{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T12:11:16Z","timestamp":1774872676796,"version":"3.50.1"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T00:00:00Z","timestamp":1548288000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13677-018-0124-5","type":"journal-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T08:03:23Z","timestamp":1548317003000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Optimal deployment of components of cloud-hosted application for guaranteeing multitenancy isolation"],"prefix":"10.1186","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4148-1085","authenticated-orcid":false,"given":"Laud Charles","family":"Ochei","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Petrovski","sequence":"additional","affiliation":[]},{"given":"Julian M.","family":"Bass","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"124_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-1568-8","volume-title":"Cloud Computing Patterns","author":"C Fehling","year":"2014","unstructured":"Fehling C, Leymann F, Retter R, Schupeck W, Arbitter P (2014) Cloud Computing Patterns. Springer, London."},{"key":"124_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-2554-6_1","volume-title":"Beginning Java Google App Engine","author":"K Roche","year":"2009","unstructured":"Roche K, Douglas J, Beginning google app engine for java (2009) Beginning Java Google App Engine. Apress, New York City. \n                    https:\/\/doi.org\/10.1007\/978-1-4302-2554-6\n                    \n                  ."},{"key":"124_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/9781118393994","volume-title":"Reliability and availability of cloud computing","author":"E Bauer","year":"2012","unstructured":"Bauer E, Adams R (2012) Reliability and availability of cloud computing. Wiley, New Jersey."},{"key":"124_CR4","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-642-13821-8_8","volume-title":"Research into Practice\u2013Reality and Gaps","author":"A Martens","year":"2010","unstructured":"Martens A, Ardagna D, Koziolek H, Mirandola R, Reussner R (2010) A hybrid approach for multi-attribute qos optimisation in component based software systems In: Research into Practice\u2013Reality and Gaps, 84\u2013101.. Springer, Berlin. \n                    https:\/\/doi.org\/10.1007\/978-3-642-13821-8_8\n                    \n                  ."},{"key":"124_CR5","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-12002-2_6","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"J Legriel","year":"2010","unstructured":"Legriel J, Le Guernic C, Cotton S, Maler O (2010) Approximating the pareto front of multi-criteria optimization problems In: Tools and Algorithms for the Construction and Analysis of Systems, 69\u201383.. Springer, Berlin. \n                    https:\/\/doi.org\/10.1007\/978-3-642-12002-2_6\n                    \n                  ."},{"key":"124_CR6","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/ICCAC.2015.16","volume-title":"Cloud and Autonomic Computing (ICCAC), 2015 International Conference on","author":"A Aldhalaan","year":"2015","unstructured":"Aldhalaan A, Menasc\u00e9 DA (2015) Near-optimal allocation of vms from iaas providers by saas providers In: Cloud and Autonomic Computing (ICCAC), 2015 International Conference on, 228\u2013231.. IEEE, Boston. \n                    https:\/\/doi.org\/10.1109\/ICCAC.2015.16\n                    \n                  ."},{"key":"124_CR7","doi-asserted-by":"crossref","unstructured":"Ochei L, Petrovski A, Bass J (2016) Optimizing the deployment of cloud-hosted application components for guaranteeing multitenancy isolation In: IEEE Conference Publications, 77\u201383. 2016 International Conference on Information Society (i-Society 2016).","DOI":"10.1109\/i-Society.2016.7854180"},{"key":"124_CR8","unstructured":"Hon K, Millard C (2017) Eu data protection law and the cloud. International Association of Privacy Professionals. [Online: accessed in February, 2017 from \n                    https:\/\/iapp.org\/resources\/article\/\n                    \n                  ]."},{"key":"124_CR9","unstructured":"Google (2017) Google cloud platform and the eu data protection directive. Google Inc. [Online: accessed in February, 2017 from \n                    https:\/\/cloud.google.com\/security\/compliance\/eu-data-protection\/\n                    \n                  ]."},{"key":"124_CR10","doi-asserted-by":"crossref","unstructured":"Garg SK, Versteeg S, Buyya R (2012) A framework for ranking of cloud computing services In: Future Generation Computer Systems.","DOI":"10.1016\/j.future.2012.06.006"},{"key":"124_CR11","volume-title":"Introducing kafka streams: Stream processing made simple","author":"J Kreps","year":"2016","unstructured":"Kreps J (2016) Introducing kafka streams: Stream processing made simple. Confluent, Inc, California, USA. Online: accessed in November, 2018 from \n                    https:\/\/www.confluent.io\/blog\/introducing-kafka-streams-stream-processing-made-simple\/\n                    \n                  ."},{"key":"124_CR12","unstructured":"Kafka (2016) Introduction: Apache kafka is a distributed streaming platform. what exactly does that mean? Confluent, Inc., California, USA. Online: accessed in November, 2018 from \n                    https:\/\/kafka.apache.org\/documentation\/\n                    \n                  ."},{"key":"124_CR13","volume-title":"The hudson book","author":"M Manfred Moser","year":"2011","unstructured":"Manfred Moser M, O\u2019Brien T (2011) The hudson book. Oracle, Inc., USA. Online: accessed in November, 2018 from \n                    http:\/\/www.eclipse.org\/hudson\/the-hudson-book\/book-hudson.pdf\n                    \n                  ."},{"key":"124_CR14","unstructured":"Hudson (2018) Files found trigger. [Online: accessed in January, 2018 from \n                    https:\/\/plugins.jenkins.io\/files-found-trigger\n                    \n                  ]."},{"issue":"4","key":"124_CR15","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50\u201358. [Online]. Available \n                    http:\/\/doi.acm.org\/10.1145\/1721654.1721672\n                    \n                  .","journal-title":"Commun ACM"},{"key":"124_CR16","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/ICCAC.2015.17","volume-title":"2015 International Conference on Cloud and Autonomic Computing (ICCAC)","author":"LC Ochei","year":"2015","unstructured":"Ochei LC, Bass J, Petrovski (a) A (2015) Evaluating degrees of multitenancy isolation: A case study of cloud-hosted gsd tools In: 2015 International Conference on Cloud and Autonomic Computing (ICCAC), 101\u2013112.. IEEE, Boston. \n                    https:\/\/doi.org\/10.1109\/ICCAC.2015.17\n                    \n                  ."},{"key":"124_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.56","volume-title":"13th IEEE International Conference on Services Computing (SCC 2016)","author":"LC Ochei","year":"2016","unstructured":"Ochei LC, Bass J, Petrovski (b) A (2016) Implementing the required degree of multitenancy isolation: A case study of cloud-hosted bug tracking system In: 13th IEEE International Conference on Services Computing (SCC 2016).. IEEE, San Francisco. \n                    https:\/\/doi.org\/10.1109\/SCC.2016.56\n                    \n                  ."},{"key":"124_CR18","unstructured":"Mehta A (2017) Successful strategies for a multi-tenant architecture. Developer.com(\n                    http:\/\/www.devx.com\/\n                    \n                  ) \n                    http:\/\/www.devx.com\/architect\/Article\/47662\n                    \n                  . Accessed Jan 2017."},{"key":"124_CR19","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/CloudCom.2012.6427524","volume-title":"Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on","author":"S Strauch","year":"2012","unstructured":"Strauch S, Andrikopoulos V, Leymann F, Muhler D (2012) Esb mt: Enabling multi-tenancy in enterprise service buses In: Cloud Computing Technology and Science (CloudCom), 2012 IEEE 4th International Conference on, 456\u2013463.. IEEE, Taipei. \n                    https:\/\/doi.org\/10.1109\/CloudCom.2012.6427524\n                    \n                  ."},{"issue":"9","key":"124_CR20","doi-asserted-by":"publisher","first-page":"39","DOI":"10.5815\/ijmecs.2012.09.05","volume":"4","author":"MF Khan","year":"2012","unstructured":"Khan MF, Mirza AU, et al. (2012) An approach towards customized multi-tenancy. Int J Mod Educ Comput Sci 4(9):39.","journal-title":"Int J Mod Educ Comput Sci"},{"key":"124_CR21","first-page":"139","volume":"11","author":"C Momm","year":"2011","unstructured":"Momm C, Krebs R (2011) A qualitative discussion of different approaches for implementing multi-tenant saas offerings. Softw Eng (Workshops) 11:139\u2013150.","journal-title":"Softw Eng (Workshops)"},{"key":"124_CR22","unstructured":"Aiken L (2017) Why multi-tenancy is key to successful and sustainable software-as-a-service (saas). Cloudbook Journal. [Online: accessed in February 2017 from http:\/\/www.cloudbook.net\/resources\/stories\/]."},{"key":"124_CR23","unstructured":"Chong F, Carraro G (2006) Architecture strategies for catching the long tail. technical report, microsoft. [Online: accessed in February 2015 from \n                    https:\/\/msdn.microsoft.com\/en-us\/library\/aa479069.aspx\n                    \n                  ]."},{"key":"124_CR24","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/ICEBE.2008.60","volume-title":"E-Business Engineering, 2008. ICEBE\u201908. IEEE International Conference on","author":"ZH Wang","year":"2008","unstructured":"Wang ZH, Guo CJ, Gao B, Sun W, Zhang Z, An WH (2008) A study and performance evaluation of the multi-tenant data tier design patterns for service oriented computing In: E-Business Engineering, 2008. ICEBE\u201908. IEEE International Conference on, 94\u2013101.. IEEE, Xi\u2019an. \n                    https:\/\/doi.org\/10.1109\/ICEBE.2008.60\n                    \n                  ."},{"key":"124_CR25","unstructured":"Vengurlekar N (2012) Isolation in private database clouds. Oracle Corporation. Online: Accessed in March, 2015 from \n                    http:\/\/www.oracle.com\/technetwork\/database\/database-cloud\/\n                    \n                  ."},{"key":"124_CR26","doi-asserted-by":"publisher","unstructured":"Mietzner R, Unger T, Titze R, Leymann F (2009) Combining different multi-tenancy patterns in service-oriented applications In: Enterprise Distributed Object Computing Conference, 2009. EDOC\u201909. IEEE International, 131\u2013140.. IEEE. \n                    https:\/\/doi.org\/10.1109\/EDOC.2009.13\n                    \n                  .","DOI":"10.1109\/EDOC.2009.13"},{"key":"124_CR27","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/CEC-EEE.2007.4","volume-title":"E-Commerce Technology and the 4th IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services, 2007. CEC\/EEE 2007. The 9th IEEE International Conference on E-Commerce Technology","author":"CJ Guo","year":"2007","unstructured":"Guo CJ, Sun W, Huang Y, Wang ZH, Gao B (2007) A framework for native multi-tenancy application development and management In: E-Commerce Technology and the 4th IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services, 2007. CEC\/EEE 2007. The 9th IEEE International Conference on E-Commerce Technology, 551\u2013558.. IEEE, Tokyo. \n                    https:\/\/doi.org\/10.1109\/CEC-EEE.2007.4\n                    \n                  ."},{"key":"124_CR28","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/UCC.2015.27","volume-title":"Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing","author":"S Walraven","year":"2012","unstructured":"Walraven S, Monheim T, Truyen E, Joosen W (2012) Towards performance isolation in multi-tenant saas applications In: Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing, 6.. ACM, Limassol. \n                    https:\/\/doi.org\/10.1109\/UCC.2015.27\n                    \n                  ."},{"key":"124_CR29","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/978-3-642-39200-9_36","volume-title":"Web Engineering","author":"R Krebs","year":"2013","unstructured":"Krebs R, Wert A, Kounev S (2013) Multi-tenancy performance benchmark for web application platforms In: Web Engineering, 424\u2013438.. Springer, Berlin."},{"issue":"4","key":"124_CR30","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/s10922-013-9265-5","volume":"22","author":"H Moens","year":"2014","unstructured":"Moens H, Truyen E, Walraven S, Joosen W, Dhoedt B, De Turck F (2014) Cost-effective feature placement of customizable multi-tenant applications in the cloud. J Netw Syst Manag 22(4):517\u2013558.","journal-title":"J Netw Syst Manag"},{"key":"124_CR31","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1109\/CLOUD.2012.61","volume-title":"Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on","author":"ZIM Yusoh","year":"2012","unstructured":"Yusoh ZIM, Tang M (2012) Composite saas placement and resource optimization in cloud computing using evolutionary algorithms In: Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, 590\u2013597.. IEEE, Honolulu. \n                    https:\/\/doi.org\/10.1109\/CLOUD.2012.61\n                    \n                  ."},{"key":"124_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICAETR.2014.7012861","volume-title":"Advances in Engineering and Technology Research (ICAETR), 2014 International Conference on","author":"F Shaikh","year":"2014","unstructured":"Shaikh F, Patil D (2014) Multi-tenant e-commerce based on saas model to minimize it cost In: Advances in Engineering and Technology Research (ICAETR), 2014 International Conference on, 1\u20134.. IEEE, Unnao. \n                    https:\/\/doi.org\/10.1109\/ICAETR.2014.7012861\n                    \n                  ."},{"key":"124_CR33","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1858263.1858267","volume-title":"Proceedings of the 2nd International Workshop on the Quality of Service-Oriented Software Systems","author":"D Westermann","year":"2010","unstructured":"Westermann D, Momm C (2010) Using software performance curves for dependable and cost-efficient service hosting In: Proceedings of the 2nd International Workshop on the Quality of Service-Oriented Software Systems, 3.. ACM, Oslo. \n                    https:\/\/doi.org\/10.1145\/1858263.1858267\n                    \n                  ."},{"issue":"3","key":"124_CR34","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1109\/TCC.2015.2424877","volume":"3","author":"D Candeia","year":"2015","unstructured":"Candeia D, Santos RA, Lopes R (2015) Business-driven long-term capacity planning for saas applications. IEEE Trans Cloud Comput 3(3):290\u2013303.","journal-title":"IEEE Trans Cloud Comput"},{"key":"124_CR35","doi-asserted-by":"publisher","DOI":"10.1145\/1858263.1858267","volume-title":"The art of scalability: Scalable web architecture, processes, and organizations for the modern enterprise","author":"ML Abbott","year":"2009","unstructured":"Abbott ML, Fisher MT (2009) The art of scalability: Scalable web architecture, processes, and organizations for the modern enterprise. Pearson Education, New Jersey. \n                    https:\/\/doi.org\/10.1145\/1858263.1858267\n                    \n                  ."},{"issue":"03","key":"124_CR36","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1142\/S0218843011002250","volume":"20","author":"F Leymann","year":"2011","unstructured":"Leymann F, Fehling C, Mietzner R, Nowak A, Dustdar S (2011) Moving applications to the cloud: an approach based on application model enrichment. Int J Coop Inf Syst 20(03):307\u2013356.","journal-title":"Int J Coop Inf Syst"},{"key":"124_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/NOMS.2014.6838331","volume-title":"Network Operations and Management Symposium (NOMS), 2014 IEEE","author":"T Vanhove","year":"2014","unstructured":"Vanhove T, Vandensteen J, Van Seghbroeck G, Wauters T, De Turck F (2014) Kameleo: Design of a new platform-as-a-service for flexible data management In: Network Operations and Management Symposium (NOMS), 2014 IEEE, 1\u20134.. IEEE, Krakow. \n                    https:\/\/doi.org\/10.1109\/NOMS.2014.6838331\n                    \n                  ."},{"key":"124_CR38","unstructured":"Krebs R (2015) Performance isolation in multi-tenant applications. Ph.D. dissertation. PhD thesis (Karlsruhe Institute of Technology). \n                    https:\/\/se.informatik.uni-wuerzburg.de\/fileadmin\/10030200\/user_upload\/dissKIT_BW.PDF\n                    \n                  ."},{"key":"124_CR39","doi-asserted-by":"publisher","DOI":"10.1145\/2405178.2405184","volume-title":"Comparison of request admission based performance isolation approaches in multi-tenant saas applications","author":"R Krebs","year":"2014","unstructured":"Krebs R, Loesch M (2014) Comparison of request admission based performance isolation approaches in multi-tenant saas applications. ACM, Montreal. \n                    https:\/\/doi.org\/10.1145\/2405178.2405184\n                    \n                  ."},{"key":"124_CR40","volume-title":"Near-optimal allocation of vms form iaas providers by saas providers","author":"A Aldhalaan","year":"2015","unstructured":"Aldhalaan A, Menasc\u00e9 DA (2015) Near-optimal allocation of vms form iaas providers by saas providers. George Mason University, Fairfax."},{"key":"124_CR41","volume-title":"Performance by design: capacity planning by example","author":"D Menasce","year":"2004","unstructured":"Menasce D, Almeida V, Lawrence D (2004) Performance by design: capacity planning by example. Prentice Hall, Upper Saddle River."},{"key":"124_CR42","volume-title":"Software Architecture in Practice, 3\/E","author":"L Bass","year":"2013","unstructured":"Bass L, Clements P, Kazman R (2013) Software Architecture in Practice, 3\/E. Pearson Education, United States."},{"issue":"3","key":"124_CR43","doi-asserted-by":"publisher","first-page":"601","DOI":"10.20533\/ijicr.2042.4655.2015.0075","volume":"6","author":"LC Ochei","year":"2015","unstructured":"Ochei LC, Petrovski A, Bass J (2015) Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (vcs). Int J Intell Comput Res 6(3):601\u2013612.","journal-title":"Int J Intell Comput Res"},{"issue":"5","key":"124_CR44","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1016\/j.infsof.2011.01.004","volume":"53","author":"DS Cruzes","year":"2011","unstructured":"Cruzes DS, Dyb\u00e5 T (2011) Research synthesis in software engineering: A tertiary study. Inf Softw Technol 53(5):440\u2013455.","journal-title":"Inf Softw Technol"},{"key":"124_CR45","doi-asserted-by":"publisher","DOI":"10.1002\/9780470496916","volume-title":"Metaheuristics: from design to implementation","author":"E-G Talbi","year":"2009","unstructured":"Talbi E-G (2009) Metaheuristics: from design to implementation. Wiley, New Jersey."},{"key":"124_CR46","volume-title":"Component Software: Beyond Object-Oriented Programming, second edition ed","author":"C Szyperski","year":"2007","unstructured":"Szyperski C (2007) Component Software: Beyond Object-Oriented Programming, second edition ed. Pearson Education Limited, London WC2E 9AW."},{"key":"124_CR47","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-1-4615-5025-9_16","volume-title":"Multicriteria Decision Making","author":"AJ Chipperfield","year":"1999","unstructured":"Chipperfield AJ, Whidborne JF, Fleming PJ (1999) Evolutionary algorithms and simulated annealing for mcdm In: Multicriteria Decision Making, 501\u2013532.. Springer, New York."},{"issue":"3","key":"124_CR48","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1023\/A:1009622230725","volume":"6","author":"EK Karasakal","year":"2000","unstructured":"Karasakal EK, K\u00f6ksalan M (2000) A simulated annealing approach to bicriteria scheduling problems on a single machine. J Heuristics 6(3):311\u2013327.","journal-title":"J Heuristics"},{"key":"124_CR49","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/S0304-0208(08)73237-7","volume":"132","author":"S Martello","year":"1987","unstructured":"Martello S, Toth P (1987) Algorithms for knapsack problems. North-Holland Math Stud 132:213\u2013257.","journal-title":"North-Holland Math Stud"},{"key":"124_CR50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24777-7","volume-title":"Introduction to NP-Completeness of knapsack problems","author":"H Kellerer","year":"2004","unstructured":"Kellerer H, Pferschy U, Pisinger D (2004) Introduction to NP-Completeness of knapsack problems. Springer, Berlin. \n                    https:\/\/doi.org\/10.1007\/978-3-540-24777-7_16\n                    \n                  ."},{"key":"124_CR51","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838331","volume-title":"Knapsack problems: algorithms and computer implementations","author":"S Martello","year":"1990","unstructured":"Martello S, Toth P (1990) Knapsack problems: algorithms and computer implementations. Wiley, New York. \n                    https:\/\/doi.org\/10.1109\/NOMS.2014.6838331\n                    \n                  ."},{"issue":"1","key":"124_CR52","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/1232722.1232728","volume":"1","author":"T Yu","year":"2007","unstructured":"Yu T, Zhang Y, Lin K-J (2007) Efficient algorithms for web services selection with end-to-end qos constraints. ACM Trans Web (TWEB) 1(1):6.","journal-title":"ACM Trans Web (TWEB)"},{"issue":"5","key":"124_CR53","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1016\/j.cor.2004.09.016","volume":"33","author":"MM Akbar","year":"2006","unstructured":"Akbar MM, Rahman MS, Kaykobad M, Manning EG, Shoja GC (2006) Solving the multidimensional multiple-choice knapsack problem by constructing convex hulls. Comput Oper Res 33(5):1259\u20131273.","journal-title":"Comput Oper Res"},{"key":"124_CR54","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.simpat.2016.10.005","volume":"70","author":"T Vondra","year":"2017","unstructured":"Vondra T, \u0160edivy\u0300 J (2017) Cloud autoscaling simulation based on queueing network model. Simul Model Pract Theory 70:83\u2013100.","journal-title":"Simul Model Pract Theory"},{"issue":"2","key":"124_CR55","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1007\/s10586-016-0568-7","volume":"19","author":"DJ Dubois","year":"2016","unstructured":"Dubois DJ, Casale G (2016) Optispot: minimizing application deployment cost using spot cloud resources. Clust Comput 19(2):893\u2013909.","journal-title":"Clust Comput"},{"key":"124_CR56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72962-4","volume-title":"Design of modern heuristics: principles and application","author":"F Rothlauf","year":"2011","unstructured":"Rothlauf F (2011) Design of modern heuristics: principles and application. Springer, Berlin. \n                    https:\/\/doi.org\/10.1007\/978-3-540-72962-4\n                    \n                  ."},{"issue":"5","key":"124_CR57","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1109\/TSMCA.2005.851140","volume":"35","author":"R Parra-Hernandez","year":"2005","unstructured":"Parra-Hernandez R, Dimopoulos NJ (2005) A new heuristic for solving the multichoice multidimensional knapsack problem. IEEE Trans Syst Man Cybern Syst Hum 35(5):708\u2013717.","journal-title":"IEEE Trans Syst Man Cybern Syst Hum"},{"issue":"1","key":"124_CR58","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s10589-008-9184-7","volume":"46","author":"N Cherfi","year":"2010","unstructured":"Cherfi N, Hifi M (2010) A column generation method for the multiple-choice multi-dimensional knapsack problem. Comput Optim Appl 46(1):51\u201373.","journal-title":"Comput Optim Appl"},{"issue":"11","key":"124_CR59","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1057\/jors.1990.166","volume":"41","author":"JE Beasley","year":"1990","unstructured":"Beasley JE (1990) Or-library: distributing test problems by electronic mail. J Oper Res Soc 41(11):1069\u20131072.","journal-title":"J Oper Res Soc"},{"key":"124_CR60","unstructured":"Eckart Z, Marco LTest problems and test data for multiobjective optimizers. Computer Engineering (TIK) ETH Zurich. [Online]. Available: \n                    http:\/\/www.tik.ee.ethz.ch\/sop\/...\/testProblemSuite\/\n                    \n                  . Retrieved in December, 2018."},{"issue":"4","key":"124_CR61","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/4235.797969","volume":"3","author":"E Zitzler","year":"1999","unstructured":"Zitzler E, Thiele L (1999) Multiobjective evolutionary algorithms: a comparative case study and the strength pareto approach. IEEE Trans Evol Comput 3(4):257\u2013271.","journal-title":"IEEE Trans Evol Comput"},{"key":"124_CR62","unstructured":"Amazon (2016) Amazon ec2 instance types. Amazon Web Services, Inc. [Online: accessed in September 12, 2016 from \n                    https:\/\/aws.amazon.com\/ec2\/instance-types\/\n                    \n                  ]."},{"issue":"1","key":"124_CR63","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.cor.2009.04.006","volume":"37","author":"B Han","year":"2010","unstructured":"Han B, Leblet J, Simon G (2010) Hard multidimensional multiple choice knapsack problems, an empirical study. Comput Oper Res 37(1):172\u2013181.","journal-title":"Comput Oper Res"},{"key":"124_CR64","volume-title":"Challenges and opportunities of cloud computing \u2013 trade-off decisions in cloud computing architecture,","author":"M Hauck","year":"2010","unstructured":"Hauck M, Huber M, Klems M, Kounev S, M\u00fcller-Quade J, Pretschner A, Reussner R, Tai S (2010) Challenges and opportunities of cloud computing \u2013 trade-off decisions in cloud computing architecture,. Karlsruhe Institute of Technology(KIT), Germany. Technical Report. Vol. 2010-19, Tech. Rep."},{"issue":"1\u20132","key":"124_CR65","doi-asserted-by":"publisher","first-page":"460","DOI":"10.14778\/1920841.1920902","volume":"3","author":"J Schad","year":"2010","unstructured":"Schad J, Dittrich J, Quian\u00e9-Ruiz J (2010) Runtime measurements in the cloud: observing, analyzing, and reducing variance. Proc VLDB Endowment 3(1\u20132):460\u2013471.","journal-title":"Proc VLDB Endowment"},{"issue":"1","key":"124_CR66","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1504\/IJSI.2013.055800","volume":"1","author":"H Banati","year":"2013","unstructured":"Banati H, Bajaj M (2013) Performance analysis of firefly algorithm for data clustering. Int J Swarm Intell 1(1):19\u201335.","journal-title":"Int J Swarm Intell"},{"key":"124_CR67","volume-title":"Stochastic local search: Foundations & applications","author":"HH Hoos","year":"2004","unstructured":"Hoos HH, St\u00fctzle T (2004) Stochastic local search: Foundations & applications. Elsevier, New York."},{"issue":"10","key":"124_CR68","doi-asserted-by":"publisher","first-page":"2717","DOI":"10.1007\/s00500-015-1672-y","volume":"19","author":"DF Barrero","year":"2015","unstructured":"Barrero DF, Mu\u00f1oz P, Camacho D, R-Moreno MD (2015) On the statistical distribution of the expected run-time in population-based search algorithms. Soft Comput 19(10):2717\u20132734.","journal-title":"Soft Comput"},{"key":"124_CR69","unstructured":"Hoos H, Stutzle T (1998) Characterizing the run-time behavior of stochastic local search In: AAAI-99 - Proceedings of the Sixteenth National Conference on Artificial Intelligence and The Eleventh Annual Conference on Innovative Applications of Artificial Intelligence.. AAAI Press."},{"key":"124_CR70","unstructured":"Laerd.com (2017) Two-way anova in spss statistics In: Lund Research Ltd. [Online: accessed in February, 2017 from \n                    https:\/\/statistics.laerd.com\/spss-tutorials\/\n                    \n                  ]."},{"key":"124_CR71","volume-title":"Empirical methods for artificial intelligencemit press","author":"P Cohen","year":"1995","unstructured":"Cohen P (1995) Empirical methods for artificial intelligencemit press. MIT Press, Cambridge."},{"key":"124_CR72","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/COMPSAC.2015.223","volume-title":"Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual, vol. 3","author":"L Sliwko","year":"2015","unstructured":"Sliwko L, Getov V (2015) A meta-heuristic load balancer for cloud computing systems In: Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual, vol. 3, 121\u2013126.. IEEE, Taichung. \n                    https:\/\/doi.org\/10.1109\/COMPSAC.2015.223\n                    \n                  ."},{"key":"124_CR73","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-1-4471-5107-4_10","volume-title":"Cloud Computing: Methods and Practical Approaches","author":"SK Doddavula","year":"2013","unstructured":"Doddavula SK, Agrawal I, Saxena V (2013) Cloud computing solution patterns: Infrastructural solutions In: Cloud Computing: Methods and Practical Approaches, 197\u2013219.. Springer, London."},{"key":"124_CR74","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/ICISS.2010.5655013","volume-title":"Intelligent Computing and Integrated Systems (ICISS), 2010 International Conference on","author":"G-n Gan","year":"2010","unstructured":"Gan G-n, Huang T-l, Gao S (2010) Genetic simulated annealing algorithm for task scheduling based on cloud computing environment In: Intelligent Computing and Integrated Systems (ICISS), 2010 International Conference on, 60\u201363.. IEEE, Taichung. \n                    https:\/\/doi.org\/10.1109\/ICISS.2010.5655013\n                    \n                  ."},{"key":"124_CR75","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2012\/251624","volume":"2012","author":"A Chen","year":"2012","unstructured":"Chen A, Jiang T, Chen Z, Zhang Y (2012) A genetic and simulated annealing combined algorithm for optimization of wideband antenna matching networks. Int J Antennas Propag 2012:1\u20136. Article ID 251624, \n                    https:\/\/doi.org\/10.1155\/2012\/251624\n                    \n                  .","journal-title":"Int J Antennas Propag"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13677-018-0124-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-018-0124-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-018-0124-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T19:05:56Z","timestamp":1579806356000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-018-0124-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,24]]},"references-count":75,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["124"],"URL":"https:\/\/doi.org\/10.1186\/s13677-018-0124-5","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,24]]},"assertion":[{"value":"25 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"1"}}