{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:49:45Z","timestamp":1725878985679},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319474724"},{"type":"electronic","value":"9783319474748"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-47474-8_14","type":"book-chapter","created":{"date-parts":[[2017,1,23]],"date-time":"2017-01-23T00:32:38Z","timestamp":1485131558000},"page":"437-464","source":"Crossref","is-referenced-by-count":3,"title":["Metrics and Benchmarks for Self-aware Computing Systems"],"prefix":"10.1007","author":[{"given":"Nikolas","family":"Herbst","sequence":"first","affiliation":[]},{"given":"Steffen","family":"Becker","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Kounev","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Koziolek","sequence":"additional","affiliation":[]},{"given":"Martina","family":"Maggio","sequence":"additional","affiliation":[]},{"given":"Aleksandar","family":"Milenkoski","sequence":"additional","affiliation":[]},{"given":"Evgenia","family":"Smirni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,24]]},"reference":[{"key":"14_CR1","unstructured":"LIMBO: Load Intensity Modeling Framework. http:\/\/descartes.tools\/limbo , 2015."},{"key":"14_CR2","unstructured":"Rodrigo\u00a0F Almeida, Fl\u00e1vio\u00a0RC Sousa, S\u00e9rgio Lifschitz, and Javam\u00a0C Machado. On Defining Metrics for Elasticity of Cloud Databases. In Proceedings of the 28th Brazilian Symposium on Databases, 2013."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Enrico Bini, Marko Bertogna, and Sanjoy Baruah. Virtual multiprocessor platforms: Specification and use. In Proceedings of the 2009 30th IEEE Real-Time Systems Symposium, pages 437\u2013446, 2009.","DOI":"10.1109\/RTSS.2009.35"},{"key":"14_CR4","unstructured":"Robert Birke, Mathias Bj\u00f6rkqvist, Lydia\u00a0Y. Chen, Evgenia Smirni, and Ton Engbersen. (big)data in a virtualized world: volume, velocity, and variety in cloud datacenters. In Proceedings of the 12th USENIX conference on File and Storage Technologies, FAST 2014, Santa Clara, CA, USA, February 17-20, 2014, pages 177\u2013189, 2014."},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Robert Birke, Andrej Podzimek, Lydia\u00a0Y. Chen, and Evgenia Smirni. State-of-the-practice in data center virtualization: Toward a better understanding of VM usage. In 2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013, pages 1\u201312, 2013.","DOI":"10.1109\/DSN.2013.6575350"},{"issue":"9","key":"14_CR6","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1016\/j.peva.2009.12.003","volume":"67","author":"Giuliano Casale","year":"2010","unstructured":"Giuliano Casale, Eddy\u00a0Z. Zhang, and Evgenia Smirni. Kpc-toolbox: Best recipes for automatic trace fitting using markovian arrival processes. Perform. Eval., 67(9):873\u2013896, 2010.","journal-title":"Perform. Eval."},{"issue":"2","key":"14_CR7","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.peva.2009.09.003","volume":"67","author":"Giuliano Casale","year":"2010","unstructured":"Giuliano Casale, Eddy\u00a0Z. Zhang, and Evgenia Smirni. Trace data characterization and fitting for markov modeling. Perform. Eval., 67(2):61\u201379, 2010.","journal-title":"Perform. Eval."},{"key":"14_CR8","unstructured":"Dean Chandler, Nurcan Coskun, Salman Baset, Erich Nahum, Steve Realmuto\u00a0Masud Khandker, Tom Daly, Nicholas Wakou\u00a0Indrani Paul, Louis Barton, Mark Wagner, Rema Hariharan, and Yun seng Chao. Report on Cloud Computing to the OSG Steering Committee. Technical report, April 2012."},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Brian\u00a0F. Cooper, Adam Silberstein, Erwin Tam, Raghu Ramakrishnan, and Russell Sears. Benchmarking cloud serving systems with YCSB. In Proceedings of the 1st ACM symposium on Cloud computing, SoCC \u201910, pages 143\u2013154, New York, NY, USA, 2010. ACM.","DOI":"10.1145\/1807128.1807152"},{"key":"14_CR10","unstructured":"Thibault Dory, Boris Mej\u00edas, Peter\u00a0Van Roy, and Nam-Luc Tran. Measuring Elasticity for Cloud Databases. In Proceedings of the The Second International Conference on Cloud Computing, GRIDs, and Virtualization, 2011."},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","first-page":"173","volume-title":"Selected Topics in Performance Evaluation and Benchmarking","author":"Enno Folkerts","year":"2012","unstructured":"Enno Folkerts, Alexander Alexandrov, Kai Sachs, Alexandru Iosup, Volker Markl, and Cafer Tosun. Benchmarking in the Cloud: What It Should, Can, and Cannot Be. In Raghunath Nambiar and Meikel Poess, editors, Selected Topics in Performance Evaluation and Benchmarking, volume 7755 of Lecture Notes in Computer Science, pages 173\u2013188. Springer Berlin Heidelberg, 2012."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"John\u00a0E. Gaffney and Jacob\u00a0W. Ulvila. Evaluation of intrusion detectors: a decision theory approach. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 50\u201361, 2001.","DOI":"10.1109\/SECPRI.2001.924287"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, and Boris Skori\u0107. Measuring intrusion detection capability: an information-theoretic approach. In Proceedings of the 2006 ACM Symposium on Information, computer and communications security (ASIACCS), pages 90\u2013101, New York, NY, USA, 2006. ACM.","DOI":"10.1145\/1128817.1128834"},{"issue":"2","key":"14_CR14","first-page":"203","volume":"19","author":"R Gusella","year":"1991","unstructured":"R.\u00a0Gusella. Characterizing the variability of arrival processes with indexes of dispersion. IEEE JSAC, 19(2):203\u2013211, 1991.","journal-title":"IEEE JSAC"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Mike Hall and Kevin Wiley. Capacity verification for high speed network intrusion detection systems. In Proceedings of the 5th International Conference on Recent Advances in Intrusion Detection (RAID), pages 239\u2013251, Berlin, Heidelberg, 2002. Springer-Verlag.","DOI":"10.1007\/3-540-36084-0_13"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Amin Hassanzadeh and Radu Stoleru. Towards Optimal Monitoring in Cooperative IDS for Resource Constrained Wireless Networks. In Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pages 1\u20138, August 2011.","DOI":"10.1109\/ICCCN.2011.6006035"},{"key":"14_CR17","unstructured":"Nikolas\u00a0Roman Herbst, Samuel Kounev, and Ralf Reussner. Elasticity in Cloud Computing: What it is, and What it is Not (short paper). In Proceedings of the 10th International Conference on Autonomic Computing (ICAC 2013). USENIX, June 2013."},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Nikolas\u00a0Roman Herbst, Samuel Kounev, Andreas Weber, and Henning Groenda. BUNGEE: An Elasticity Benchmark for Self-adaptive IaaS Cloud Environments. In Proceedings of the 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS \u201915, pages 46\u201356, Piscataway, NJ, USA, 2015. IEEE Press.","DOI":"10.1109\/SEAMS.2015.23"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Karl Huppler. Performance Evaluation and Benchmarking. chapter The Art of Building a Good Benchmark, pages 18\u201330. Springer-Verlag, Berlin, Heidelberg, 2009.","DOI":"10.1007\/978-3-642-10424-4_3"},{"key":"14_CR20","series-title":"Measurement and Characterization, volume 7144 of Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-3-642-32627-1_7","volume-title":"Topics in Performance Evaluation","author":"Karl Huppler","year":"2012","unstructured":"Karl Huppler. Benchmarking with Your Head in the Cloud. In Raghunath Nambiar and Meikel Poess, editors, Topics in Performance Evaluation, Measurement and Characterization, volume 7144 of Lecture Notes in Computer Science, pages 97\u2013110. Springer Berlin Heidelberg, 2012."},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Sadeka Islam, Kevin Lee, Alan Fekete, and Anna Liu. How a Consumer Can Measure Elasticity for Cloud Platforms. In Proceedings of the 3rd ACM\/SPEC International Conference on Performance Engineering, ICPE \u201912, pages 85\u201396, New York, NY, USA, 2012. ACM.","DOI":"10.1145\/2188286.2188301"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"J\u00f3akim\u00a0V. Kistowski, Nikolas Herbst, Daniel Zoller, Samuel Kounev, and Andreas Hotho. Modeling and extracting load intensity profiles. In Proceedings of the 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS \u201915, pages 109\u2013119, Piscataway, NJ, USA, 2015. IEEE Press.","DOI":"10.1109\/SEAMS.2015.19"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Anita Komlodi, John\u00a0R. Goodall, and Wayne\u00a0G. Lutters. An Information Visualization Framework for Intrusion Detection. In CHI \u201904 Extended Abstracts on Human Factors in Computing Systems, page 1743, New York, NY, USA, 2004. ACM.","DOI":"10.1145\/985921.1062935"},{"key":"14_CR24","unstructured":"Michael Kuperberg, Nikolas\u00a0Roman Herbst, Joakim\u00a0Gunnarson von Kistowski, and Ralf Reussner. Defining and Quantifying Elasticity of Resources in Cloud Computing and Scalable Platforms. Technical report, Karlsruhe Institute of Technology (KIT), 2011."},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Hennadiy Leontyev, Samarjit Chakraborty, and James\u00a0H. Anderson. Multiprocessor extensions to real-time calculus. Real-Time Syst., 47(6):562\u2013617, December 2011.","DOI":"10.1007\/s11241-011-9135-8"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Zheng Li, L.\u00a0O\u2019Brien, He\u00a0Zhang, and R.\u00a0Cai. On a Catalogue of Metrics for Evaluating Commercial Cloud Services. In Grid Computing (GRID), 2012 ACM\/IEEE 13th International Conference on, pages 164\u2013173, Sept 2012.","DOI":"10.1109\/Grid.2012.15"},{"key":"14_CR27","unstructured":"Martina Maggio, Juri Lelli, and Enrico Bin. Analysis of os schedulers with rt-muse. In RTSS@Work (Real-Time Systems Symposium Demo Session), 2015."},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Roy\u00a0A. Maxion and Kymie\u00a0M.C. Tan. Benchmarking anomaly-based detection systems. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), pages 623\u2013630, 2000.","DOI":"10.1109\/ICDSN.2000.857599"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Yuxin Meng. Measuring intelligent false alarm reduction using an ROC curve-based approach in network intrusion detection. In IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA), pages 108\u2013113, July 2012.","DOI":"10.1109\/CIMSA.2012.6269608"},{"key":"14_CR30","unstructured":"Ningfang Mi, Giuliano Casale, Ludmila Cherkasova, and Evgenia Smirni. Burstiness in multi-tier applications: Symptoms, causes, and new models. In ACM\/IFIP\/USENIX 9th International Middleware Conference (Middleware\u201908), Leuven, Belgium, 2008. The prelimilary paper appeared in the HotMetrics 2008 Workshop."},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Ningfang Mi, Giuliano Casale, Ludmila Cherkasova, and Evgenia Smirni. Injecting realistic burstiness to a traditional client-server benchmark. In Proceedings of the 6th International Conference on Autonomic Computing, ICAC 2009, June 15-19, 2009, Barcelona, Spain, pages 149\u2013158, 2009.","DOI":"10.1145\/1555228.1555267"},{"issue":"9\u201312","key":"14_CR32","first-page":"1082","volume":"64","author":"Ningfang Mi","year":"2007","unstructured":"Ningfang Mi, Qi\u00a0Zhang, Alma Riska, Evgenia Smirni, and Erik Riedel. Performance impacts of autocorrelated flows in multi-tiered systems. Perform. Eval., 64(9-12):1082\u20131101, 2007.","journal-title":"Perform. Eval."},{"volume-title":"Structured Stochastic Matrices of M\/G\/1 Type and Their Applications","year":"1989","author":"MF Neuts","key":"14_CR33","unstructured":"M.\u00a0F. Neuts. Structured Stochastic Matrices of M\/G\/1 Type and Their Applications. Marcel Dekker, New York, 1989."},{"key":"14_CR34","unstructured":"Object Management Group, Inc. UML Profile for Schedulability, Performance, and Time\u00a0(SPT), version 1.1. http:\/\/www.omg.org\/spec\/SPTP\/1.1\/ , 2005."},{"key":"14_CR35","unstructured":"Object Management Group, Inc. UML profile for MARTE: Modeling and Analysis of Real-Time Embedded Systems, version 1.1. http:\/\/www.omg.org\/spec\/MARTE\/1.1\/ , 2011."},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Dorin\u00a0Bogdan Petriu and C.\u00a0Murray Woodside. An intermediate metamodel with scenarios and resources for generating performance models from UML designs. Springer Software and System Modeling (SoSym), 6(2):163\u2013184, 2007.","DOI":"10.1007\/s10270-006-0026-8"},{"key":"14_CR37","unstructured":"Martin Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the 13th USENIX conference on System Administration (LISA), pages 229\u2013238. USENIX Association, 1999."},{"key":"14_CR38","unstructured":"Bianca Schroeder, Adam Wierman, and Mor Harchol-Balter. Open versus closed: A cautionary tale. In Proceedings of the 3rd conference on Networked Systems Design & Implementation (NSDI \u201906), pages 18\u201318. USENIX Association, 2006."},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"Jaydip Sen, Arijit Ukil, Debasis Bera, and Arpan Pal. A distributed intrusion detection system for wireless ad hoc networks. In 16th IEEE International Conference on Networks (ICON), pages 1\u20136, 2008.","DOI":"10.1109\/ICON.2008.4772624"},{"key":"14_CR40","unstructured":"Connie\u00a0U. Smith and Lloyd\u00a0G. Williams. Performance Solutions: A practical guide to creating responsive, scalable software. Addison-Wesley, 2002."},{"key":"14_CR41","unstructured":"Christian Tinnefeld, Daniel Taschik, and Hasso Plattner. Quantifying the Elasticity of a Database Management System. In DBKDA 2014, The Sixth International Conference on Advances in Databases, Knowledge, and Data Applications, pages 125\u2013131, 2014."},{"key":"14_CR42","unstructured":"Joe Weinman. Time is Money: The Value of \u201cOn-Demand\u201d, 2011. (accessed July 9, 2014)."},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Qi\u00a0Zhang, Ludmila Cherkasova, and Evgenia Smirni. A regression-based analytic model for dynamic resource provisioning of multi-tier applications. In Fourth International Conference on Autonomic Computing (ICAC\u201907), Jacksonville, Florida, USA, June 11-15, 2007, page\u00a027, 2007.","DOI":"10.1109\/ICAC.2007.1"},{"key":"14_CR44","doi-asserted-by":"crossref","unstructured":"S.\u00a0Zhang, Z.\u00a0Qian, Z.\u00a0Luo, J.\u00a0Wu, and S.\u00a0Lu. Burstiness-aware resource reservation for server consolidation in computing clouds. IEEE Trnascations on Parallel and Distributed Systems, 27(4):964\u2013977, 2016.","DOI":"10.1109\/TPDS.2015.2425403"}],"container-title":["Self-Aware Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47474-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:58:34Z","timestamp":1692640714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47474-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319474724","9783319474748"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47474-8_14","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}