{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:00:06Z","timestamp":1740142806488,"version":"3.37.3"},"reference-count":37,"publisher":"Oxford University Press (OUP)","issue":"2","funder":[{"DOI":"10.13039\/501100004482","name":"Kuwait University","doi-asserted-by":"publisher","award":["EO 05\/12"],"award-info":[{"award-number":["EO 05\/12"]}],"id":[{"id":"10.13039\/501100004482","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2,1]]},"DOI":"10.1093\/comjnl\/bxx054","type":"journal-article","created":{"date-parts":[[2017,5,24]],"date-time":"2017-05-24T07:08:34Z","timestamp":1495609714000},"page":"233-247","source":"Crossref","is-referenced-by-count":1,"title":["Exploration of Storage Architectures for Enterprise Network"],"prefix":"10.1093","volume":"61","author":[{"given":"Tahani H","family":"Hussain","sequence":"first","affiliation":[]},{"given":"Paulvanna N","family":"Marimuthu","sequence":"additional","affiliation":[]},{"given":"Sami J","family":"Habib","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2017,5,24]]},"reference":[{"year":"2012","author":"Bakshi","key":"key\n\t\t\t\t20180213073646_bxx054C1"},{"key":"key\n\t\t\t\t20180213073646_bxx054C2","first-page":"464","volume-title":"High Performance Mass Storage and Parallel I\/O: Technologies and Applications","author":"Buyya","year":"2002"},{"year":"2003","author":"Zhang","key":"key\n\t\t\t\t20180213073646_bxx054C3"},{"year":"2005","author":"Aizikowitz","key":"key\n\t\t\t\t20180213073646_bxx054C4"},{"year":"2005","author":"Breitgand","key":"key\n\t\t\t\t20180213073646_bxx054C5"},{"year":"2007","author":"Routray","key":"key\n\t\t\t\t20180213073646_bxx054C6"},{"year":"2012","author":"Choi","key":"key\n\t\t\t\t20180213073646_bxx054C7"},{"year":"2013","author":"NASA Advanced Supercomputing division: NAS parallel benchmarks","key":"key\n\t\t\t\t20180213073646_bxx054C8"},{"key":"key\n\t\t\t\t20180213073646_bxx054C9","first-page":"54","article-title":"Approaches to network simulation based on NS","volume":"9","author":"Liu","year":"2002","journal-title":"Appl. Res. Comput."},{"year":"2012","author":"The Matrix Laboratory Matlab","key":"key\n\t\t\t\t20180213073646_bxx054C10"},{"year":"2010","author":"Hussain","key":"key\n\t\t\t\t20180213073646_bxx054C11"},{"key":"key\n\t\t\t\t20180213073646_bxx054C12","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1002\/dac.2371","article-title":"Supporting multimedia applications through network redesign","volume":"27","author":"Hussain","year":"2014","journal-title":"Int. J. Commun. Syst."},{"year":"2009","author":"Habib","key":"key\n\t\t\t\t20180213073646_bxx054C13"},{"year":"2012","author":"Saleem","key":"key\n\t\t\t\t20180213073646_bxx054C14"},{"year":"2013","author":"Sathiamoorthy","key":"key\n\t\t\t\t20180213073646_bxx054C15"},{"key":"key\n\t\t\t\t20180213073646_bxx054C16","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/2506164.2506171","article-title":"Boosting energy efficiency with mirrored data block replication policy and energy scheduler","volume":"47","author":"Yazd","year":"2013","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"year":"2012","author":"Hu","key":"key\n\t\t\t\t20180213073646_bxx054C17"},{"year":"2009","author":"Song","key":"key\n\t\t\t\t20180213073646_bxx054C18"},{"key":"key\n\t\t\t\t20180213073646_bxx054C19","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/TSC.2010.25","article-title":"A mathematical programming approach for server consolidation problems in virtualized data centers","volume":"3","author":"Speitkamp","year":"2010","journal-title":"IEEE Trans. Serv. Comput."},{"year":"2006","author":"Bichler","key":"key\n\t\t\t\t20180213073646_bxx054C20"},{"key":"key\n\t\t\t\t20180213073646_bxx054C21","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/s11227-010-0421-3","article-title":"Energy efficient utilization of resources in cloud computing systems","volume":"60","author":"Lee","year":"2012","journal-title":"J. Supercomput."},{"year":"2008","author":"Gupta","key":"key\n\t\t\t\t20180213073646_bxx054C22"},{"year":"2011","author":"UBLCS-2011-01","key":"key\n\t\t\t\t20180213073646_bxx054C23"},{"year":"2010","author":"Barbagallo","key":"key\n\t\t\t\t20180213073646_bxx054C24"},{"year":"2004","author":"Hatnik","key":"key\n\t\t\t\t20180213073646_bxx054C25"},{"key":"key\n\t\t\t\t20180213073646_bxx054C26","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1109\/71.879778","article-title":"Performance evaluation of storage systems based on network-attached disks","volume":"11","author":"Ma","year":"2000","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"key\n\t\t\t\t20180213073646_bxx054C27","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1016\/j.procs.2011.07.098","article-title":"Assessing and redesigning enterprise networks through NS-2 to support VoIP","volume":"5","author":"Hussain","year":"2011","journal-title":"Proc. Comput. Sci."},{"year":"2013","author":"Hussain","key":"key\n\t\t\t\t20180213073646_bxx054C28"},{"year":"2013","author":"Hussain","key":"key\n\t\t\t\t20180213073646_bxx054C29"},{"year":"2013","author":"Hussain","key":"key\n\t\t\t\t20180213073646_bxx054C30"},{"year":"2013","author":"The Network Simulator NS-2: Virtual Internetwork Test bed collaboration","key":"key\n\t\t\t\t20180213073646_bxx054C31"},{"year":"2013","author":"The Matrix Laboratory Matlab","key":"key\n\t\t\t\t20180213073646_bxx054C32"},{"key":"key\n\t\t\t\t20180213073646_bxx054C33","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","article-title":"Optimization by simulated annealing","volume":"220","author":"Kirkpatrick","year":"1983","journal-title":"Science"},{"volume-title":"The Art of Computer Systems Performance Analysis","year":"1991","author":"Jain","key":"key\n\t\t\t\t20180213073646_bxx054C34"},{"key":"key\n\t\t\t\t20180213073646_bxx054C35","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511807978","volume-title":"Hands-on Networking: From Theory to Practice","author":"Merani","year":"2009"},{"key":"key\n\t\t\t\t20180213073646_bxx054C36","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-79120-1","volume-title":"End-to-End Quality of Service over Heterogeneous Networks","author":"Braun","year":"2008"},{"volume-title":"Law of Internet Security and Privacy","year":"2004","author":"Connolly","key":"key\n\t\t\t\t20180213073646_bxx054C37"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/2\/233\/23912697\/bxx054.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T20:43:54Z","timestamp":1569357834000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/2\/233\/3861970"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,24]]},"references-count":37,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,5,24]]},"published-print":{"date-parts":[[2018,2,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx054","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2018,2]]},"published":{"date-parts":[[2017,5,24]]}}}