefix":"10.1007","volume":"76","author":[{"given":"Hong-Yi","family":"Chang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9146-1069","authenticated-orcid":false,"given":"Kwei-Bor","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hsin-Che","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,9]]},"reference":[{"key":"3347_CR1","unstructured":"[Online] Amazon EC2 official website. http:\/\/aws.amazon.com\/ec2\/ . (Accessed on Augest 26, 2015)"},{"key":"3347_CR2","unstructured":"[Online] IxChariot official.Website: http:\/\/www.ixchariot.com\/ (Accessed on Augest 26, 2015)"},{"issue":"2","key":"3347_CR3","first-page":"38","volume":"4","author":"HA Abba","year":"2012","unstructured":"Abba HA, Zakaria NB, Haron N (2012) Grid resource allocation: a review. Res J Inf Technol 4(2):38\u201355","journal-title":"Res. J. Inf. Technol."},{"key":"3347_CR4","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1016\/j.future.2011.04.017","volume":"28","author":"A Beloglazov","year":"2012","unstructured":"Beloglazov A, Abawajy J, Buyya R (2012) Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing. Futur Gener Comput Syst 28:755\u2013768","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1\/4","key":"3347_CR5","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/1967631","volume":"3","author":"CL Bouton","year":"1901","unstructured":"Bouton CL (1901) Nim, a game with a complete mathematical theory. Ann Math 3(1\/4):35\u201339","journal-title":"Ann. Math."},{"issue":"2","key":"3347_CR6","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1093\/comjnl\/bxt008","volume":"57","author":"H-Y Chang","year":"2014","unstructured":"Chang H-Y, Lu H-C, Huang Y-H, Lin Y-W, Tzang Y-J (2014) Novel auction mechanism with factor distribution rule for cloud resource allocation. Comput J 57(2):255\u2013262","journal-title":"Comput J"},{"issue":"11","key":"3347_CR7","first-page":"45","volume":"37","author":"S Cheng","year":"2011","unstructured":"Cheng S, Pan Y (2011) Credibility-based dynamic resource distribution strategy under cloud computing environment. Comput Eng 37(11):45\u201348","journal-title":"Comput. Eng."},{"key":"3347_CR8","first-page":"33","volume":"2","author":"AM Elmisery","year":"2011","unstructured":"Elmisery AM, Botvich D (2011) Enhanced middleware for collaborative privacy in IPTV recommender services. J Convergence 2:33\u201342","journal-title":"J Convergence"},{"key":"3347_CR9","unstructured":"Ferguson TS (2000) Game theory. University of California at Los Angeles"},{"key":"3347_CR10","doi-asserted-by":"crossref","unstructured":"Golmohammadi R, Shahhoseini HS (2010) A grid resource allocation method based on analytic hierarchy process, 5th International Symposium on Telecommunications, Dec. 4\u20136, Tehran, Iran, p 187\u2013192","DOI":"10.1109\/ISTEL.2010.5734022"},{"key":"3347_CR11","doi-asserted-by":"crossref","unstructured":"Isard M et al (2009) Quincy: fair scheduling for distributed computing clusters, 22nd symposium on Operating systems principles, October 11-14, Big Sky, MT, p 261-276","DOI":"10.1145\/1629575.1629601"},{"issue":"1","key":"3347_CR12","first-page":"165","volume":"37","author":"L Li","year":"2009","unstructured":"Li L, Yuanan L, Xiaolei M (2009) Grid resource allocation based on the combinatorial double auction. Acta Electron Sin 37(1):165\u2013169","journal-title":"Acta Electron Sin"},{"issue":"2","key":"3347_CR13","doi-asserted-by":"crossref","first-page":"428","DOI":"10.3724\/SP.J.1001.2012.03972","volume":"23","author":"M Li","year":"2012","unstructured":"Li M et al (2012) Grid resource allocation model based on incomplete information game. J Softw 23(2):428\u2013438","journal-title":"J Softw"},{"issue":"4","key":"3347_CR14","first-page":"495","volume":"8","author":"X Lin","year":"2010","unstructured":"Lin X, Guo D (2010) Analysis of grid resource scheduling based on economy. Inf Electron Eng 8(4):495\u2013499","journal-title":"Inf Electron Eng"},{"key":"3347_CR15","unstructured":"Lu JX, Li YQ (2004) A combinatorial game (Nim) solved by PAR Method. Comput Modeenization 9"},{"key":"3347_CR16","unstructured":"Luo J, Girard A, Rosenberg C (2009) Efficient algorithms to solve a class of resource allocation problems in large wireless networks, 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, June 23\u201325, Seoul, Korea, p 313\u2013321"},{"key":"3347_CR17","doi-asserted-by":"crossref","unstructured":"Parsa S, Shokri A, Nourossana S (2009) A novel market based grid resource allocation algorithm, First International Conference on Networked Digital Technologies, July 28\u201331, Ostrava, The Czech Republic, p146-152","DOI":"10.1109\/NDT.2009.5272120"},{"key":"3347_CR18","unstructured":"Peres Y (2009) Game theory, alive. UC Berkeley"},{"key":"3347_CR19","unstructured":"Sasnauskaite E, Mikucionis M (2001) The Nim game, computer science and engineering. Aalborg University"},{"issue":"3","key":"3347_CR20","first-page":"133","volume":"1","author":"M Singh","year":"2010","unstructured":"Singh M (2010) GRAAA: grid resource allocation based on ant algorithm. J Adv Inf Technol 1(3):133\u2013135","journal-title":"J Adv Inf Technol"},{"key":"3347_CR21","doi-asserted-by":"crossref","unstructured":"Sun D et al (2010) Optimizing grid resource allocation by combining fuzzy clustering with application preference, 2nd International Conference on Advanced Computer Control (ICACC), March 27\u201329, Liaoning, China, p 22\u201327","DOI":"10.1109\/ICACC.2010.5487177"},{"key":"3347_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/2192-1962-1-1","volume":"1","author":"F-H Tseng","year":"2011","unstructured":"Tseng F-H, Chou L-D, Chao H-C (2011) A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Comput Inf Sci 1:1\u201316","journal-title":"Human-centric Comput Inf Sci"},{"key":"3347_CR23","unstructured":"UCB\/EECS-2009-28 (2009) Above the clouds: a berkeley view of cloud computing. UC Berkeley Technical Report, UC Berkeley"},{"key":"3347_CR24","first-page":"19","volume":"2","author":"X Wang","year":"2011","unstructured":"Wang X, Sang Y, Liu Y, Luo Y (2011) Considerations on security and trust measurement for virtualized environment. J Convergence 2:19\u201324","journal-title":"J Convergence"},{"key":"3347_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/2192-1962-2-1","volume":"2","author":"X Xie","year":"2012","unstructured":"Xie X, Jiang H, Jin H, Cao W, Yuan P, Yang LT (2012) Metis: a profiling toolkit based on the virtualization of hardware performance counters. Human-centric Comput Inf Sci 2:1\u201315","journal-title":"Human-centric Comput Inf Sci"},{"issue":"12","key":"3347_CR26","first-page":"32","volume":"24","author":"Z Yaling","year":"2008","unstructured":"Yaling Z, Xiaofeng J (2008) A double auction-based scheduling model and bidding strategy to grid resource. New Technol Libr Inf Serv 24(12):32\u201336","journal-title":"New Technol Libr Inf Serv"},{"key":"3347_CR27","first-page":"85","volume":"5","author":"Y-Q Yang","year":"2009","unstructured":"Yang Y-Q (2009) General solution of Nim game. J Sci Teach Coll Univ 5:85\u201386","journal-title":"J Sci Teach Coll Univ"},{"issue":"4","key":"3347_CR28","first-page":"39","volume":"16","author":"A Yousif","year":"2011","unstructured":"Yousif A, Abdullah AH, Ahmed AA (2011) A bidding-based grid resource selection algorithm using single reservation mechanism. Int J Comput Appl 16(4):39\u201343","journal-title":"Int. J. Comput. Appl."},{"key":"3347_CR29","unstructured":"Yu C-Y, Ke C-H, Shieh C-K, Chilamkurti N (2006) MyEvalvid-NT-A simulation tool-set for video transmission and quality evaluation, IEEE Region 10 Conference, Nov. 14-17, Hong Kong, p 1-4"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3347-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3347-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3347-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3347-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T18:05:28Z","timestamp":1748801128000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3347-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,9]]},"references-count":29,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["3347"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3347-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2016,3,9]]}}}