{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:38Z","timestamp":1740099218002,"version":"3.37.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000059"},{"type":"electronic","value":"9783030000066"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00006-6_43","type":"book-chapter","created":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T19:27:56Z","timestamp":1541014076000},"page":"467-477","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Distributed Monitoring System for Microservices-Based IoT Middleware System"],"prefix":"10.1007","author":[{"given":"Rui","family":"Kang","sequence":"first","affiliation":[]},{"given":"Zhenyu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Jiahua","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhongran","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Shunwang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,1]]},"reference":[{"key":"43_CR1","unstructured":"Microservices. http:\/\/microservices.io"},{"key":"43_CR2","unstructured":"Docker. https:\/\/www.docker.com"},{"key":"43_CR3","unstructured":"Sigelman, B.H.: Dapper, a Large-Scale Distributed Systems Tracing Infrastructure. Google (2010). https:\/\/research.google.com\/archieve\/papers\/dapper-2010-1.pdf"},{"key":"43_CR4","unstructured":"OpenZipkin. http:\/\/zipkin.io"},{"key":"43_CR5","unstructured":"Jaeger. http:\/\/jaeger.readthedocs.io\/en\/latest"},{"key":"43_CR6","unstructured":"OpenTracing. http:\/\/opentracing.io"},{"key":"43_CR7","unstructured":"Verma, A.: Large-scale cluster management at Google with Borg. Google (2015). https:\/\/research.google.com\/pubs\/archive\/43438.pdf"},{"key":"43_CR8","unstructured":"Prometheus. https:\/\/prometheus.io"},{"key":"43_CR9","unstructured":"Github. https:\/\/github.com\/tangfeixiong\/go-to-docker\/tree\/master\/metering"},{"key":"43_CR10","unstructured":"Kubernetes. https:\/\/kubernetes.io"},{"key":"43_CR11","unstructured":"cAdvisor. https:\/\/github.com\/google\/cadvisor"},{"key":"43_CR12","unstructured":"heapster. https:\/\/github.com\/kubernetes\/heapster"},{"key":"43_CR13","unstructured":"Docker Compose. https:\/\/github.com\/dockre\/compose"},{"key":"43_CR14","unstructured":"OpenTSDB. http:\/\/opentsdb.net"},{"key":"43_CR15","unstructured":"The OpenTracing Semantic Specification. https:\/\/github.com\/opentracing\/specification"},{"key":"43_CR16","unstructured":"ElasticSearch. https:\/\/www.elastic.co\/products\/elasticsearch"},{"key":"43_CR17","unstructured":"Kafka. https:\/\/kafka.apache.org"},{"key":"43_CR18","unstructured":"Protocol Buffer. https:\/\/developers.google.com\/protocol-buffers"},{"key":"43_CR19","unstructured":"gRPC. https:\/\/grpc.io"},{"key":"43_CR20","unstructured":"Redis. https:\/\/redis.io"},{"key":"43_CR21","unstructured":"Spring Framework. https:\/\/projects.spring.io\/spring-framework"},{"key":"43_CR22","unstructured":"Spring Boot. https:\/\/projects.spring.io\/spring-boot"},{"key":"43_CR23","unstructured":"Apache thrift. https:\/\/thrift.apache.org"},{"key":"43_CR24","unstructured":"Spring Cloud Netflix. https:\/\/cloud.spring.io\/spring-cloud-netflix"},{"key":"43_CR25","unstructured":"Apache spark. http:\/\/spark.apache.org"},{"key":"43_CR26","volume-title":"Site Reliability Engineering","author":"N Murphy","year":"2016","unstructured":"Murphy, N.: Site Reliability Engineering. O\u2019Reilly Media, Sebastopol (2016). http:\/\/shop.oreilly.com\/product\/0636920041528.do"},{"key":"43_CR27","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-319-33313-7_15","volume-title":"Advances in Service-Oriented and Cloud Computing","author":"A Balalaie","year":"2016","unstructured":"Balalaie, A., Heydarnoori, A., Jamshidi, P.: Migrating to cloud-native architectures using\u00a0microservices: an experience report. In: Celesti, A., Leitner, P. (eds.) ESOCC Workshops 2015. CCIS, vol. 567, pp. 201\u2013215. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33313-7_15"},{"key":"43_CR28","unstructured":"Wolff, E.: Microservices: Flexible Software Architectures. CreateSpace Independent Publishing Platform (2016)"},{"key":"43_CR29","doi-asserted-by":"crossref","unstructured":"Xiao, Z., Wijegunaratne, I., Qiang, X.: Reflections on SOA and microservices. In: 4th International Conference on Enterprise Systems (ES), pp. 60\u201367 (2016)","DOI":"10.1109\/ES.2016.14"},{"key":"43_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jss.2017.01.001","volume":"126","author":"N Kratzke","year":"2017","unstructured":"Kratzke, N., Quint, P.-C.: Understanding cloud-native applications after 10 years of cloud computing - a systematic mapping study. J. Syst. Softw. 126, 1\u201316 (2017)","journal-title":"J. Syst. Softw."},{"key":"43_CR31","unstructured":"Fowler, M.: Microservices resource guide (2016). http:\/\/martinfowler.com\/microservices"},{"key":"43_CR32","volume-title":"Microservices Vs Service-oriented Architecture","author":"M Richards","year":"2015","unstructured":"Richards, M.: Microservices Vs Service-oriented Architecture. O\u2019Reilly Media, Sebastopol (2015)"},{"key":"43_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1007\/978-3-662-49192-8_42","volume-title":"SOFSEM 2016: Theory and Practice of Computer Science","author":"T Cerny","year":"2016","unstructured":"Cerny, T., Donahoo, Michael J.: Survey on concern separation in service integration. In: Freivalds, R.M., Engels, G., Catania, B. (eds.) SOFSEM 2016. LNCS, vol. 9587, pp. 518\u2013531. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49192-8_42"},{"key":"43_CR34","doi-asserted-by":"crossref","unstructured":"Cerny, M., Donahoo, J., Pechanec, J.: Disambiguation and comparison of soa, microservices and self-contained systems. In: Proceedings of the International Conference on Research in Adaptive and Convergent Systems, RACS 2017, pp. 228\u2013235. ACM, New York (2017)","DOI":"10.1145\/3129676.3129682"},{"key":"43_CR35","volume-title":"Soa in Practice","author":"N Josuttis","year":"2007","unstructured":"Josuttis, N.: Soa in Practice. O\u2019Reilly Media, Sebastopol (2007)"},{"issue":"4","key":"43_CR36","first-page":"28","volume":"14","author":"ME Conway","year":"1968","unstructured":"Conway, M.E.: How do committees invent. Datamation 14(4), 28\u201331 (1968)","journal-title":"Datamation"},{"key":"43_CR37","doi-asserted-by":"crossref","unstructured":"Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP) (2014). http:\/\/coap.technology\/","DOI":"10.17487\/rfc7252"},{"key":"43_CR38","unstructured":"Message Queue Telemetry Transport (MQTT). http:\/\/mqtt.org"},{"key":"43_CR39","unstructured":"OneM2\u00a0M Alliance. http:\/\/onem2m.org"},{"key":"43_CR40","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Wu, J., Li, W., Lu, S., Chen, B.: Navigation-driven handoff minimization in wireless networks. Wirel. Commun., Mob. Comput. (2017)","DOI":"10.1016\/j.jnca.2016.08.005"},{"key":"43_CR41","unstructured":"FI-WARE project. http:\/\/fi-ware.org"},{"key":"43_CR42","unstructured":"Havlik, D. et al.: Future Internet enablers for VGI applications (2013)"},{"issue":"7","key":"43_CR43","doi-asserted-by":"publisher","first-page":"2020","DOI":"10.1109\/TPDS.2014.2330298","volume":"26","author":"W Chang","year":"2015","unstructured":"Chang, W., Jie, W.: Progressive or conservative: rationally allocate cooperative work in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 26(7), 2020\u20132035 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"43_CR44","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1080\/17445760.2012.758725","volume":"29","author":"W Chang","year":"2014","unstructured":"Chang, W., Jie, W., Tan, C.C.: Improving cooperative trajectory mapping applications with encounter-based error correction. Int. J. Parallel Emergent Distrib. Syst. 29(1), 68\u201389 (2014)","journal-title":"Int. J. Parallel Emergent Distrib. Syst."},{"key":"43_CR45","unstructured":"Fielding, R.T.: Architectural styles and the design of network-based software architectures. Ph.D. dissertation, University of California, Irvine (2000)"},{"key":"43_CR46","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Li, W., Wu, J., Lu, S.: Quantized conflict graphs for wireless network optimization. In: IEEE Conference on Computer Communications (INFOCOM 2015), Hong Kong, April 26\u201330, 2015","DOI":"10.1109\/INFOCOM.2015.7218608"},{"key":"43_CR47","doi-asserted-by":"crossref","unstructured":"Theodoridis, E., Mylonas, G., Chatzigiannakis, I.: Developing aniot smart city framework. In: Fourth International Conference on Information, Intelligence, Systems and Applications (IISA) 2013, pp. 1\u20136, July 2013","DOI":"10.1109\/IISA.2013.6623710"},{"key":"43_CR48","unstructured":"ALMANAC project Web site. www.almanacproject.eu\/"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00006-6_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:23:13Z","timestamp":1662337393000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00006-6_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000059","9783030000066"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00006-6_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}