{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:27:59Z","timestamp":1757543279897,"version":"3.37.3"},"reference-count":31,"publisher":"Tech Science Press","issue":"4","funder":[{"name":"Jiangsu Prospective Research Project on Future Networks","award":["BY2013095-5-06"],"award-info":[{"award-number":["BY2013095-5-06"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61432017","61404092"],"award-info":[{"award-number":["61432017","61404092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1080\/10798587.2016.1152775","type":"journal-article","created":{"date-parts":[[2016,3,2]],"date-time":"2016-03-02T14:13:17Z","timestamp":1456927997000},"page":"587-597","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":16,"title":["A method of virtual machine placement for fault-tolerant cloud applications"],"prefix":"10.32604","volume":"22","author":[{"given":"Xiao","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jian-Hui","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2016,3,2]]},"reference":[{"key":"CIT0001","first-page":"17","author":"Avizienis A.","year":"1995","journal-title":"Software Fault Tolerance"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.72"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.122"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.7"},{"volume-title":"A qualitative and quantitative study on availability of cloud computing","year":"2013","author":"Chen H. L.","key":"CIT0005"},{"key":"CIT0006","first-page":"100","author":"Duncan E.","year":"2010","journal-title":"VMware vSphere 4.1 HA and DRS Technical Deepdive"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1109\/GCE"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23786-7_5"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.5"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.5071526"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2013.786963"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544273"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.220"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2011.02253"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2007.904554"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.86"},{"key":"CIT0017","first-page":"71","author":"Lyu M. R.","year":"1996","journal-title":"Handbook of Software Reliability Engineering"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2010.5488431"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374776"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.48"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2011.10643184"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.15"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.91"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.237"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.283"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.308"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2013.786968"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2013.786969"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34207-3"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.28"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.42"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1152775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T13:08:47Z","timestamp":1591189727000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1152775"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,2]]},"references-count":31,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,4,20]]},"published-print":{"date-parts":[[2016,10]]}},"alternative-id":["10.1080\/10798587.2016.1152775"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2016.1152775","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"type":"print","value":"1079-8587"},{"type":"electronic","value":"2326-005X"}],"subject":[],"published":{"date-parts":[[2016,3,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}