{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T17:01:37Z","timestamp":1748710897693,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/chinacom.2012.6417489","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T22:52:09Z","timestamp":1359586329000},"page":"271-276","source":"Crossref","is-referenced-by-count":2,"title":["Load balancing algorithm based virtual machine dynamic migration scheme for datacenter application with optical networks"],"prefix":"10.1109","author":[{"family":"Xinyu Zhang","sequence":"first","affiliation":[]},{"family":"Yongli Zhao","sequence":"additional","affiliation":[]},{"family":"Xin Su","sequence":"additional","affiliation":[]},{"family":"Ruiying He","sequence":"additional","affiliation":[]},{"family":"Weiwei Wang","sequence":"additional","affiliation":[]},{"family":"Jie Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254834"},{"journal-title":"Dynamic Load Balancing Based on Live Migration of Virtual Machines Security Threats and Effects","year":"0","author":"ver","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74450-4_44"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2009.20"},{"key":"6","article-title":"Empirical Exploitation of live migration of virtual machines","author":"oberheide","year":"2008","journal-title":"Proc of Black Hat DC"},{"journal-title":"Memory Overbooking and Dynamic Control of Xen Virtual Machines in Consolidated Environments","year":"2009","author":"heo xiaoyun","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2007.358739"},{"key":"9","article-title":"A guide to dynamic load balancing in distributed computer systems","volume":"10","author":"alakeel","year":"2010","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"8","article-title":"Empirical exploitation of live migration of virtual machines","author":"oberheide","year":"2008","journal-title":"Proc of Black Hat DC"}],"event":{"name":"2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)","start":{"date-parts":[[2012,8,8]]},"location":"Kun Ming","end":{"date-parts":[[2012,8,10]]}},"container-title":["7th International Conference on Communications and Networking in China"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6410218\/6417432\/06417489.pdf?arnumber=6417489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:25:56Z","timestamp":1490142356000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6417489\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/chinacom.2012.6417489","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}