{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:45:40Z","timestamp":1743018340408,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540200505"},{"type":"electronic","value":"9783540394044"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39404-4_27","type":"book-chapter","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T04:04:45Z","timestamp":1277697885000},"page":"355-367","source":"Crossref","is-referenced-by-count":1,"title":["Predicting Violations of QoS Requirements in Distributed Systems"],"prefix":"10.1007","author":[{"given":"Sandra","family":"Taylor","sequence":"first","affiliation":[]},{"given":"Hanan","family":"Lutfiyya","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Bykova, M., Ostermann, S., Tjaden, B.: Detecting network intrusions via a statistical analysis. In: Proceedings of the 33rd Southeastern Symposium on System Theory, pp. 309\u2013314 (2001)","DOI":"10.1109\/SSST.2001.918537"},{"key":"27_CR2","volume-title":"Undergraduate Econometrics","author":"R. Carter Hill","year":"2000","unstructured":"Carter Hill, R., Griffiths, W.E., Judge, G.G.: Undergraduate Econometrics. John Wiley and Sons, Inc., Chichester (2000)"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Hood, C., Ji, C.: Probabilistic network fault detection. In: Global telecommunications Conference, 1996: Communications: They key to Global Prosperity, pp. 1872\u20131876 (1996)","DOI":"10.1109\/GLOCOM.1996.591962"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Jones, M., Ro\u015fu, D., Ro\u015fu, M.: CPU Reservations and Time Constraints: Efficient, Predictable Scheduling of Independent Activities. In: Proceedings of the Sixteenth ACM Symposium on Operation Systems Principles, St. Malo, France (October 1997)","DOI":"10.1145\/268998.266689"},{"issue":"4","key":"27_CR5","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1109\/24.58721","volume":"39","author":"R. Maxion","year":"1990","unstructured":"Maxion, R., Feather, F.: A case study of ethernet anomalies in a distributed computing environment. IEEE Transactions on Reliability\u00a039(4), 433\u2013443 (1990)","journal-title":"IEEE Transactions on Reliability"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Molenkamp, G., Lutfiyya, H., Katchabaw, M., Bauer, M.: Resource management to support application-specific quality of service. In: IEEE\/IFIP Management of Multimedia Networks and Services (MMNS 2001) (October 2001)","DOI":"10.1007\/3-540-45508-6_11"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Shen, D., Hellerstein, J.: Predictive models for proactive network management: Application to a production web server. In: Proceedings of the 2000 IEEE\/IFIP Network Operations and Management Symposium, pp. 833\u2013846 (2000)","DOI":"10.1109\/NOMS.2000.830432"},{"key":"27_CR8","unstructured":"Steinder, M., Sethi, A.: The present and future of event correlation: A need for end-to-end service fault localization (2001)"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Thottan, M., Ji, C.: Fault prediction at the network layer using intelligent agents. In: Proceedings of the 1999 IEEE\/IFIP International Symposium on Integrated Network Management, pp. 745\u2013759 (1999)","DOI":"10.1109\/INM.1999.770720"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Ward, A., Glynn, P., Richardson, K.: Internet service performance failure detection. In: 1998 Web Server Performance Workshop, June 1998, pp. 38\u201343 (1998)","DOI":"10.1145\/306225.306237"}],"container-title":["Lecture Notes in Computer Science","Management of Multimedia Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39404-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T08:33:04Z","timestamp":1740213184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39404-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540200505","9783540394044"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39404-4_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}