{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:14:52Z","timestamp":1740147292099,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T00:00:00Z","timestamp":1659052800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T00:00:00Z","timestamp":1659052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SOCA"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s11761-022-00346-4","type":"journal-article","created":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T19:04:04Z","timestamp":1659121444000},"page":"191-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A cloud weather forecasting service and its relationship with anomaly detection"],"prefix":"10.1007","volume":"16","author":[{"given":"Amina","family":"Khedimi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0066-1733","authenticated-orcid":false,"given":"Tarek","family":"Menouer","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"C\u00e9rin","sequence":"additional","affiliation":[]},{"given":"Mourad","family":"Boudhar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,29]]},"reference":[{"key":"346_CR1","doi-asserted-by":"crossref","unstructured":"Borghesi A, Bartolini A, Lombardi M, Milano M, Benini L (2019) Anomaly detection using autoencoders in high performance computing systems. In: The thirty-third AAAI conference on artificial intelligence, AAAI 2019, the thirty-first innovative applications of artificial intelligence conference, IAAI 2019, the ninth AAAI symposium on educational advances in artificial intelligence, EAAI 2019, Honolulu, Hawaii, USA, January 27 - February 1, 2019. AAAI Press, pp 9428\u20139433","DOI":"10.1609\/aaai.v33i01.33019428"},{"key":"346_CR2","unstructured":"Alibaba Traces. https:\/\/github.com\/alibaba\/clusterdata"},{"key":"346_CR3","unstructured":"Alibaba Coud. https:\/\/eu.alibabacloud.com\/"},{"key":"346_CR4","doi-asserted-by":"crossref","unstructured":"Menouer T, Sukhija N, Le\u00a0Cun B (2017) A learning portfolio solver for optimizing the performance of constraint programming problems on multi-core computing systems. Concurr Comput: Pract Exp 29(4):e3840,cpe.3840","DOI":"10.1002\/cpe.3840"},{"key":"346_CR5","doi-asserted-by":"crossref","unstructured":"Menouer T, Baarir S (2017) Parallel learning portfolio-based solvers. Procedia Comput Sci 108:335\u2013344. International conference on computational science, ICCS 2017, 12-14 Zurich, Switzerland","DOI":"10.1016\/j.procs.2017.05.140"},{"key":"346_CR6","unstructured":"Ren R, Li J, Wang L, Zhan J, Cao Z (2018) Anomaly analysis for co-located datacenter workloads in the alibaba cluster. arXiv:1811.06901 [hep-th]"},{"issue":"6","key":"346_CR7","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.1109\/72.883408","volume":"11","author":"A Weingessel","year":"2000","unstructured":"Weingessel A, Hornik K (2000) Local pca algorithms. IEEE Trans Neural Networks 11(6):1242\u20131250","journal-title":"IEEE Trans Neural Networks"},{"key":"346_CR8","doi-asserted-by":"crossref","unstructured":"Hong D, Zhao D, Zhang Y (2016) The entropy and pca based anomaly prediction in data streams. Procedia Comput Sci 96:139\u2013146. Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 20th International Conference KES-2016","DOI":"10.1016\/j.procs.2016.08.115"},{"key":"346_CR9","doi-asserted-by":"crossref","unstructured":"Gupta C, Sinha R, Zhang Y (2015) Eagle: user profile-based anomaly detection for securing hadoop clusters. In: 2015 IEEE international conference on Big Data (Big Data), pp 1336\u20131343","DOI":"10.1109\/BigData.2015.7363892"},{"issue":"4","key":"346_CR10","first-page":"588","volume":"19","author":"J Simon","year":"2004","unstructured":"Simon J (2004) Density estimation. Stat Sci 19(4):588\u2013597","journal-title":"Stat Sci"},{"key":"346_CR11","doi-asserted-by":"publisher","first-page":"11897","DOI":"10.1109\/ACCESS.2018.2810267","volume":"6","author":"K Peng","year":"2018","unstructured":"Peng K, Leung VCM, Huang Q (2018) Clustering approach based on mini batch kmeans for intrusion detection system over big data. IEEE Access 6:11897\u201311906","journal-title":"IEEE Access"},{"key":"346_CR12","doi-asserted-by":"crossref","unstructured":"Ren R, Jia Z, Wang L, Zhan J, Yi T (2016) Bdtune: hierarchical correlation-based performance analysis and rule-based diagnosis for big data systems. In: 2016 IEEE international conference on Big Data (Big Data), pp 555\u2013562","DOI":"10.1109\/BigData.2016.7840647"},{"key":"346_CR13","first-page":"07","volume":"25","author":"Y Yi-Ren","year":"2013","unstructured":"Yi-Ren Y, Zheng-Yi L, Yuh-Jye L (2013) Anomaly detection via oversampling principal component analysis. IEEE Trans Knowl Data Eng 25:07","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"346_CR14","doi-asserted-by":"crossref","unstructured":"Rettig L, Khayati M, Cudre-Mauroux P, Piorkowski M (2015) Online anomaly detection over big data streams. In: 2015 IEEE international conference on Big Data (Big Data), Los Alamitos, CA, USA. IEEE Computer Society, pp 1113\u20131122","DOI":"10.1109\/BigData.2015.7363865"},{"key":"346_CR15","doi-asserted-by":"crossref","unstructured":"Zhou Y, Le\u00a0Y, Liu M, Zhang Y, Li H (2018) Network intrusion detection based on kernel principal component analysis and extreme learning machine. In: 2018 IEEE 18th International Conference on Communication Technology (ICCT), pp 860\u2013864","DOI":"10.1109\/ICCT.2018.8600104"},{"key":"346_CR16","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.future.2018.07.023","volume":"93","author":"Z James","year":"2019","unstructured":"James Z, Robert G, Ilija V (2019) Anomaly detection in wide area network meshes using two machine learning algorithms. Futur Gener Comput Syst 93:418\u2013426","journal-title":"Futur Gener Comput Syst"},{"key":"346_CR17","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1109\/TSP.2003.814797","volume":"51","author":"M Thottan","year":"2003","unstructured":"Thottan M, Ji C (2003) Anomaly detection in ip networks. IEEE Trans Signal Process 51:2191\u20132204","journal-title":"IEEE Trans Signal Process"},{"key":"346_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107049","volume":"169","author":"Z Ying","year":"2020","unstructured":"Ying Z, Wenqi C, Zhiliang W, Yifan C, Kai W, Yahui L, Xia Y, Xingang S, Jiahai Y, Keqin L (2020) Helad: a novel network anomaly detection model based on heterogeneous ensemble learning. Comput Netw 169:107049","journal-title":"Comput Netw"},{"key":"346_CR19","unstructured":"Google Traces. https:\/\/github.com\/google\/cluster-data"},{"key":"346_CR20","doi-asserted-by":"crossref","unstructured":"Agrawal B, Wiktorski T, Rong C (2016) Adaptive anomaly detection in cloud using robust and scalable principal component analysis. In: 2016 15th international symposium on parallel and distributed computing (ISPDC), pp 100\u2013106","DOI":"10.1109\/ISPDC.2016.22"},{"issue":"7","key":"346_CR21","doi-asserted-by":"publisher","first-page":"1902","DOI":"10.1109\/TPDS.2015.2474360","volume":"27","author":"Yu Li","year":"2016","unstructured":"Li Yu, Zhiling L (2016) A scalable, non-parametric method for detecting performance anomaly in large scale computing. IEEE Trans Parallel Distrib Syst 27(7):1902\u20131914","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"346_CR22","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.jss.2018.01.039","volume":"139","author":"C Sauvanaud","year":"2018","unstructured":"Sauvanaud C, Ka\u00e2niche M, Kanoun K, Lazri K, Da Silva Silvestre G (2018) Anomaly detection and diagnosis for cloud services: practical experiments and lessons learned. J Syst Softw 139:84\u2013106","journal-title":"J Syst Softw"},{"key":"346_CR23","unstructured":"Huang C, Min G, Wu Y, Ying Y,\u00a0Pei K, Xiang Z (2017) Time series anomaly detection for trustworthy services in cloud computing systems. IEEE Trans Big Data 1\u20131"},{"key":"346_CR24","doi-asserted-by":"crossref","unstructured":"Islam MS, Miranskyy A (2020) Anomaly detection in cloud components. In: 2020 IEEE 13th international conference on cloud computing (CLOUD), pp 1\u20133","DOI":"10.1109\/CLOUD49709.2020.00008"},{"key":"346_CR25","doi-asserted-by":"crossref","unstructured":"Jiang C, Qiu Y, Shi W, Ge Z, Wang J, Chen S, Cerin C, Ren Z, Xu G, Lin J (2020) Characterizing co-located workloads in alibaba cloud datacenters. IEEE Trans Cloud Comput 1","DOI":"10.1109\/TCC.2020.3034500"},{"issue":"1","key":"346_CR26","doi-asserted-by":"publisher","first-page":"192","DOI":"10.2166\/hydro.2011.098","volume":"14","author":"A Masoud","year":"2012","unstructured":"Masoud A, Bryan T (2012) Hybrid pareto archived dynamically dimensioned search for multi-objective combinatorial optimization: application to water distribution network design. J Hydroinf 14(1):192\u2013205","journal-title":"J Hydroinf"},{"key":"346_CR27","doi-asserted-by":"crossref","unstructured":"B\u00f6kler F, Mutzel P (2015) Output-sensitive algorithms for enumerating the extreme nondominated points of multiobjective combinatorial optimization problems. In Algorithms-ESA 2015. Springer, pp 288\u2013299","DOI":"10.1007\/978-3-662-48350-3_25"},{"key":"346_CR28","doi-asserted-by":"crossref","unstructured":"Tony Liu F, Ming Ting K, Zhou Z-H (2008) Isolation forest. In: 2008 Eighth IEEE international conference on data mining, pp 413\u2013422","DOI":"10.1109\/ICDM.2008.17"},{"key":"346_CR29","doi-asserted-by":"crossref","unstructured":"Breunig Markus\u00a0M, Kriegel Hans-Peter, Ng Raymond\u00a0T, Sander J\u00f6rg (2000) Lof: identifying density-based local outliers. In: ACM sigmod record, volume\u00a029. ACM, pp 93\u2013104","DOI":"10.1145\/335191.335388"},{"key":"346_CR30","unstructured":"Ester M, Kriegel H-P, Sander J, Xu X (1996) A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD. AAAI Press, pp 226\u2013231"},{"issue":"5","key":"346_CR31","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/j.ijar.2013.01.006","volume":"54","author":"B Mathieu","year":"2013","unstructured":"Mathieu B, Anne-Laure J, Pierre-Emmanuel D (2013) A proof for the positive definiteness of the jaccard index matrix. Int J Approx Reason 54(5):615\u2013626","journal-title":"Int J Approx Reason"},{"key":"346_CR32","doi-asserted-by":"crossref","unstructured":"Di Barba P, Mognaschi ME (2009) Sorting pareto solutions: a principle of optimal design for electrical machines. COMPEL-Int J Comput Math Electr Electron Eng","DOI":"10.1108\/03321640910969476"},{"key":"346_CR33","unstructured":"Apache Software Foundation - Hadoop https:\/\/hadoop.apache.org"},{"issue":"11","key":"346_CR34","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/2934664","volume":"59","author":"Z Matei","year":"2016","unstructured":"Matei Z, Xin Reynold S, Patrick W, Tathagata D, Michael A, Ankur D, Xiangrui M, Josh R, Shivaram V, Franklin Michael J, Ali G, Joseph G, Scott S, Ion S (2016) Apache spark: a unified engine for big data processing. Commun ACM 59(11):56\u201365","journal-title":"Commun ACM"},{"issue":"4","key":"346_CR35","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1287\/opre.14.4.670","volume":"14","author":"E Schrage Linus","year":"1966","unstructured":"Schrage Linus E, Miller Louis W (1966) The queue m\/g\/1 with the shortest remaining processing time discipline. Oper Res 14(4):670\u2013684","journal-title":"Oper Res"},{"key":"346_CR36","doi-asserted-by":"crossref","unstructured":"Friedman Eric J, Henderson Shane G (2003) Fairness and efficiency in web server protocols. In: Proceedings of the 2003 ACM SIGMETRICS international conference on measurement and modeling of computer systems, SIGMETRICS \u201903. Association for Computing Machinery, New York, NY, USA, pp 229\u2013237","DOI":"10.1145\/781027.781056"},{"key":"346_CR37","doi-asserted-by":"crossref","unstructured":"Menouer T, C\u00e9rin C, Saad W, Shi X (2018) A resource allocation framework with qualitative and quantitative SLA classes. In: Mencagli G, Dora\u00a0BH, Valeria C, Emiliano C, Emmanuel J, Felix W, Antonio S, Claudio S, Ravi\u00a0Reddy M, Laura R, Marco B, Laura A, Jos\u00e9 Daniel\u00a0GS, Stephen\u00a0LS (eds) Euro-Par 2018: parallel processing workshops - Euro-Par 2018 international workshops, Turin, Italy, August 27\u201328, 2018, Revised Selected Papers, volume 11339 of Lecture Notes in Computer Science, . Springer","DOI":"10.1007\/978-3-030-10549-5_6"},{"issue":"12","key":"346_CR38","doi-asserted-by":"publisher","first-page":"9942","DOI":"10.1007\/s11227-020-03231-z","volume":"76","author":"M Tarek","year":"2020","unstructured":"Tarek M, Christophe C, Ching-Hsien H (2020) Opportunistic scheduling and resources consolidation system based on a new economic model. J Supercomput 76(12):9942\u20139975","journal-title":"J Supercomput"},{"issue":"4","key":"346_CR39","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1145\/321906.321910","volume":"22","author":"HT Kung","year":"1975","unstructured":"Kung HT, Luccio F, Preparata FP (1975) On finding the maxima of a set of vectors. J ACM 22(4):469\u2013476","journal-title":"J ACM"},{"key":"346_CR40","unstructured":"Multi-objective optimization presentation. https:\/\/engineering.purdue.edu\/~sudhoff\/ee630\/lecture09.pdf"},{"key":"346_CR41","doi-asserted-by":"crossref","unstructured":"Ding L, Zeng S, Kang L (2003) A fast algorithm on finding the non-dominated set in multi-objective optimization. In: Evolutionary computation, 2003. CEC \u201903. The 2003 Congress on, volume\u00a04, pp 2565\u20132571","DOI":"10.1109\/CEC.2003.1299411"},{"key":"346_CR42","unstructured":"Description of Alibaba Traces. https:\/\/github.com\/alibaba\/clusterdata\/blob\/master\/cluster-trace-v2018\/schema.txt"}],"container-title":["Service Oriented Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-022-00346-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11761-022-00346-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-022-00346-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T13:12:21Z","timestamp":1661692341000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11761-022-00346-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,29]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["346"],"URL":"https:\/\/doi.org\/10.1007\/s11761-022-00346-4","relation":{},"ISSN":["1863-2386","1863-2394"],"issn-type":[{"type":"print","value":"1863-2386"},{"type":"electronic","value":"1863-2394"}],"subject":[],"published":{"date-parts":[[2022,7,29]]},"assertion":[{"value":"25 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}