{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:08:56Z","timestamp":1763190536506,"version":"3.45.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032104588","type":"print"},{"value":"9783032104595","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,16]],"date-time":"2025-11-16T00:00:00Z","timestamp":1763251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,16]],"date-time":"2025-11-16T00:00:00Z","timestamp":1763251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10459-5_22","type":"book-chapter","created":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:06:29Z","timestamp":1763190389000},"page":"272-284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TAIR: Achieving Tenant Anomaly Isolation with\u00a0Request Scheduling in\u00a0Serverless Computing"],"prefix":"10.1007","author":[{"given":"Junhong","family":"Lu","sequence":"first","affiliation":[]},{"given":"Chu","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Gongming","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Hongli","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Gangyi","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,16]]},"reference":[{"key":"22_CR1","unstructured":"Amazon firecracker. https:\/\/firecracker-microvm.github.io\/"},{"key":"22_CR2","unstructured":"Apache openwhisk. https:\/\/openwhisk.apache.org\/"},{"key":"22_CR3","unstructured":"Aws route 53. https:\/\/aws.amazon.com\/route53\/"},{"key":"22_CR4","unstructured":"Serverless architecture market report. https:\/\/www.verifiedmarketresearch.com\/product\/serverless-architecture-market\/"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Eismann, S., et al.: The state of serverless applications: collection, characterization, and community consensus. IEEE Trans. Software Eng. 48(10), 4152\u20134166 (2021)","DOI":"10.1109\/TSE.2021.3113940"},{"issue":"6","key":"22_CR6","doi-asserted-by":"publisher","first-page":"1923","DOI":"10.11118\/actaun201563061923","volume":"63","author":"J Jablonsk\u1ef3","year":"2015","unstructured":"Jablonsk\u1ef3, J., et al.: Benchmarks for current linear and mixed integer optimization solvers. Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis 63(6), 1923\u20131928 (2015)","journal-title":"Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis"},{"key":"22_CR7","unstructured":"Jonas, E., et\u00a0al.: Cloud programming simplified: a berkeley view on serverless computing. arXiv preprint arXiv:1902.03383 (2019)"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Kaffes, K., Yadwadkar, N.J., Kozyrakis, C.: Hermod: principled and practical scheduling for serverless functions. In: Proceedings of the 13th Symposium on Cloud Computing, pp. 289\u2013305 (2022)","DOI":"10.1145\/3542929.3563468"},{"key":"22_CR9","volume":"60","author":"D Kelly","year":"2021","unstructured":"Kelly, D., Glavin, F.G., Barrett, E.: Denial of wallet\u2013defining a looming threat to serverless computing. J. Inf. Security Appl. 60, 102843 (2021)","journal-title":"J. Inf. Security Appl."},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Krause, A., Golovin, D.: Submodular function maximization. Tractability 3(71\u2013104), 3 (2014)","DOI":"10.1017\/CBO9781139177801.004"},{"issue":"1","key":"22_CR11","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TPDS.2018.2855158","volume":"30","author":"A Lebre","year":"2018","unstructured":"Lebre, A., Pastor, J., Simonet, A., S\u00fcdholt, M.: Putting the next 500 VM placement algorithms to the acid test: The infrastructure provider viewpoint. IEEE Trans. Parallel Distrib. Syst. 30(1), 204\u2013217 (2018)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"10s","key":"22_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3508360","volume":"54","author":"Z Li","year":"2022","unstructured":"Li, Z., Guo, L., Cheng, J., Chen, Q., He, B., Guo, M.: The serverless computing survey: a technical primer for design architecture. ACM Computing Surveys (CSUR) 54(10s), 1\u201334 (2022)","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"3","key":"22_CR13","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1109\/TPDS.2020.3028841","volume":"32","author":"C Lin","year":"2020","unstructured":"Lin, C., Khazaei, H.: Modeling and optimization of performance and cost of serverless applications. IEEE Trans. Parallel Distrib. Syst. 32(3), 615\u2013632 (2020)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"22_CR14","unstructured":"MacC\u00e1rthaigh, C.: Workload isolation using shuffle-sharding. Technical Report (2019)"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"O\u2019Meara, W., Lennon, R.G.: Serverless computing security: protecting application logic. In: 2020 31st Irish Signals and Systems Conference (ISSC), pp.\u00a01\u20135. IEEE (2020)","DOI":"10.1109\/ISSC49989.2020.9180214"},{"key":"22_CR16","unstructured":"Shahrad, M., et al.: Serverless in the wild: Characterizing and optimizing the serverless workload at a large cloud provider. In: 2020 USENIX Annual Technical Conference (USENIX ATC 20), pp. 205\u2013218 (2020)"},{"key":"22_CR17","unstructured":"Wang, L., Li, M., Zhang, Y., Ristenpart, T., Swift, M.: Peeking behind the curtains of serverless platforms. In: 2018 USENIX Annual Technical Conference (USENIX ATC 18), pp. 133\u2013146 (2018)"},{"issue":"5","key":"22_CR18","doi-asserted-by":"publisher","first-page":"3073","DOI":"10.1109\/TNET.2017.2717441","volume":"25","author":"H Xu","year":"2017","unstructured":"Xu, H., Yu, Z., Li, X.Y., Huang, L., Qian, C., Jung, T.: Joint route selection and update scheduling for low-latency update in SDNS. IEEE\/ACM Trans. Networking 25(5), 3073\u20133087 (2017)","journal-title":"IEEE\/ACM Trans. Networking"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10459-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:06:40Z","timestamp":1763190400000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10459-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,16]]},"ISBN":["9783032104588","9783032104595"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10459-5_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,16]]},"assertion":[{"value":"16 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Network and Parallel Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nha Trang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"npc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.npc-conference.com\/#\/npc2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}