{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T14:04:22Z","timestamp":1763474662429,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,5]],"date-time":"2017-12-05T00:00:00Z","timestamp":1512432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010669","name":"H2020 LEIT Information and Communication Technologies","doi-asserted-by":"publisher","award":["643946, 671566"],"award-info":[{"award-number":["643946, 671566"]}],"id":[{"id":"10.13039\/100010669","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,5]]},"DOI":"10.1145\/3147213.3149375","type":"proceedings-article","created":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T15:03:47Z","timestamp":1512140627000},"page":"207-208","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Utility-Driven Deployment Decision Making"],"prefix":"10.1145","author":[{"given":"Radhika","family":"Loomba","sequence":"first","affiliation":[{"name":"Intel Labs Europe, Leixlip, Ireland"}]},{"given":"Thijs","family":"Metsch","sequence":"additional","affiliation":[{"name":"Intel Labs Europe, Leixlip, Ireland"}]},{"given":"Leonard","family":"Feehan","sequence":"additional","affiliation":[{"name":"Intel Labs Europe, Leixlip, Ireland"}]},{"given":"Joe","family":"Butler","sequence":"additional","affiliation":[{"name":"Intel Labs Europe, Leixlip, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2017,12,5]]},"reference":[{"volume-title":"MAUT-Multi Attribute Utility Theory","author":"Dyer James S.","key":"e_1_3_2_1_1_1","unstructured":"James S. Dyer. 2005. MAUT-Multi Attribute Utility Theory. Vol. Vol. 78. Springer, New York, NY, 265--292."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830013.2830016"},{"volume-title":"Utility Functions, Prices, and Negotiation","author":"Wilkes John","key":"e_1_3_2_1_3_1","unstructured":"John Wilkes. 2009. Utility Functions, Prices, and Negotiation. John Wiley & Sons, Inc. 67--88 pages."}],"event":{"name":"UCC '17: 10th International Conference on Utility and Cloud Computing","sponsor":["IEEE TCSC IEEE Technical Committee on Scalable Computing","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Austin Texas USA","acronym":"UCC '17"},"container-title":["Proceedings of the10th International Conference on Utility and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3147213.3149375","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3147213.3149375","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T14:00:58Z","timestamp":1763474458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3147213.3149375"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,5]]},"references-count":3,"alternative-id":["10.1145\/3147213.3149375","10.1145\/3147213"],"URL":"https:\/\/doi.org\/10.1145\/3147213.3149375","relation":{},"subject":[],"published":{"date-parts":[[2017,12,5]]},"assertion":[{"value":"2017-12-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}