{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:40:31Z","timestamp":1725410431285},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/afrcon.2013.6757655","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T17:15:04Z","timestamp":1394212504000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["Cloud resource management \u2014 Virtual machines competing for limited resources"],"prefix":"10.1109","author":[{"given":"Aaron Blojay","family":"Grant","sequence":"first","affiliation":[]},{"given":"Opeoluwa Tosin","family":"Eluwole","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"YouTube","year":"2011","key":"15"},{"journal-title":"Facebook","year":"2011","key":"16"},{"journal-title":"The Cloud Computing and Distributed Systems (CLOUDS) Laboratory","year":"2011","key":"13"},{"journal-title":"Sandpiper Technique","year":"2011","author":"wood","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2010.5691347"},{"year":"2011","key":"12"},{"journal-title":"Cloud Security and Privacy An Enterprise Perspective on Risks and Compliance","year":"2009","author":"mather","key":"3"},{"journal-title":"MEDC Project Report 2009","year":"2011","author":"wickremasinghe","key":"2"},{"journal-title":"Cloud Computing For Dummies","year":"2010","author":"hurwitz","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470940105"},{"journal-title":"Projects in Computing and Information Systems - A Student's Guide","year":"2005","author":"dawson","key":"7"},{"journal-title":"Cloud Computing A Practical Approach","year":"2010","author":"velte","key":"6"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84996-241-4","article-title":"Cloud computing: Principles","author":"antonopoulos","year":"2010","journal-title":"Systems and Applications Computer Communications and Networks"},{"key":"4","first-page":"394","article-title":"A survey paper on cloud computing","author":"patidar","year":"2012","journal-title":"Second International Conference on Advanced Computing & Communication Technologies (ACCT)"},{"journal-title":"Virtualization for Dummies","year":"2008","author":"golden","key":"9"},{"journal-title":"Research Article CloudSim A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms","year":"2010","author":"calheiros","key":"8"}],"event":{"name":"AFRICON 2013","start":{"date-parts":[[2013,9,9]]},"location":"Pointe-Aux-Piments","end":{"date-parts":[[2013,9,12]]}},"container-title":["2013 Africon"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746871\/6757586\/06757655.pdf?arnumber=6757655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T17:54:59Z","timestamp":1580838899000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6757655\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/afrcon.2013.6757655","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}