{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T10:49:07Z","timestamp":1725101347911},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,2,20]],"date-time":"2014-02-20T00:00:00Z","timestamp":1392854400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s11227-014-1125-x","type":"journal-article","created":{"date-parts":[[2014,2,19]],"date-time":"2014-02-19T15:22:21Z","timestamp":1392823341000},"page":"1556-1578","source":"Crossref","is-referenced-by-count":9,"title":["Cloud-based architecture for web applications with load forecasting mechanism: a use case on the e-learning services of a distant university"],"prefix":"10.1007","volume":"68","author":[{"given":"Salvador","family":"Ros","sequence":"first","affiliation":[]},{"given":"Agust\u00edn C.","family":"Caminero","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Hern\u00e1ndez","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Robles-G\u00f3mez","sequence":"additional","affiliation":[]},{"given":"Llanos","family":"Tobarra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,20]]},"reference":[{"key":"1125_CR1","unstructured":"Understanding linux cpu load\u2013when should you be worried? http:\/\/blog.scoutapp.com\/articles\/2009\/07\/31\/understanding-load-averages . Accessed 6 Feb 2014"},{"issue":"2","key":"1125_CR2","first-page":"58","volume":"1","author":"M Al-Zoube","year":"2009","unstructured":"Al-Zoube M (2009) E-learning on the cloud. Int Arab J e-Technol 1(2):58\u201364","journal-title":"Int Arab J e-Technol"},{"key":"1125_CR3","unstructured":"Amazon Elastic Compute Cloud. http:\/\/aws.amazon.com\/ec2\/ . Accesses 6 Feb 2014"},{"key":"1125_CR4","doi-asserted-by":"crossref","unstructured":"Andreolini M, Casolari S (2006) Load prediction models in web-based systems. In: Proceedings of the 1st ACM international conference on performance evaluation methodolgies and tools (VALUETOOLS), Pisa, Italy","DOI":"10.1145\/1190095.1190129"},{"key":"1125_CR5","unstructured":"AOL server (2014). http:\/\/www.aolserver.com\/ . Accessed 6 Feb 2014"},{"issue":"5","key":"1125_CR6","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1016\/j.future.2011.04.017","volume":"28","author":"A Beloglazov","year":"2012","unstructured":"Beloglazov A, Abawajy J, Buyya R (2012) Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future Gener Comput Syst 28(5):755\u2013768","journal-title":"Future Gener Comput Syst"},{"key":"1125_CR7","doi-asserted-by":"crossref","unstructured":"Bhattacharya P, Guo M, Tao L, Wu B, Qian K, Palmer K (2011) A cloud-based cyberlearning environment for introductory computing programming education. In: Proceedings of the international conference on advanced learning technologies (ICALT). Athens, USA","DOI":"10.1109\/ICALT.2011.11"},{"issue":"4","key":"1125_CR8","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/S1353-4858(11)70040-X","volume":"2011","author":"R Blandford","year":"2011","unstructured":"Blandford R (2011) Information security in the cloud. Netw Secur 2011(4):15\u201317","journal-title":"Netw Secur"},{"key":"1125_CR9","unstructured":"Buyya R, Beloglazov A, Abawajy J (2010) Energy-efficient management of data center resources for cloud computing: a vision, architectural elements, and open challenges. In: Proceedings of the international conference on parallel and distributed processing techniques and Applications (PDPTA), Las Vegas, USA"},{"issue":"6","key":"1125_CR10","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyya","year":"2009","unstructured":"Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599\u2013616","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"1125_CR11","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1016\/j.jcss.2010.01.006","volume":"77","author":"A Caminero","year":"2011","unstructured":"Caminero A, Rana O, Caminero B, Carri\u00f3n C (2011) Network-aware heuristics for inter-domain meta-scheduling in Grids. J Comput Syst Sci 77(2):262\u2013281","journal-title":"J Comput Syst Sci"},{"key":"1125_CR12","doi-asserted-by":"crossref","unstructured":"Caminero AC, Ros S, Hern\u00e1ndez R, Robles-G\u00f3mez A, Pastor R (2011) Cloud-based e-learning infrastructures with load forecasting mechanism based on exponential smoothing: a use case. In: Proceedings of the frontiers in education conference (FIE), Rapid City, USA","DOI":"10.1109\/FIE.2011.6142740"},{"key":"1125_CR13","doi-asserted-by":"crossref","unstructured":"Caminero AC, Ros S, Hern\u00e1ndez R, Robles-G\u00f3mez A, Pastor R (2011) Load forecasting mechanism for e-learning infrastructures using exponential smoothing. In: Proceedings of international conference on advanced learning technologies (ICALT), Athens, USA","DOI":"10.1109\/ICALT.2011.114"},{"key":"1125_CR14","unstructured":"Claybrook B (2014) Cloud interoperability: problems and best practices. http:\/\/www.computerworld.com\/s\/article\/9217158\/Cloud_interoperability_Problems_and_best_practices . Accessed 6 Feb 2014"},{"key":"1125_CR15","unstructured":"Cloud Computing Interopreability Forum (2014). http:\/\/www.cloudforum.org\/ . Accessed 6 Feb"},{"key":"1125_CR16","unstructured":"Cloud Security Alliance: Enabling secure vm-vtpm migration in private clouds. Tech Rep (2011)"},{"key":"1125_CR17","unstructured":"Dejun J, Pierre G, Chi CH (2011) Resource provisioning of web applications in heterogeneous clouds. In: Proceedings of the 2nd USENIX conference on web application development (WebApps). Portland, USA"},{"issue":"3\u20134","key":"1125_CR18","first-page":"211","volume":"7","author":"PA Dinda","year":"1999","unstructured":"Dinda PA (1999) The statistical properties of host load. Sci Progr 7(3\u20134):211\u2013229","journal-title":"Sci Progr"},{"issue":"4","key":"1125_CR19","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1023\/A:1019048724544","volume":"3","author":"PA Dinda","year":"2000","unstructured":"Dinda PA, O\u2019Hallaron DR (2000) Host load prediction using linear models. Clust Comput 3(4):265\u2013280","journal-title":"Clust Comput"},{"key":"1125_CR20","unstructured":"Distributed Management Task Force: Open Virtualization Format Specification 1.0. Tech Rep DMTF DSP0243 (2009)"},{"issue":"7\u20138","key":"1125_CR21","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1016\/j.peva.2007.01.001","volume":"64","author":"M Dobber","year":"2007","unstructured":"Dobber M, van der Mei R, Koole G (2007) A prediction method for job runtimes on shared processors: survey, statistical analysis and new avenues. Perform Eval 64(7\u20138):755\u2013781","journal-title":"Perform Eval"},{"key":"1125_CR22","doi-asserted-by":"crossref","unstructured":"Dong B, Zheng Q, Qiao M, Shu J, Yang J (2009) Bluesky cloud framework: an E-learning framework embracing cloud computing. In: Proceedings of the first international conference on cloud computing (CloudCom). Beijing, China","DOI":"10.1007\/978-3-642-10665-1_55"},{"key":"1125_CR23","doi-asserted-by":"crossref","unstructured":"Dong B, Zheng Q, Yang J, Li H, Qiao M (2009) An E-learning ecosystem based on cloud computing infrastructure. In: Proceedings of the international conference on advanced learning technologies (ICALT), Riga, Latvia","DOI":"10.1109\/ICALT.2009.21"},{"key":"1125_CR24","unstructured":"dotLRN. http:\/\/www.dotlrn.org\/ . Accesses 6 Feb 2014"},{"issue":"3","key":"1125_CR25","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/S0959-440X(96)80056-X","volume":"6","author":"SR Eddy","year":"1996","unstructured":"Eddy SR (1996) Hidden markov models. Curr Opin Struct Biol 6(3):361\u2013365","journal-title":"Curr Opin Struct Biol"},{"issue":"1\u20133","key":"1125_CR26","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/A:1012074215150","volume":"31","author":"RJ Frank","year":"2001","unstructured":"Frank RJ, Davey N, Hunt SP (2001) Time series prediction and neural networks. J Intell Robot Syst 31(1\u20133):91\u2013103","journal-title":"J Intell Robot Syst"},{"issue":"8","key":"1125_CR27","doi-asserted-by":"crossref","first-page":"1295","DOI":"10.1016\/j.future.2011.11.004","volume":"28","author":"I Goiri","year":"2012","unstructured":"Goiri I, Juli\u00e1 F, Fit\u00f3 JO, Mac\u00edas M, Guitart J (2012) Supporting cpu-based guarantees in cloud slas via resource-level qos metrics. Future Gener Comput Syst 28(8):1295\u20131302. doi: 10.1016\/j.future.2011.11.004","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"1125_CR28","doi-asserted-by":"crossref","first-page":"36","DOI":"10.4018\/jisp.2010040103","volume":"4","author":"KW Hamlen","year":"2010","unstructured":"Hamlen KW, Kantarcioglu M, Khan L, Thuraisingham BM (2010) Security issues for cloud computing. Int J Inform Secur Privacy 4(2):36\u201348","journal-title":"Int J Inform Secur Privacy"},{"key":"1125_CR29","unstructured":"IBM Corporation: the benefits of cloud computing. Tech Rep (2009)"},{"key":"1125_CR30","unstructured":"IBM Corporation: cloud computing saves time, money and shortens production cycle. http:\/\/www-01.ibm.com\/software\/success\/cssdb.nsf\/CS\/ARBN-7QK2YV?OpenDocument&Site=corp&cty=en_us . Accessed 6 Feb 2014"},{"issue":"1","key":"1125_CR31","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1504\/IJGUC.2005.007058","volume":"1","author":"H Jin","year":"2005","unstructured":"Jin H, Shi X, Qiang W, Zou D (2005) An adaptive meta-scheduler for data-intensive applications. Int J Grid Util Comput 1(1):32\u201337","journal-title":"Int J Grid Util Comput"},{"key":"1125_CR32","unstructured":"Kalekar PS (2004) Time series forecasting using holt-winters exponential smoothing. Tech rep, Kanwal Rekhi School of Information Technology"},{"key":"1125_CR33","unstructured":"Kaplan JM, Forest W, Kindler N (2008) Revolutionizing data center energy efficiency. Tech rep, MacKinsey"},{"key":"1125_CR34","unstructured":"Kellogg T (2008) ESX guest capacity determination using guest ready-time metric as an indicator. In: International computer measurement group conference (CMG), Las Vegas, USA"},{"key":"1125_CR35","doi-asserted-by":"crossref","unstructured":"Kephart JO, Chan H, Das R, Levine DW, Tesauro G III, Rawson FL, Lefurgy C (2007) Coordinating multiple autonomic managers to achieve specified power-performance tradeoffs. In: Proceedings of the international conference on autonomic computing (ICAC), Jacksonville, Florida","DOI":"10.1109\/ICAC.2007.12"},{"issue":"1","key":"1125_CR36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10586-008-0070-y","volume":"12","author":"D Kusic","year":"2009","unstructured":"Kusic D, Kephart JO, Hanson JE, Kandasamy N, Jiang G (2009) Power and performance management of virtualized computing environments via lookahead control. Clust Comput 12(1):1\u201315","journal-title":"Clust Comput"},{"key":"1125_CR37","unstructured":"Lee B, Schopf J (2003) Run-time prediction of parallel applications on shared environments. In: Proceedings of the international conference on cluster computing (Cluster), Hong Kong, China"},{"key":"1125_CR38","doi-asserted-by":"crossref","unstructured":"Lefurgy C, Wang X, Ware M (2007) Server-level power control. In: Proceedings of the international conference on autonomic computing (ICAC), Jacksonville, Florida","DOI":"10.1109\/ICAC.2007.35"},{"key":"1125_CR39","unstructured":"Miah W (2010) Monitoring scientific computing infrastructure using Nagios. Tech Rep RAL-TR-2010-002, SFTC Rutherford Appleton Laboratory"},{"key":"1125_CR40","unstructured":"Miller M (2014) Cloud computing pros and cons for end users. http:\/\/www.informit.com\/articles\/article.aspx?p=1324280&seqNum=2 . Accesses 6 Feb 2014"},{"issue":"5","key":"1125_CR41","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/MC.2012.76","volume":"45","author":"R Moreno-Vozmediano","year":"2012","unstructured":"Moreno-Vozmediano R, Montero RS, Llorente IM (2012) Iaas cloud architecture: from virtualized datacenters to federated cloud infrastructures. IEEE Comput 45(5):65\u201372","journal-title":"IEEE Comput"},{"key":"1125_CR42","unstructured":"Nginx: http:\/\/wiki.nginx.org\/Main . Accessed 6 Feb 2014"},{"key":"1125_CR43","unstructured":"Open Cloud Standards Incubator: Interoperable clouds white paper. Tech Rep DSP-IS0101 (2009)"},{"key":"1125_CR44","unstructured":"OpenACS (2014) http:\/\/openacs.org\/ . Accessed 6 Feb 2014"},{"key":"1125_CR45","doi-asserted-by":"crossref","unstructured":"Pastor R, Read T, Ros S, Hern\u00e0ndez R, Hern\u00e0ndez R (2009) Virtual communities adapted to the EHEA in an enterprise distance e-learning based environment. In: Proceedings of the third international conference on online communities and social computing (OCSC), held as part of 13th international conference on human computer interaction (HCI), San Diego, USA","DOI":"10.1007\/978-3-642-02774-1_53"},{"key":"1125_CR46","unstructured":"Qiao Y, Dinda P (2009) Network traffic analysis, classification, and prediction. Tech Rep NWU-CS-02-11, Department of Computer Science, Northwestern University"},{"key":"1125_CR47","doi-asserted-by":"crossref","unstructured":"Ranganathan P, Leech P, Irwin DE, Chase JS (2006) Ensemble-level power management for dense blade servers. In: Proceedings of the 33th annual international symposium on computer architecture (ISCA), Boston, USA","DOI":"10.1145\/1150019.1136492"},{"key":"1125_CR48","unstructured":"Red-Hat enterprise virtualization for servers (2014). https:\/\/www.redhat.com\/v\/swf\/redhat_ss_scheduler.html . Accessed 6 Feb 2014"},{"issue":"9","key":"1125_CR49","first-page":"7149","volume":"3","author":"VK Reddy","year":"2011","unstructured":"Reddy VK, Reddy LSS (2011) Security architecture of cloud computing. Int J Eng Sci Technol 3(9):7149\u20137155","journal-title":"Int J Eng Sci Technol"},{"key":"1125_CR50","unstructured":"Seovic A, Falco M, Peralta P (2010) Oracle Coherence 3.5. Packt Publishing"},{"key":"1125_CR51","doi-asserted-by":"crossref","unstructured":"Sulistio A, Reich C, Doelitzscher F (2009) Cloud infrastructure & applications\u2013CloudIA. In: Proceedings of the first intertnational conference on cloud computing (CloudCom), Beijing, China","DOI":"10.1007\/978-3-642-10665-1_56"},{"key":"1125_CR52","unstructured":"The R Foundation (2014). http:\/\/www.r-project.org\/ . Accessed 6 Feb 2014"},{"key":"1125_CR53","doi-asserted-by":"crossref","unstructured":"Tom\u00e1s L, Caminero A, Caminero B, Carri\u00f3n C (2010) Using network information to perform meta-scheduling in advance in Grids. In: Proceedings of the 16th international conference on parallel computing (Euro-Par), Ischia, Italy","DOI":"10.1007\/978-3-642-15277-1_41"},{"key":"1125_CR54","doi-asserted-by":"crossref","unstructured":"Tom\u00e1s L, Caminero A, Carri\u00f3n C, Caminero B (2010) Exponential smoothing for network-aware meta-scheduler in advance in grids. In: Proceedings of the sixth international workshop on scheduling and resource management for parallel and distributed systems (SRMPDS), held jointly with the international conference on parallel processing (ICPP), San Diego, USA","DOI":"10.1109\/ICPPW.2010.52"},{"issue":"7","key":"1125_CR55","doi-asserted-by":"crossref","first-page":"1058","DOI":"10.1016\/j.future.2011.08.019","volume":"28","author":"L Tom\u00e1s","year":"2012","unstructured":"Tom\u00e1s L, Caminero AC, Rana O, Carri\u00f3n C, Caminero B (2012) A Gridway-based autonomic network-aware metascheduler. Future Gener Comput Syst 28(7):1058\u20131069","journal-title":"Future Gener Comput Syst"},{"key":"1125_CR56","unstructured":"Universidad Nacional de Educaci\u00f3n a Distancia (UNED) (2014). http:\/\/www.uned.es\/ . Accessed 6 Feb 2014"},{"key":"1125_CR57","unstructured":"Urquhart J (2014) Exploring cloud interoperability. http:\/\/news.cnet.com\/8301-19413_3-10235492-240.html . Accessed 6 Feb 2014"},{"key":"1125_CR58","doi-asserted-by":"crossref","unstructured":"Vouk M, Averitt S, Bugaev M, Kurth A, Peeler A, Shaffer H, Sills E, Stein S, Thompson J (2008) Powered by VCL-using virtual computing laboratory (VCL) technology to power cloud computing. In: Proceedings of the 2nd international conference on the virtual computing initiative (ICVCI)","DOI":"10.1147\/JRD.2009.5429056"},{"key":"1125_CR59","unstructured":"Ward S (2014) 5 disadvantages of cloud computing. (2014). http:\/\/sbinfocanada.about.com\/od\/itmanagement\/a\/Cloud-Computing-Disadvantages.htm Accessed 6 Feb 2014"},{"key":"1125_CR60","doi-asserted-by":"crossref","unstructured":"Winkler V (2011) Securing the cloud: cloud computer security techniques and tactics. Elsevier, Amsterdam","DOI":"10.1016\/B978-1-59749-592-9.00005-1"},{"key":"1125_CR61","doi-asserted-by":"crossref","unstructured":"Wu B, Qian K, Guo M, Bhattacharya P, Hu W (2011) Live programming learning objects on cloud. In: Proceedings of the international conference on advanced learning technologies (ICALT), Athens, USA","DOI":"10.1109\/ICALT.2011.113"},{"key":"1125_CR62","unstructured":"Yang L, Foster I, Schopf JM (2003) Homeostatic and tendency-based cpu load predictions. In: Proceedings of the 17th international symposium on parallel and distributed processing (IPDPS), Nice, France"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1125-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-014-1125-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1125-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T19:34:00Z","timestamp":1565206440000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-014-1125-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,20]]},"references-count":62,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["1125"],"URL":"https:\/\/doi.org\/10.1007\/s11227-014-1125-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,20]]}}}