{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T07:23:39Z","timestamp":1768893819058,"version":"3.49.0"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T00:00:00Z","timestamp":1549411200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SICS Softw.-Inensiv. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s00450-019-00398-6","type":"journal-article","created":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T17:16:56Z","timestamp":1549473416000},"page":"99-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Troubleshooting Serverless functions: a combined monitoring and debugging approach"],"prefix":"10.1007","volume":"34","author":[{"given":"Johannes","family":"Manner","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Kolb","sequence":"additional","affiliation":[]},{"given":"Guido","family":"Wirtz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,6]]},"reference":[{"key":"398_CR1","unstructured":"Fromm K (2012) Why the future of software and apps is Serverless. \n                    https:\/\/readwrite.com\/2012\/10\/15\/why-the-future-of-software-and-apps-is-serverless\/\n                    \n                  . Accessed 31 Jan 2018"},{"key":"398_CR2","first-page":"2","volume":"61","author":"N Savage","year":"2018","unstructured":"Savage N (2018) Going Serverless. Commun ACM 61:2","journal-title":"Commun ACM"},{"key":"398_CR3","doi-asserted-by":"crossref","unstructured":"Mell P, Grance T (2011) The NIST deinition of cloud computing. Technical report, National Institute of Standards and Technology, Gaithersburg","DOI":"10.6028\/NIST.SP.800-145"},{"key":"398_CR4","unstructured":"Baldini I et al (2017) Serverless computing: current trends and open problems. In: Chaudhary S, Somani G, Buyya R (eds) Research advances in cloud computing. Springer, Singapore"},{"key":"398_CR5","volume-title":"Serverless architectures on Aws: with examples using Aws Lambda","author":"P Sbarski","year":"2017","unstructured":"Sbarski P (2017) Serverless architectures on Aws: with examples using Aws Lambda. Manning Publications, New York"},{"key":"398_CR6","doi-asserted-by":"crossref","unstructured":"Kolb S, Wirtz G (2014) Towards application portability in platform as a service. In: Proceedings of SOSE","DOI":"10.1109\/SOSE.2014.26"},{"key":"398_CR7","doi-asserted-by":"crossref","unstructured":"van Eyk E et al (2017) The SPEC cloud group\u2019s research vision on FaaS and Serverless architectures. In: Proceedings of WoSC","DOI":"10.1145\/3154847.3154848"},{"key":"398_CR8","unstructured":"Hendrickson S et al (2016) Serverless computation with openLambda. In: Proceedings of HotCloud"},{"key":"398_CR9","doi-asserted-by":"crossref","unstructured":"Villamizar M et al (2016) Infrastructure cost comparison of running web applications in the cloud using AWS Lambda and monolithic and microservice architectures. In: Proceedings of CCGrid","DOI":"10.1109\/CCGrid.2016.37"},{"key":"398_CR10","doi-asserted-by":"crossref","unstructured":"Jonas E et al (2017) Occupy the cloud: distributed computing for the 99%. In: Proceedings of SoCC","DOI":"10.1145\/3127479.3128601"},{"key":"398_CR11","volume-title":"What is Serverless?","author":"M Roberts","year":"2017","unstructured":"Roberts M, Chapin J (2017) What is Serverless?. O\u2019Reilly Media. Inc, Newton"},{"key":"398_CR12","doi-asserted-by":"crossref","unstructured":"Spring J (2011) Monitoring cloud computing by layer, part 1. IEEE Secur Priv 9(2):66\u201368","DOI":"10.1109\/MSP.2011.33"},{"key":"398_CR13","doi-asserted-by":"crossref","unstructured":"Spring J (2011) Monitoring cloud computing by layer, part 2. IEEE Secur Priv 9(3):52\u201355","DOI":"10.1109\/MSP.2011.57"},{"key":"398_CR14","doi-asserted-by":"crossref","unstructured":"Aceto G et al (2012) Cloud monitoring: definitions, issues and future directions. In: Proceedings of CLOUDNET","DOI":"10.1109\/CloudNet.2012.6483656"},{"key":"398_CR15","doi-asserted-by":"crossref","unstructured":"Yuan D et al (2011) Improving software diagnosability via log enhancement. In: Proceedings of ASPLOS","DOI":"10.1145\/1950365.1950369"},{"key":"398_CR16","doi-asserted-by":"crossref","unstructured":"Kobayashi M et al (2017) Discovering cloud operation history through log analysis. In: Proceedings of AnNet","DOI":"10.23919\/INM.2017.7987423"},{"key":"398_CR17","doi-asserted-by":"crossref","unstructured":"Kellogg M (2016) Combining bug detection and test case generation. In: Proceedings of SIGSOFT","DOI":"10.1145\/2950290.2983970"},{"key":"398_CR18","doi-asserted-by":"crossref","unstructured":"Armbrust M et al (2010) A view of cloud computing. Commun ACM 53(4):50\u201358","DOI":"10.1145\/1721654.1721672"}],"container-title":["SICS Software-Intensive Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00450-019-00398-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00450-019-00398-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00450-019-00398-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,6]],"date-time":"2020-02-06T00:13:31Z","timestamp":1580948011000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00450-019-00398-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,6]]},"references-count":18,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["398"],"URL":"https:\/\/doi.org\/10.1007\/s00450-019-00398-6","relation":{},"ISSN":["2524-8510","2524-8529"],"issn-type":[{"value":"2524-8510","type":"print"},{"value":"2524-8529","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,6]]},"assertion":[{"value":"6 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}