{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T10:02:14Z","timestamp":1760608934908},"reference-count":25,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Experimental &amp; Theoretical Artificial Intelligence"],"published-print":{"date-parts":[[2017,5,4]]},"DOI":"10.1080\/0952813x.2016.1212101","type":"journal-article","created":{"date-parts":[[2016,7,27]],"date-time":"2016-07-27T05:28:27Z","timestamp":1469597307000},"page":"575-596","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":10,"title":["An imperialist competitive algorithm for virtual machine placement in cloud computing"],"prefix":"10.1080","volume":"29","author":[{"given":"Shahram","family":"Jamali","sequence":"first","affiliation":[]},{"given":"Sepideh","family":"Malektaji","sequence":"additional","affiliation":[]},{"given":"Morteza","family":"Analoui","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,7,26]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1145\/1543834"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2010.10.001"},{"key":"CIT0003","author":"Ajiro Y","year":"2007","journal-title":"The International Conference for the Computer Measurement Group (CMG)"},{"key":"CIT0004","doi-asserted-by":"crossref","unstructured":"Atashpaz-Gargari, E. & Lucas, C. (2007).Imperialist competitive algorithm: An algorithm for optimization inspired by imperialistic competition(pp. 4661\u20134667). IEEE Congress on Evolutionary Computation, Singapore.","DOI":"10.1109\/CEC.2007.4425083"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.04.017"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"CIT0007","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1109\/INM.2009.5188832","author":"Cardosa M","year":"2009","journal-title":"Proceedings of IFIP\/IEEE Integrated Network Management (IM\u201909)"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/BF00226291"},{"key":"CIT0009","first-page":"26","author":"Feller E.","year":"2011","journal-title":"Proceedings of the IEEE\/ACM International Conference on Grid Computing (GRID)"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.02.004"},{"key":"CIT0012","first-page":"7","author":"Grit L.","year":"2006","journal-title":"Proceedings of the 2nd International Workshop on Virtualization Technology in Distributed Computing"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1080\/0952813X.2015.1132264"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2862-8"},{"key":"CIT0015","first-page":"1","author":"Jamali S.","year":"2011","journal-title":"Neural Computing and Applications"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.11.012"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.05.012"},{"key":"CIT0018","first-page":"373","author":"Khanna G","year":"2006","journal-title":"Proceedings of the 10th IEEE\/IFIP Network Operations and Management Symposium (NOMS)"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1016\/j.enconman.2010.01.014"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1080\/0952813X.2015.1020524"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.04.081"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2010.01.008"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2010.01.008"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1002\/spe.995"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.04.032"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1145\/1348583"}],"container-title":["Journal of Experimental &amp; Theoretical Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0952813X.2016.1212101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:16:15Z","timestamp":1498331775000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0952813X.2016.1212101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,26]]},"references-count":25,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2016,7,26]]},"published-print":{"date-parts":[[2017,5,4]]}},"alternative-id":["10.1080\/0952813X.2016.1212101"],"URL":"https:\/\/doi.org\/10.1080\/0952813x.2016.1212101","relation":{},"ISSN":["0952-813X","1362-3079"],"issn-type":[{"value":"0952-813X","type":"print"},{"value":"1362-3079","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,26]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teta20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teta20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}