{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T22:16:43Z","timestamp":1726006603531},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030116378"},{"type":"electronic","value":"9783030116385"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11638-5_1","type":"book-chapter","created":{"date-parts":[[2019,1,17]],"date-time":"2019-01-17T11:43:32Z","timestamp":1547725412000},"page":"1-24","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Online Detection of Operator Errors in Cloud Computing Using Anti-patterns"],"prefix":"10.1007","author":[{"given":"Arthur","family":"Vetter","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,18]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Gunawi, H.S., et al.: What bugs live in the cloud? A study of 3000+ issues in cloud systems. In: Proceedings of the ACM Symposium on Cloud Computing, pp. 1\u201314 (2014)","DOI":"10.1145\/2670979.2670986"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Hagen, S., Seibold, M., Kemper, A.: Efficient verification of IT change operations or: how we could have prevented Amazon\u2019s cloud outage. Presented at the Network Operations and Management Symposium (NOMS), 2012 IEEE, pp. 368\u2013376 (2012)","DOI":"10.1109\/NOMS.2012.6211920"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Dumitra, T., Narasimhan, P.: Why do upgrades fail and what can we do about it? Toward dependable, online upgrades in enterprise system. In: Proceedings of the 10th ACM\/IFIP\/USENIX International Conference on Middleware, p. 18 (2009)","DOI":"10.1007\/978-3-642-10445-9_18"},{"key":"1_CR4","unstructured":"Pertet, S., Narasimhan, P.: Causes of failure in web applications. Parallel Data Laboratory, p. 48 (2005)"},{"key":"1_CR5","unstructured":"Oppenheimer, D., Ganapathi, A., Patterson, D.A.: Why do internet services fail, and what can be done about it? In: Proceedings of the 4th Conference on USENIX Symposium on Internet Technologies and Systems, vol. 4, Berkeley, p. 1 (2003)"},{"key":"1_CR6","unstructured":"Scott, D.: Making smart investments to reduce unplanned downtime. Tactical Guidelines Research Note TG-07-4033, Gartner Group, Stamford, CT (1999)"},{"key":"1_CR7","unstructured":"Elliot, S.: DevOps and the cost of downtime: fortune 1000 best practice metrics quantified. International Data Corporation, IDC (2014)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Vetter, A.: Detecting operator errors in cloud maintenance operations. In: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 639\u2013644 (2016)","DOI":"10.1109\/CloudCom.2016.0110"},{"key":"1_CR9","unstructured":"Nagaraja, K., Oliveira, F., Bianchini, R., Martin, R.P., Nguyen, T.D.: Under-standing and dealing with operator mistakes in internet services. In: OSDI 2004: 6th Symposium on Operating Systems Design and Implementation (2004)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Yin, Z., Ma, X., Zheng, J., Zhou, Y., Bairavasundaram, L.N., Pasupathy, S.: An empirical study on configuration errors in commercial and open source systems. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pp. 159\u2013172 (2011)","DOI":"10.1145\/2043556.2043572"},{"key":"1_CR11","volume-title":"Petri Net Theory and the Modeling of Systems","author":"JL Peterson","year":"1981","unstructured":"Peterson, J.L.: Petri Net Theory and the Modeling of Systems. Prentice Hall, Upper Saddle River (1981)"},{"key":"1_CR12","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E Gamma","year":"1994","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Pearson Education, London (1994)"},{"issue":"1","key":"1_CR13","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1022883727209","volume":"14","author":"WM van der Aalst","year":"2003","unstructured":"van der Aalst, W.M., Ter Hofstede, A.H., Kiepuszewski, B., Barros, A.P.: Workflow patterns. Distrib. Parallel Databases 14(1), 5\u201351 (2003)","journal-title":"Distrib. Parallel Databases"},{"key":"1_CR14","unstructured":"Russell, N., Ter Hofstede, A.H., Edmond, D., van der Aalst, W.M.: Workflow Data Patterns. QUT Technical report, FIT-TR-2004-01. Queensland University of Technology, Brisbane (2004)"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/11431855_16","volume-title":"Advanced Information Systems Engineering","author":"N Russell","year":"2005","unstructured":"Russell, N., van der Aalst, W.M.P., ter Hofstede, A.H.M., Edmond, D.: Workflow resource patterns: identification, representation and tool support. In: Pastor, O., Falc\u00e3o e Cunha, J. (eds.) CAiSE 2005. LNCS, vol. 3520, pp. 216\u2013232. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11431855_16"},{"issue":"1","key":"1_CR16","first-page":"3","volume":"2","author":"D Riehle","year":"1996","unstructured":"Riehle, D., Z\u00fcllighoven, H.: Understanding and using patterns in software development. TAPOS 2(1), 3\u201313 (1996)","journal-title":"TAPOS"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Property specification patterns for finite-state verification. In: Proceedings of the Second Workshop on Formal Methods in Software Practice, pp. 7\u201315 (1998)","DOI":"10.1145\/298595.298598"},{"key":"1_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"W Van Der Aalst","year":"2011","unstructured":"Van Der Aalst, W.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19345-3"},{"key":"1_CR19","unstructured":"Weidlich, M., Mendling, J., Weske, M.: Computation of behavioural profiles of process models. Business Process Technology, Hasso Plattner Institute for IT-Systems Engineering, Potsdam (2009)"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Xu, X., Zhu, L., Weber, I., Bass, L., et al.: POD-diagnosis: error diagnosis of sporadic operations on cloud applications. In: 2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 252\u2013263 (2014)","DOI":"10.1109\/DSN.2014.94"},{"key":"1_CR21","unstructured":"Chef: About Handlers, 08 November 2017. https:\/\/docs.chef.io\/handlers.html"},{"key":"1_CR22","unstructured":"Xu, T., Zhou, Y.: Systems approaches to tackling configuration errors: a survey (2014)"},{"key":"1_CR23","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.jss.2017.03.012","volume":"137","author":"M Farshchi","year":"2017","unstructured":"Farshchi, M., Schneider, J.-G., Weber, I., Grundy, J.: Metric selection and anomaly detection for cloud operations using log and metric correlation analysis. J. Syst. Softw. 137, 531\u2013549 (2017)","journal-title":"J. Syst. Softw."},{"issue":"1","key":"1_CR24","first-page":"37","volume":"2","author":"D Powers","year":"2011","unstructured":"Powers, D.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. J. Mach. Learn. Technol. 2(1), 37\u201363 (2011)","journal-title":"J. Mach. Learn. Technol."},{"key":"1_CR25","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-642-33155-8_4","volume-title":"Business Process Model and Notation","author":"O Kopp","year":"2012","unstructured":"Kopp, O., Binz, T., Breitenb\u00fccher, U., Leymann, F.: BPMN4TOSCA: a domain-specific language to model management plans for composite applications. In: Mendling, J., Weidlich, M. (eds.) BPMN 2012. LNBIP, vol. 125, pp. 38\u201352. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33155-8_4"},{"key":"1_CR26","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-662-43745-2_18","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"M Becker","year":"2014","unstructured":"Becker, M., Klingner, S.: A criteria catalogue for evaluating business process pattern approaches. In: Bider, I., et al. (eds.) BPMDS\/EMMSAD-2014. LNBIP, vol. 175, pp. 257\u2013271. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43745-2_18"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Awad, A., Barnawi, A., Elgammal, A., Elshawi, R., Almalaise, A., Sakr, S.: Runtime detection of business process compliance violations: an approach based on anti patterns. In: 12th Enterprise Engineering Track at ACM, SAC 2015 (2015)","DOI":"10.1145\/2695664.2699488"}],"container-title":["Lecture Notes in Business Information Processing","Data-Driven Process Discovery and Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11638-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T01:02:49Z","timestamp":1673917369000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-11638-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030116378","9783030116385"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11638-5_1","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"18 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMPDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Data-Driven Process Discovery and Analysis","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Neuchatel","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simpda2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/simpda2017.di.unimi.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}