{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T02:06:40Z","timestamp":1761962800440,"version":"build-2065373602"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/greencomp.2010.5598290","type":"proceedings-article","created":{"date-parts":[[2010,10,8]],"date-time":"2010-10-08T13:32:41Z","timestamp":1286544761000},"page":"389-396","source":"Crossref","is-referenced-by-count":4,"title":["Improving resource efficiency in data centers using reputation-based resource selection"],"prefix":"10.1109","author":[{"family":"Tung Nguyen","sequence":"first","affiliation":[]},{"given":"Weisong","family":"Shi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755940"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2005.1542748"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.443"},{"key":"ref11","first-page":"261","author":"bohrer","year":"2002","journal-title":"The Case for Power Management in Web Servers"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HPC.2000.846563"},{"journal-title":"Green grid data center power efficiency metrics PUE and DCIE","year":"2008","author":"christia beladyn","key":"ref13"},{"key":"ref14","article-title":"Us government to consolidate data centers?","author":"clark","year":"2010","journal-title":"The Data Center Journal"},{"key":"ref15","article-title":"The beta reputation system","author":"commerce","year":"2002","journal-title":"In Proceedings of the 15th Bled Electronic Commerce Conference"},{"journal-title":"How to measure and report pue and dcie","year":"2008","author":"dan azevedo","key":"ref16"},{"journal-title":"Technical Report","article-title":"Epa report to congress on server and data center energy efficiency","year":"2007","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2001.945176"},{"journal-title":"Amdahl's Law in the Multicore Era","year":"2010","author":"hill","key":"ref19"},{"key":"ref28","first-page":"1","article-title":"Disk failures in the real world: What does an mttf of 1, 000000 hours mean to you?","author":"schroeder","year":"2007","journal-title":"Proc of the 5th USENIX Conf on File and Storage Technologies"},{"year":"0","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.1998.709966"},{"year":"0","key":"ref3"},{"key":"ref6","first-page":"48","article-title":"Filtering out unfair ratings in bayesian reputation systems","volume":"4","author":"whitby","year":"2003","journal-title":"The lcfain Journal of Management Research"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1094"},{"journal-title":"Improving MapReduce Performance in Heterogeneous Environments","year":"2008","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2002.1012962"},{"key":"ref7","first-page":"28","article-title":"Reputation-based grid resource selection","author":"alunkal","year":"2003","journal-title":"Workshop on Adaptive Grid Middleware"},{"year":"0","key":"ref2"},{"journal-title":"The Datacenter as a Computer An Introduction to the Design of Warehouse-Scale Machines volume Lecture #6","year":"0","author":"barroso","key":"ref9"},{"year":"0","key":"ref1"},{"key":"ref20","article-title":"Service-based approaches to improving data center thermal and power efficiencies","author":"jed scaramella","year":"2007","journal-title":"IDC White Paper"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1145\/775152.775242","article-title":"The eigen-trust algorithm for reputation management in p2p networks","author":"kamvar","year":"2003","journal-title":"Proc of the 12th International World Wide Web Conference (2003)"},{"key":"ref21","article-title":"Analysing topologies of transitive trust","author":"j\u00f8sang","year":"2003","journal-title":"Proc Workshop Formal Aspects in Security and Trust"},{"key":"ref24","article-title":"Analysis of recommendations on trust inference in the open environment","author":"liang","year":"2005","journal-title":"Technical Report MIST-TR-2005-002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/11424505_4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.04.001"},{"key":"ref25","first-page":"771","article-title":"Enforcing cooperative resource sharing in untrusted peer-to-peer environment","volume":"10","author":"liang","year":"2005","journal-title":"ACM Mobile Networks and Applications Journal (MONET)"}],"event":{"name":"2010 International Conference on Green Computing (Green Comp)","start":{"date-parts":[[2010,8,15]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2010,8,18]]}},"container-title":["International Conference on Green Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5586929\/5598251\/05598290.pdf?arnumber=5598290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T14:57:02Z","timestamp":1636642622000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5598290\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/greencomp.2010.5598290","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}