{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T01:21:35Z","timestamp":1725412895671},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/iri.2013.6642533","type":"proceedings-article","created":{"date-parts":[[2013,10,30]],"date-time":"2013-10-30T20:13:22Z","timestamp":1383164002000},"page":"676-683","source":"Crossref","is-referenced-by-count":1,"title":["Controlling Xen Cloud platform via smart phones"],"prefix":"10.1109","author":[{"given":"Abdullah","family":"Almurayh","sequence":"first","affiliation":[]},{"given":"Sudhanshu","family":"Semwal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"year":"0","key":"35"},{"year":"0","key":"17"},{"year":"0","key":"36"},{"year":"0","key":"18"},{"year":"0","key":"33"},{"year":"0","key":"15"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/45.913204"},{"year":"0","key":"16"},{"year":"0","key":"13"},{"year":"0","key":"14"},{"year":"0","key":"11"},{"year":"0","key":"12"},{"year":"0","key":"21"},{"year":"0","key":"20"},{"year":"0","key":"22"},{"year":"0","key":"23"},{"year":"0","key":"24"},{"year":"0","key":"25"},{"year":"0","key":"26"},{"year":"0","key":"27"},{"year":"0","key":"28"},{"year":"0","key":"29"},{"key":"3","first-page":"1","article-title":"A survey onvirtualization technologies","author":"chiueh","year":"2005","journal-title":"RPE Report"},{"key":"2","article-title":"AFramework to control xen cloud platform via mobilesmart phones, xcp mobile manager (ixmm)","author":"almurayh","year":"2012","journal-title":"Computer Science University of Colorado ColoradoSprings Term Report for the Web Mobile Programmingcourse Taught by Professor Edward Chow Dec"},{"year":"0","key":"10"},{"year":"0","key":"1"},{"year":"0","key":"30"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"year":"0","key":"32"},{"key":"5","first-page":"1","article-title":"Performance of virtual machinesunder networked denial of service attacks: Experiments and analysis","author":"shea","year":"2012","journal-title":"Systems Journal"},{"year":"0","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945462"},{"key":"9","first-page":"861","article-title":"A comparison of virtualizationtechnologies for hpc","author":"chaudhary","year":"2008","journal-title":"Advanced InformationNetworking and Applications 2008 AINA 2008 22ndInternational Conference on"},{"year":"0","key":"8"}],"event":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","start":{"date-parts":[[2013,8,14]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2013,8,16]]}},"container-title":["2013 IEEE 14th International Conference on Information Reuse &amp; Integration (IRI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621630\/6642428\/06642533.pdf?arnumber=6642533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T21:19:50Z","timestamp":1490217590000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6642533\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/iri.2013.6642533","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}