{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:19Z","timestamp":1750306519854,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T00:00:00Z","timestamp":1417996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,12,8]]},"DOI":"10.1145\/2676727.2676732","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T16:30:28Z","timestamp":1418056228000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Improving readiness for enterprise migration to the cloud"],"prefix":"10.1145","author":[{"given":"Jill","family":"Jermyn","sequence":"first","affiliation":[{"name":"Columbia University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jinho","family":"Hwang","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kun","family":"Bai","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maja","family":"Vukovic","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nikos","family":"Anerousis","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Salvatore","family":"Stolfo","sequence":"additional","affiliation":[{"name":"Columbia University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2014,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"agility in the cloud. Technical report","author":"Business","year":"2014","unstructured":"Business agility in the cloud. Technical report , Harvard Business Review , June 2014 . Business agility in the cloud. Technical report, Harvard Business Review, June 2014.","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_1_2_1","unstructured":"Softlayer. https:\/\/www.softlayer.com\/. Accessed: 2014-08-22.  Softlayer. https:\/\/www.softlayer.com\/. Accessed: 2014-08-22."},{"key":"e_1_3_2_1_3_1","first-page":"45","volume-title":"11th International Conference on Autonomic Computing (ICAC 14)","author":"Chiang Ron C.","year":"2014","unstructured":"Ron C. Chiang , Jinho Hwang , H. Howie Huang , and Timothy Wood . Matrix : Achieving predictable virtual machine performance in the clouds . In 11th International Conference on Autonomic Computing (ICAC 14) , pages 45 -- 56 , Philadelphia, PA , June 2014 . USENIX Association. Ron C. Chiang, Jinho Hwang, H. Howie Huang, and Timothy Wood. Matrix: Achieving predictable virtual machine performance in the clouds. In 11th International Conference on Autonomic Computing (ICAC 14), pages 45--56, Philadelphia, PA, June 2014. USENIX Association."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038934"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151028"},{"key":"e_1_3_2_1_6_1","unstructured":"IT Infrastructure Discovery Analytics for Logical Dependency Mapping (ALDM). http:\/\/www.ibm.com\/services\/ALDM\/.  IT Infrastructure Discovery Analytics for Logical Dependency Mapping (ALDM). http:\/\/www.ibm.com\/services\/ALDM\/."},{"key":"e_1_3_2_1_7_1","first-page":"320","volume-title":"Integrated Network Management (IM 2013), 2013 IFIP\/IEEE International Symposium on","author":"Bai Kun","year":"2013","unstructured":"Kun Bai , Niyu Ge , H. Jamjoom , Ea-Ee Jan , L. Renganarayana , and Xiaolan Zhang . What to discover before migrating to the cloud . In Integrated Network Management (IM 2013), 2013 IFIP\/IEEE International Symposium on , pages 320 -- 327 , May 2013 . Kun Bai, Niyu Ge, H. Jamjoom, Ea-Ee Jan, L. Renganarayana, and Xiaolan Zhang. What to discover before migrating to the cloud. In Integrated Network Management (IM 2013), 2013 IFIP\/IEEE International Symposium on, pages 320--327, May 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427186_34"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2011.28"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.107"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844151"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855610.1855620"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2011.5986483"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2631446"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390250"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851212"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833690"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195847"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.119"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342366"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816704"}],"event":{"name":"Middleware '14: 15th International Middleware Conference","acronym":"Middleware '14","location":"Bordeaux France"},"container-title":["Proceedings of the Middleware Industry Track"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676727.2676732","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2676727.2676732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:11:56Z","timestamp":1750227116000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676727.2676732"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,8]]},"references-count":22,"alternative-id":["10.1145\/2676727.2676732","10.1145\/2676727"],"URL":"https:\/\/doi.org\/10.1145\/2676727.2676732","relation":{},"subject":[],"published":{"date-parts":[[2014,12,8]]},"assertion":[{"value":"2014-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}