{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:14Z","timestamp":1772164034355,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,8,30]],"date-time":"2010-08-30T00:00:00Z","timestamp":1283126400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,8,30]]},"DOI":"10.1145\/1851182.1851212","type":"proceedings-article","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T09:06:04Z","timestamp":1283245564000},"page":"243-254","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":102,"title":["Cloudward bound"],"prefix":"10.1145","author":[{"given":"Mohammad","family":"Hajjat","sequence":"first","affiliation":[{"name":"Purdue, West Lafayette, IN, USA"}]},{"given":"Xin","family":"Sun","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Yu-Wei Eric","family":"Sung","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"David","family":"Maltz","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Sanjay","family":"Rao","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Kunwadee","family":"Sripanidkulchai","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY, USA"}]},{"given":"Mohit","family":"Tawarmalani","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon Elastic Compute Cloud (EC2). http:\/\/aws.amazon.com\/ec2\/.  Amazon Elastic Compute Cloud (EC2). http:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon Virtual Private Cloud. http:\/\/aws.amazon.com\/vpc\/.  Amazon Virtual Private Cloud. http:\/\/aws.amazon.com\/vpc\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon Web Services: Overview of Security Processes White Paper. http:\/\/aws.amazon.com\/security.  Amazon Web Services: Overview of Security Processes White Paper. http:\/\/aws.amazon.com\/security."},{"key":"e_1_3_2_1_4_1","unstructured":"Animoto - Scaling Through Viral Growth. http:\/\/aws.typepad.com\/aws\/2008\/04\/animoto--scali.html.  Animoto - Scaling Through Viral Growth. http:\/\/aws.typepad.com\/aws\/2008\/04\/animoto--scali.html."},{"key":"e_1_3_2_1_5_1","unstructured":"DB2 for z\/OS Performance Monitoring and Tuning Guide. http:\/\/publib.boulder.ibm.com\/infocenter\/dzichelp\/v2r2\/topic\/com.ibm.db29.doc.perf\/dsnpfk17.pdf.  DB2 for z\/OS Performance Monitoring and Tuning Guide. http:\/\/publib.boulder.ibm.com\/infocenter\/dzichelp\/v2r2\/topic\/com.ibm.db29.doc.perf\/dsnpfk17.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"IBM ILOG CPLEX. http:\/\/www-01.ibm.com\/software\/integration\/optimization\/cplex\/.  IBM ILOG CPLEX. http:\/\/www-01.ibm.com\/software\/integration\/optimization\/cplex\/."},{"key":"e_1_3_2_1_7_1","unstructured":"IBM Service Management Tivoli Application Dependency Discovery Manager Software. http:\/\/www-01.ibm.com\/software\/tivoli\/products\/taddm\/.  IBM Service Management Tivoli Application Dependency Discovery Manager Software. http:\/\/www-01.ibm.com\/software\/tivoli\/products\/taddm\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Microsoft Windows Azure. http:\/\/www.microsoft.com\/windowsazure\/.  Microsoft Windows Azure. http:\/\/www.microsoft.com\/windowsazure\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Riverbed Technology. http:\/\/www.riverbed.com\/.  Riverbed Technology. http:\/\/www.riverbed.com\/."},{"key":"e_1_3_2_1_10_1","unstructured":"SQL Azure Firewall. http:\/\/msdn.microsoft.com\/en-us\/library\/ee621782.aspx.  SQL Azure Firewall. http:\/\/msdn.microsoft.com\/en-us\/library\/ee621782.aspx."},{"key":"e_1_3_2_1_11_1","unstructured":"The Case Against Cloud Computing. http:\/\/www.cio.com\/article\/477473\/.  The Case Against Cloud Computing. http:\/\/www.cio.com\/article\/477473\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Websphere application server performance monitoring infrastructure (pmi). http:\/\/publib.boulder.ibm.com\/infocenter\/wasinfo\/v6r0\/index.jsp?topic=\/com.ibm.websphere.express.doc\/info\/exp\/ae\/cprf_pmi_arch.html.  Websphere application server performance monitoring infrastructure (pmi). http:\/\/publib.boulder.ibm.com\/infocenter\/wasinfo\/v6r0\/index.jsp?topic=\/com.ibm.websphere.express.doc\/info\/exp\/ae\/cprf_pmi_arch.html."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945454"},{"key":"e_1_3_2_1_15_1","unstructured":"Arthur Cole. The Future Belongs to Hybrid Clouds. http:\/\/www.itbusinessedge.com\/cm\/blogs\/cole\/the-future-belongs-to-hybrid-clouds\/?cs=30482.  Arthur Cole. The Future Belongs to Hybrid Clouds. http:\/\/www.itbusinessedge.com\/cm\/blogs\/cole\/the-future-belongs-to-hybrid-clouds\/?cs=30482."},{"key":"e_1_3_2_1_16_1","volume-title":"Introduction to Algorithms","author":"Cormen T. H.","year":"2001","unstructured":"T. H. Cormen , C. Stein , R. L. Rivest , and C. E. Leiserson . Introduction to Algorithms . McGraw-Hill Higher Education , 2001 . T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson. Introduction to Algorithms. McGraw-Hill Higher Education, 2001."},{"key":"e_1_3_2_1_17_1","unstructured":"D. Gottfrid. The New York Times Archives + Amazon Web Services = TimesMachine. http:\/\/open.blogs.nytimes.com\/2008\/05\/21\/.  D. Gottfrid. The New York Times Archives + Amazon Web Services = TimesMachine. http:\/\/open.blogs.nytimes.com\/2008\/05\/21\/."},{"key":"e_1_3_2_1_18_1","unstructured":"J. Hamilton. The Cost of Latency. http:\/\/perspectives.mvdirona.com\/2009\/10\/31\/TheCostOfLatency.aspx Oct. 2009.  J. Hamilton. The Cost of Latency. http:\/\/perspectives.mvdirona.com\/2009\/10\/31\/TheCostOfLatency.aspx Oct. 2009."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-003-0467-6"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374831"},{"key":"e_1_3_2_1_22_1","unstructured":"M. O'Neill. Connecting to the cloud. http:\/\/www.ibm.com\/developerworks\/library\/x-cloudpt1\/.  M. O'Neill. Connecting to the cloud. http:\/\/www.ibm.com\/developerworks\/library\/x-cloudpt1\/."},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. SOSP LADIS Workshop","author":"Sripanidkulchai K.","year":"2009","unstructured":"K. Sripanidkulchai , S. Sahu , Y. Ruan , A. Shaikh , and C. Dorai . Are Clouds Ready for Large Distributed Applications ? In Proc. SOSP LADIS Workshop , 2009 . K. Sripanidkulchai, S. Sahu, Y. Ruan, A. Shaikh, and C. Dorai. Are Clouds Ready for Large Distributed Applications? In Proc. SOSP LADIS Workshop, 2009."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544034"},{"key":"e_1_3_2_1_25_1","unstructured":"Symantec. 2010 State of the Data Center Global Data. http:\/\/www.symantec.com\/content\/en\/us\/about\/media\/pdfs\/Symantec_DataCenter10_Report_Global.pdf.  Symantec. 2010 State of the Data Center Global Data. http:\/\/www.symantec.com\/content\/en\/us\/about\/media\/pdfs\/Symantec_DataCenter10_Report_Global.pdf."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064252"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2005.27"},{"key":"e_1_3_2_1_28_1","volume-title":"Merwe. The Case for Enterprise-Ready Virtual Private Clouds. In Proc. HotCloud Workshop","author":"Wood T.","year":"2009","unstructured":"T. Wood , P. Shenoy , A. Gerber , K. Ramakrishnan , and J. V. der Merwe. The Case for Enterprise-Ready Virtual Private Clouds. In Proc. HotCloud Workshop , 2009 . T. Wood, P. Shenoy, A. Gerber, K. Ramakrishnan, and J. V. der Merwe. The Case for Enterprise-Ready Virtual Private Clouds. In Proc. HotCloud Workshop, 2009."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498492"}],"event":{"name":"SIGCOMM '10: ACM SIGCOMM 2010 Conference","location":"New Delhi India","acronym":"SIGCOMM '10","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2010 conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1851182.1851212","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1851182.1851212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:08:50Z","timestamp":1750234130000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1851182.1851212"}},"subtitle":["planning for beneficial migration of enterprise applications to the cloud"],"short-title":[],"issued":{"date-parts":[[2010,8,30]]},"references-count":27,"alternative-id":["10.1145\/1851182.1851212","10.1145\/1851182"],"URL":"https:\/\/doi.org\/10.1145\/1851182.1851212","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1851275.1851212","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2010,8,30]]},"assertion":[{"value":"2010-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}