{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:17Z","timestamp":1740099077563,"version":"3.37.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319951614"},{"type":"electronic","value":"9783319951621"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95162-1_34","type":"book-chapter","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T08:15:34Z","timestamp":1530605734000},"page":"498-513","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Machine Learning Model for Detection and Prediction of Cloud Quality of Service Violation"],"prefix":"10.1007","author":[{"given":"Tong-Sheng","family":"Wong","sequence":"first","affiliation":[]},{"given":"Gaik-Yee","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Fang-Fang","family":"Chua","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing. national institute of standards and technology. U.S. Department of Commerce, Special Publication 800-145 (2011)","DOI":"10.6028\/NIST.SP.800-145"},{"key":"34_CR2","doi-asserted-by":"publisher","unstructured":"Mirobi, G.J., Arockiam, L.: Service level agreement in cloud computing: an overview. In: International Conference on Control, Instrumentation, Communication and Computational Technologies, ICCICCT, pp. 753\u2013758. IEEE, Kumaracoil (2015). https:\/\/doi.org\/10.1109\/iccicct.2015.7475380","DOI":"10.1109\/iccicct.2015.7475380"},{"key":"34_CR3","unstructured":"OSG Cloud Working Group: Report on Cloud Computing to the OSG Steering Committee. https:\/\/www.spec.org\/osgcloud\/docs\/osgcloudwgreport20120410.pdf . Accessed 20 July 2017"},{"key":"34_CR4","unstructured":"WSDREAM Data Set. https:\/\/github.com\/wsdream\/wsdream-dataset\/tree\/master\/dataset2 . Accessed 20 July 2017"},{"key":"34_CR5","unstructured":"R version 3.4.3: A language and environment for statistical computing. https:\/\/wbc.upm.edu.my\/cran\/ . Accessed 20 July 2017"},{"key":"34_CR6","doi-asserted-by":"publisher","unstructured":"Emeakaroha, V.C., Ferreto, T.C., Netto, M.A.S., Brandic, I., De Rose, C.A.F.: CASViD: application level monitoring for SLA violation detection in clouds. In: IEEE 36th Annual Computer Software and Applications Conference. IEEE, Izmir (2012). https:\/\/doi.org\/10.1109\/compsac.2012.68","DOI":"10.1109\/compsac.2012.68"},{"key":"34_CR7","first-page":"8","volume":"133","author":"SM Musa","year":"2016","unstructured":"Musa, S.M., Yousif, A., Bashi, M.B.: SLA violation detection mechanism for cloud computing. Int. J. Comput. Appl. 133, 8\u201311 (2016)","journal-title":"Int. J. Comput. Appl."},{"key":"34_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-16132-2_17","volume-title":"Service-Oriented Computing. ICSOC\/ServiceWave 2009 Workshops","author":"P Leitner","year":"2010","unstructured":"Leitner, P., Wetzstein, B., Rosenberg, F., Michlmayr, A., Dustdar, S., Leymann, F.: Runtime prediction of service level agreement violations for composite services. In: Dan, A., Gittler, F., Toumani, F. (eds.) ICSOC\/ServiceWave -2009. LNCS, vol. 6275, pp. 176\u2013186. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16132-2_17"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Hani, A.F.M., Paputungan, I.V., Hassan, M.F.: Support vector regression for service level agreement violation prediction. In: International Conference on Computer, Control, Informatics and its Applications, IC3INA. IEEE, Jakarta (2013)","DOI":"10.1109\/IC3INA.2013.6819192"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Tang, B., Tang, M.: Bayesian model-based prediction of service level agreement violations for cloud services. In: Theoretical Aspects of Software Engineering Conference, TASE. IEEE, Changsha (2014)","DOI":"10.1109\/TASE.2014.34"},{"key":"34_CR11","unstructured":"Sheng, D., Kondo, D., Cirne, W.: Host load prediction in a Google compute cloud with a Bayesian model. In: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, SC 2012. IEEE, Salt Lake City (2012)"},{"key":"34_CR12","unstructured":"Hemmat, R.A., Abdelhakim, H.: SLA violation prediction in cloud computing: a machine learning perspective. eprint arXiv:1611.10338 (2016)"},{"key":"34_CR13","volume-title":"Introduction to Machine Learning","author":"A Smola","year":"2008","unstructured":"Smola, A., Vishwanathan, S.V.N.: Introduction to Machine Learning, 1st edn. Cambridge University Press, Cambridge (2008)","edition":"1"},{"key":"34_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library of support vector machine. ACM Trans. Intell. Syst. Technol. 2, 1\u201327 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"34_CR15","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/TNN.2002.1000139","volume":"13","author":"CW Hsu","year":"2002","unstructured":"Hsu, C.W., Lin, C.J.: A comparison of methods for multiclass support vector machines. IEEE Trans. Neural Netw. 13, 415\u2013425 (2002)","journal-title":"IEEE Trans. Neural Netw."},{"key":"34_CR16","unstructured":"Rish, I.: An empirical study of the naive Bayes classifier. In: IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence, vol. 3, pp. 41\u201346 (2011)"},{"key":"34_CR17","first-page":"579","volume":"8","author":"MC Popescu","year":"2009","unstructured":"Popescu, M.C., Balas, V.E., Perescu-Popescu, L., Mastorakis, N.: Multilayer perceptron and neural networks. WSEAS Trans. Circ. Syst. 8, 579\u2013588 (2009)","journal-title":"WSEAS Trans. Circ. Syst."},{"key":"34_CR18","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","volume-title":"Neural Networks for Pattern Recognition","author":"CM Bishop","year":"1995","unstructured":"Bishop, C.M.: Neural Networks for Pattern Recognition. Clarendon Press, Oxford (1995)"},{"key":"34_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"986","DOI":"10.1007\/978-3-540-39964-3_62","volume-title":"On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE","author":"G Guo","year":"2003","unstructured":"Guo, G., Wang, H., Bell, D., Bi, Y., Greer, K.: KNN model-based approach in classification. In: Meersman, R., Tari, Z., Schmidt, D.C. (eds.) OTM 2003. LNCS, vol. 2888, pp. 986\u2013996. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39964-3_62"},{"key":"34_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"34_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/TSC.2012.34","volume":"7","author":"Z Zheng","year":"2014","unstructured":"Zheng, Z., Zhang, Y., Lyu, M.R.: Investigating QoS of real-world web services. IEEE Trans. Serv. Comput. 7, 29\u201332 (2014)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"34_CR22","unstructured":"IBM Informix Documentation Team: IBM Informix Performance Guide. Version 12.10. IBM, USA (2016)"},{"issue":"2","key":"34_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","volume":"5","author":"M Hossin","year":"2015","unstructured":"Hossin, M., Sulaiman, M.N.: A review on evaluation metrics for data classification evaluations. Int. J. Data Min. Knowl. Manag. Process (IJDKP) 5(2), 1\u201311 (2015). https:\/\/doi.org\/10.5121\/ijdkp.2015.5201","journal-title":"Int. J. Data Min. Knowl. Manag. Process (IJDKP)"},{"key":"34_CR24","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recognit. Lett. 27, 861\u2013874 (2006)","journal-title":"Pattern Recognit. Lett."},{"issue":"3","key":"34_CR25","doi-asserted-by":"publisher","first-page":"276","DOI":"10.11613\/BM.2012.031","volume":"22","author":"ML McHugh","year":"2012","unstructured":"McHugh, M.L.: Interrater reliability: the kappa statistic. Biochem. Med. 22(3), 276\u2013282 (2012)","journal-title":"Biochem. Med."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95162-1_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T22:17:34Z","timestamp":1720390654000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-95162-1_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319951614","9783319951621"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95162-1_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}