{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:44Z","timestamp":1725771284380},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_13","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"151-159","source":"Crossref","is-referenced-by-count":6,"title":["Autonomic SLA Management in Cloud Computing Services"],"prefix":"10.1007","author":[{"given":"S.","family":"Anithakumari","sequence":"first","affiliation":[]},{"given":"K.","family":"Chandra Sekaran","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-93851-4_7","volume-title":"Service-Oriented Computing - ICSOC 2007 Workshops","author":"M.J. Boniface","year":"2009","unstructured":"Boniface, M.J., Phillips, S.C., Sanchez-Macian, A., Surridge, M.: Dynamic service provisioning using GRIA sLAs. In: Di Nitto, E., Ripeanu, M. (eds.) ICSOC 2007. LNCS, vol.\u00a04907, pp. 56\u201367. Springer, Heidelberg (2009)"},{"issue":"6","key":"13_CR2","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R. Buyya","year":"2009","unstructured":"Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems\u00a025(6), 599\u2013616 (2009)","journal-title":"Future Generation Computer Systems"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Comuzzi, M., Kotsokalis, C., Spanoudakis, G., Yahyapour, R.: Establishing and monitoring slas in complex service based systems. In: IEEE International Conference on Web Services, ICWS 2009, pp. 783\u2013790. IEEE (2009)","DOI":"10.1109\/ICWS.2009.47"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Dobson, G., Sanchez-Macian, A.: Towards unified qos\/sla ontologies. In: IEEE Services Computing Workshops, SCW 2006, pp. 169\u2013174. IEEE (2006)","DOI":"10.1109\/SCW.2006.40"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Emeakaroha, V.C., Brandic, I., Maurer, M., Dustdar, S.: Low level metrics to high level slas-lom2his framework: Bridging the gap between monitored metrics and sla parameters in cloud environments. In: 2010 International Conference on High Performance Computing and Simulation (HPCS), pp. 48\u201354. IEEE (2010)","DOI":"10.1109\/HPCS.2010.5547150"},{"issue":"7","key":"13_CR6","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1016\/j.future.2011.08.018","volume":"28","author":"V.C. Emeakaroha","year":"2012","unstructured":"Emeakaroha, V.C., Netto, M.A., Calheiros, R.N., Brandic, I., Buyya, R., De Rose, C.A.: Towards autonomic detection of sla violations in cloud infrastructures. Future Generation Computer Systems\u00a028(7), 1017\u20131029 (2012)","journal-title":"Future Generation Computer Systems"},{"key":"13_CR7","first-page":"39","volume":"8","author":"H.M. Frutos","year":"2009","unstructured":"Frutos, H.M., Kotsiopoulos, I.: Brein: Business objective driven reliable and intelligent grids for real business. IBIS\u00a08, 39\u201341 (2009)","journal-title":"IBIS"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1007\/11847366_77","volume-title":"High Performance Computing and Communications","author":"P. Hasselmeyer","year":"2006","unstructured":"Hasselmeyer, P., Koller, B., Schubert, L., Wieder, P.: Towards SLA-supported resource management. In: Gerndt, M., Kranzlm\u00fcller, D. (eds.) HPCC 2006. LNCS, vol.\u00a04208, pp. 743\u2013752. Springer, Heidelberg (2006)"},{"issue":"3","key":"13_CR9","doi-asserted-by":"crossref","first-page":"313","DOI":"10.3233\/MGS-2007-3304","volume":"3","author":"B. Koller","year":"2007","unstructured":"Koller, B., Schubert, L.: Towards autonomous sla management using a proxy-like approach. Multiagent and Grid Systems\u00a03(3), 313\u2013325 (2007)","journal-title":"Multiagent and Grid Systems"},{"issue":"7","key":"13_CR10","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1016\/j.parco.2004.04.001","volume":"30","author":"M.L. Massie","year":"2004","unstructured":"Massie, M.L., Chun, B.N., Culler, D.E.: The ganglia distributed monitoring system: design, implementation, and experience. Parallel Computing\u00a030(7), 817\u2013840 (2004)","journal-title":"Parallel Computing"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Redl, C., Breskovic, I., Brandic, I., Dustdar, S.: Automatic sla matching and provider selection in grid and cloud computing markets. In: Proceedings of the 2012 ACM\/IEEE 13th International Conference on Grid Computing, pp. 85\u201394. IEEE Computer Society (2012)","DOI":"10.1109\/Grid.2012.18"},{"issue":"17","key":"13_CR12","doi-asserted-by":"publisher","first-page":"2923","DOI":"10.1016\/j.comnet.2009.04.014","volume":"53","author":"T. Wood","year":"2009","unstructured":"Wood, T., Shenoy, P., Venkataramani, A., Yousif, M.: Sandpiper: Black-box and gray-box resource management for virtual machines. Computer Networks\u00a053(17), 2923\u20132938 (2009)","journal-title":"Computer Networks"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Maurer, M., Breskovic, I., Emeakaroha, V.C., Brandic, I.: Revealing the mape loop for the autonomic management of cloud infrastructures. In: 2011 IEEE Symposium on Computers and Communications (ISCC), pp. 147\u2013152. IEEE (2011)","DOI":"10.1109\/ISCC.2011.5984008"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Erdil, D.C.: Dependable autonomic cloud computing with information proxies. In: 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), pp. 1518\u20131524. IEEE (2011)","DOI":"10.1109\/IPDPS.2011.305"},{"key":"13_CR15","unstructured":"ESPER, Event Stream Processing Engine, \n                    \n                      http:\/\/esper.codehaus.org\/"},{"key":"13_CR16","unstructured":"Foundation of Self-governing ICT Infrastructures (FoSII), \n                    \n                      www.infosys.tuwien.ac.at\/linksites\/FOSII\/index.html"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Brandic, I., Music, D., Dustdar, S.: Service mediation and negotiation bootstrapping as first achievements towards self-adaptable grid and cloud services. In: Proceedings of the 6th International Conference Industry Session on Grids Meets Autonomic Computing, pp. 1\u20138. ACM (2009)","DOI":"10.1145\/1555301.1555302"},{"issue":"3","key":"13_CR18","doi-asserted-by":"crossref","first-page":"313","DOI":"10.3233\/MGS-2007-3304","volume":"3","author":"B. Koller","year":"2007","unstructured":"Koller, B., Schubert, L.: Towards autonomous sla management using a proxy-like approach. Multiagent and Grid Systems\u00a03(3), 313\u2013325 (2007)","journal-title":"Multiagent and Grid Systems"},{"key":"13_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-03864-8_5","volume-title":"Grid Economics and Business Models","author":"I. Brandic","year":"2009","unstructured":"Brandic, I., Music, D., Leitner, P., Dustdar, S.: vieSLAF framework: Enabling adaptive and versatile SLA-management. In: Altmann, J., Buyya, R., Rana, O.F. (eds.) GECON 2009. LNCS, vol.\u00a05745, pp. 60\u201373. Springer, Heidelberg (2009)"},{"key":"13_CR20","unstructured":"Java Messaging Service, \n                    \n                      http:\/\/java.sun.com\/products\/jms\/"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T07:13:46Z","timestamp":1558854826000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}