{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T02:55:50Z","timestamp":1648522550814},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,11,4]],"date-time":"2014-11-04T00:00:00Z","timestamp":1415059200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1007\/s11227-014-1311-x","type":"journal-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T04:26:00Z","timestamp":1414988760000},"page":"1694-1714","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Relative weight comparison between virtual key factors of cloud computing with analytic network process"],"prefix":"10.1007","volume":"72","author":[{"given":"Cheol-Rim","family":"Choi","sequence":"first","affiliation":[]},{"given":"Hwa-Young","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]},{"given":"Haeng Jin","family":"Jang","sequence":"additional","affiliation":[]},{"given":"Young-Sik","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,4]]},"reference":[{"issue":"1","key":"1311_CR1","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"M Sean","year":"2011","unstructured":"Sean M, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2011) Cloud computing - the business perspective. Decis Support Syst 51(1):176\u2013189","journal-title":"Decis Support Syst"},{"issue":"1","key":"1311_CR2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.3745\/JIPS.2014.10.1.103","volume":"10","author":"R Hussain","year":"2014","unstructured":"Hussain R, Oh H (2014) Cooperation-aware VANET clouds: providing secure cloud services to vehicular ad hoc networks. J Inf Process Syst 10(1):103\u2013118","journal-title":"J Inf Process Syst"},{"key":"1311_CR3","doi-asserted-by":"crossref","first-page":"2244","DOI":"10.1016\/j.chb.2012.06.032","volume":"28","author":"S-H Li","year":"2012","unstructured":"Li S-H, Yen DC, Huc C-C, Lu W-H, Chiu Y-C (2012) Identifying critical factors for corporate implementing virtualization technology. Comput Hum Behav 28:2244\u20132257","journal-title":"Comput Hum Behav"},{"issue":"2","key":"1311_CR4","first-page":"37","volume":"4","author":"MM Weng","year":"2013","unstructured":"Weng MM, Shis TK, Hung JC (2013) A personal tutoring mechanism based on the cloud environment. J Converg 4(2):37\u201344","journal-title":"J Converg"},{"issue":"8","key":"1311_CR5","first-page":"1","volume":"2","author":"X Xie","year":"2012","unstructured":"Xie X, Jiang H, Jin H, Cao W, Yuan P, Yang L (2012) Metis: a profiling toolkit based on the virtualization of hardware performance counters. Hum-centric Comput Inf Sci 2(8):1\u201315","journal-title":"Hum-centric Comput Inf Sci"},{"key":"1311_CR6","unstructured":"Global Industry Analysts, Inc. (2010) Virtualization software. In: A global strategic business report. http:\/\/www.strategyr.com\/Virtualization_Software_Market_Report.asp"},{"issue":"3","key":"1311_CR7","first-page":"9","volume":"19","author":"WH DeLone","year":"2003","unstructured":"DeLone WH, McLean ER (2003) The DeLone and McLean model of information systems success: a ten-year update. J Manag Inf Syst 19(3):9\u201330","journal-title":"J Manag Inf Syst"},{"key":"1311_CR8","volume-title":"Decision making with dependence feedback: the analytic network process","author":"TL Saaty","year":"2001","unstructured":"Saaty TL (2001) Decision making with dependence feedback: the analytic network process. RWS Publications, Pittsburgh"},{"issue":"6","key":"1311_CR9","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"G-JA Joshi","year":"2010","unstructured":"Joshi G-JA, HssanTakabi JBD (2010) Security and privacy challenges in cloud computing environments. Secur Priv IEEE 8(6):24\u201331","journal-title":"Secur Priv IEEE"},{"issue":"7","key":"1311_CR10","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1016\/j.future.2010.03.009","volume":"26","author":"A Goscinski","year":"2010","unstructured":"Goscinski A, Brock M (2010) Toward dynamic and attribute based publication, discovery and selection for cloud computing. Futur Gener Comput Syst 26(7):947\u2013970","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"1311_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1\u201311","journal-title":"J Netw Comput Appl"},{"key":"1311_CR12","doi-asserted-by":"crossref","unstructured":"Ramgovind S, Eloff MM, Smith E (2010) The management of security in cloud computing, Information security for South Africa (ISSA), IEEE, pp 1\u20137","DOI":"10.1109\/ISSA.2010.5588290"},{"key":"1311_CR13","unstructured":"A Platform Computing Whitepaper (2010) Enterprise Cloud Computing: Transforming IT, Platform Computing, pp 6, viewed 13 March 2010"},{"key":"1311_CR14","unstructured":"Dooley B (2010) Architectural Requirements Of The Hybrid Cloud. In: Information Management Online. http:\/\/www.information-management.com\/news\/hybrid-cloudarchitectural-requirements10017152-1.html . viewed 10 February 2010"},{"key":"1311_CR15","unstructured":"Global Netoptex Incorporated (2009) Demystifying the cloud. Important opportunities, crucial choices, http:\/\/www.gni.com , pp 4\u201314. viewed 13 December 2009"},{"key":"1311_CR16","unstructured":"Lofstrand M (2009) The VeriScale Architecture. In: Elasticity and Efficiency for Private Clouds, Sun Microsystems, Sun Blue Print, Online, Part No 821\u20130248-11, Revision 1.1, 09\/22\/09"},{"key":"1311_CR17","doi-asserted-by":"crossref","unstructured":"Gong C, Liu J, Zhang Q, Chen H and Gong Z (2010) The Characteristics of Cloud Computing. In: 39th International Conference on Parallel Processing Workshops, pp 275\u2013279","DOI":"10.1109\/ICPPW.2010.45"},{"issue":"7","key":"1311_CR18","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1145\/361011.361073","volume":"17","author":"GJ Popek","year":"1974","unstructured":"Popek GJ, Goldberg RP (1974) Formal requirements for virtualizable third generation architectures. Commun ACM 17(7):412\u2013421","journal-title":"Commun ACM"},{"key":"1311_CR19","unstructured":"Fichera R (2002) The future of the data center\u2013Modularity and virtualization. Forrester Research"},{"key":"1311_CR20","unstructured":"Singh A (2004) An introduction to virtualization. http:\/\/www.kernelthread.com\/publications\/virtualization"},{"key":"1311_CR21","unstructured":"Waters JK (2007) Virtualization definition and solutions. http:\/\/www.cio.com\/article\/40701\/Virtualization_Definition_and_Solutions"},{"key":"1311_CR22","unstructured":"Tulloch M (2010) Understanding Microsoft virtualization solutions. Microsoft Press, A Division of Microsoft Corporation"},{"key":"1311_CR23","unstructured":"Shavit Y, Migliore D (2009) Virtual machine. http:\/\/searchservervirtualization.techtarget.com\/sDefinition\/0,,sid94_gci213305,00.html"},{"issue":"5","key":"1311_CR24","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MC.2005.173","volume":"38","author":"JE Smith","year":"2005","unstructured":"Smith JE, Nair R (2005) The architecture of virtual machines. Comput 38(5):32\u201338","journal-title":"Comput"},{"issue":"5","key":"1311_CR25","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MC.2005.163","volume":"38","author":"R Uhlig","year":"2005","unstructured":"Uhlig R, Neiger G, Rodgers D, Santoni AL, Martins FCM, Anderson AV et al (2005) Intel virtualization technology. Comput 38(5):48\u201356","journal-title":"Comput"},{"issue":"5","key":"1311_CR26","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MS.2006.143","volume":"23","author":"S Seetharaman","year":"2006","unstructured":"Seetharaman S, Murthy K (2006) Test optimization using software virtualization. Softw IEEE 23(5):66\u201369","journal-title":"Softw IEEE"},{"key":"1311_CR27","doi-asserted-by":"crossref","unstructured":"Menasce DA, Bennani MN (2006) Autonomic virtualized environments. In: International conference on autonomic and autonomous systems, p 28","DOI":"10.1109\/ICAS.2006.13"},{"key":"1311_CR28","unstructured":"Sotomayor B, Keahey K, Foster I (2006) Overhead matters. A model for virtual resource management. In: The 2nd international workshop on virtualization technology in distributed computing, pp 5\u201312"},{"key":"1311_CR29","unstructured":"Jung YW, Kim JM, Bae SJ, Koh KW, Woo YC, Kim SW (2009) Standard-based virtual infrastructure resource management for distributed and heterogeneous servers. In: The 11th international conference on advanced communication technology, pp 2233\u20132237"},{"key":"1311_CR30","doi-asserted-by":"crossref","unstructured":"Chen Q, Xin R (2005) Optimizing enterprise IT infrastructure through virtual server consolidation. In: Proceedings of the 2005 informing science and IT education joint conference","DOI":"10.28945\/2918"},{"issue":"1","key":"1311_CR31","first-page":"46","volume":"44","author":"Y Oguchi","year":"2008","unstructured":"Oguchi Y, Yamamoto T (2008) Server virtualization technology and its latest trends. Fujitsu Sci Tech J 44(1):46\u201352","journal-title":"Fujitsu Sci Tech J"},{"key":"1311_CR32","doi-asserted-by":"crossref","unstructured":"Sehgal NK, Ganguli M (2006) Applications of virtualization for server management and security. In: IEEE international conference on industrial technology, pp 2752\u20132755","DOI":"10.1109\/ICIT.2006.372614"},{"key":"1311_CR33","volume-title":"Comparisons of benchmark of virtualization technologies. Masterthesis","author":"CF Tsai","year":"2007","unstructured":"Tsai CF (2007) Comparisons of benchmark of virtualization technologies. Masterthesis. Tamkang University, Taiwan"},{"key":"1311_CR34","unstructured":"Symantec (2009) White paper: The green data center\u2013A Symantec green IT guide, Symantec Corporation World Headquarters"},{"key":"1311_CR35","doi-asserted-by":"crossref","unstructured":"Weltzin C, Delgado S (2009) Using virtualization to reduce the cost of test. In: Autotestcon, pp 439\u2013442, IEEE","DOI":"10.1109\/AUTEST.2009.5314086"},{"key":"1311_CR36","unstructured":"VMware (2006) White paper: Virtualization overview, VMware, Inc."},{"key":"1311_CR37","volume-title":"Virtualization of enterprise testing lab via VMware: a case study ona large software development company. Master thesis","author":"YF Hsieh","year":"2008","unstructured":"Hsieh YF (2008) Virtualization of enterprise testing lab via VMware: a case study ona large software development company. Master thesis. National Taiwan University, Taiwan"},{"key":"1311_CR38","volume-title":"The Analytic hierarchy process","author":"TL Saaty","year":"1980","unstructured":"Saaty TL (1980) The Analytic hierarchy process. McGraw-Hill, New York"},{"issue":"1","key":"1311_CR39","first-page":"83","volume":"1","author":"TL Saaty","year":"2008","unstructured":"Saaty TL (2008) Decision making with the analytic hierarchy process. Int J Serv Sci 1(1):83\u201398","journal-title":"Int J Serv Sci"},{"key":"1311_CR40","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1080\/002075499191751","volume":"37","author":"LM Meade","year":"1999","unstructured":"Meade LM, Sarkis J (1999) Analyzing organizational project alternatives for agile manufacturing process. Anal Netw Approach Int J Prod Res 37:241\u2013261","journal-title":"Anal Netw Approach Int J Prod Res"},{"issue":"2","key":"1311_CR41","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/17.104292","volume":"37","author":"JF Bard","year":"1990","unstructured":"Bard JF, Sousk SF (1990) A tradeoff analysis for rough terrain cargo handlers using the AHP: an example of group decision-making. IEEE Trans Eng Manag 37(2):222\u2013228","journal-title":"IEEE Trans Eng Manag"},{"issue":"3","key":"1311_CR42","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1109\/TEM.2007.906857","volume":"54","author":"MS Raisinghani","year":"2007","unstructured":"Raisinghani MS, Meade L, Schkade LL (2007) Strategic e-Business decision analysis using the analytic network process. IEEE Trans Eng Manag 54(3):673\u2013686","journal-title":"IEEE Trans Eng Manag"},{"issue":"2","key":"1311_CR43","first-page":"138","volume":"12","author":"X Tang","year":"2006","unstructured":"Tang X, Feng J (2006) ANP theory and application expectation. Stat Decis-mak 12(2):138\u2013140","journal-title":"Stat Decis-mak"},{"issue":"6","key":"1311_CR44","first-page":"63","volume":"180","author":"GH Tzeng","year":"2006","unstructured":"Tzeng GH, Yu R (2006) A soft computing method for multi-criteria decision making with dependence and feedback. Appl Math Comput 180(6):63\u201375","journal-title":"Appl Math Comput"},{"key":"1311_CR45","doi-asserted-by":"crossref","first-page":"3364","DOI":"10.1016\/j.ins.2007.01.001","volume":"177","author":"I Yuksel","year":"2007","unstructured":"Yuksel I, Dagcarondeviren M (2007) Using the analytic network process (ANP) in a SWOT analysis - a case study for a textile firm. Inf Sci 177:3364\u20133382","journal-title":"Inf Sci"},{"issue":"16","key":"1311_CR46","doi-asserted-by":"crossref","first-page":"3383","DOI":"10.1016\/j.ins.2007.02.010","volume":"177","author":"CW Chang","year":"2007","unstructured":"Chang CW, Wu CR, Lin CT, Lin HL (2007) Evaluating digital video recorder systems using analytic hierarchy and analytic network processes. Inf Sci 177(16):3383\u20133396","journal-title":"Inf Sci"},{"issue":"2","key":"1311_CR47","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1016\/j.dss.2010.04.005","volume":"49","author":"U Jung","year":"2010","unstructured":"Jung U, Seo DW (2010) An ANP approach for R&D project evaluation based on interdependencies between research objectives and evaluation criteria. Decis Support Syst 49(2):335\u2013342","journal-title":"Decis Support Syst"},{"issue":"1","key":"1311_CR48","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.rser.2009.07.012","volume":"14","author":"P Aragon\u00e9s-Beltr\u00e1n","year":"2010","unstructured":"Aragon\u00e9s-Beltr\u00e1n P, Pastor-Ferrando JP, Rodr\u00edguez-Pozo F, Chaparro-Gonzalez F (2010) An ANP-based approach for the selection of photovoltaic solar power plant investment projects. Renew Sustain Energy Rev 14(1):249\u2013264","journal-title":"Renew Sustain Energy Rev"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1311-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-014-1311-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1311-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T19:24:01Z","timestamp":1565983441000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-014-1311-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,4]]},"references-count":48,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,5]]}},"alternative-id":["1311"],"URL":"https:\/\/doi.org\/10.1007\/s11227-014-1311-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,4]]}}}