{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T06:59:54Z","timestamp":1763535594393,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/bigdata.2018.8622058","type":"proceedings-article","created":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T03:07:18Z","timestamp":1548385638000},"page":"1837-1845","source":"Crossref","is-referenced-by-count":3,"title":["Learning to Simplify Distributed Systems Management"],"prefix":"10.1109","author":[{"given":"Christopher","family":"Streiffer","sequence":"first","affiliation":[]},{"given":"Ramya","family":"Raghavendra","sequence":"additional","affiliation":[]},{"given":"Theophilus","family":"Benson","sequence":"additional","affiliation":[]},{"given":"Mudhakar","family":"Srivatsa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.2.270"},{"key":"ref38","first-page":"577","article-title":"Constrained k-means clustering with background knowledge","volume":"1","author":"wagstaff","year":"2001","journal-title":"ICML"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.01.039"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2737793"},{"key":"ref31","article-title":"Using of jaccard coefficient for keywords similarity","volume":"1","author":"niwattanakul","year":"2013","journal-title":"Proceedings of the International MultiConference of Engineers and Computer Scientists"},{"key":"ref30","first-page":"69","article-title":"Agile: Elastic distributed resource scaling for infrastructure-as-a-service","volume":"13","author":"nguyen","year":"2013","journal-title":"ICAC"},{"journal-title":"ARGoS","year":"2015","key":"ref37"},{"journal-title":"Observability at uber engineering Past present future","year":"0","key":"ref36"},{"key":"ref35","article-title":"Dapper, a large-scale distributed systems tracing infrastructure","author":"sigelman","year":"2010","journal-title":"Google Inc Tech Rep"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038921"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282383"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.44"},{"key":"ref11","first-page":"18","article-title":"Using magpie for request extraction and workload modelling","volume":"4","author":"barham","year":"2004","journal-title":"OSDI"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2014.6912613"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1029005"},{"key":"ref14","first-page":"217","article-title":"The mystery machine: End-to-end performance analysis of large-scale internet services","author":"chow","year":"2014","journal-title":"OSDI"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405608"},{"journal-title":"Etsy statsd","year":"0","key":"ref16"},{"key":"ref17","first-page":"20","article-title":"X-trace: A pervasive network tracing framework","author":"fonseca","year":"2007","journal-title":"Proceedings of the 4th USENIX Conference on Networked Systems Design & Implementation"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2010.5691343"},{"journal-title":"DeepMind","year":"0","key":"ref19"},{"journal-title":"Arima","year":"0","author":"nau","key":"ref28"},{"journal-title":"Logstash","year":"0","key":"ref4"},{"journal-title":"Monitor","year":"0","key":"ref27"},{"journal-title":"Kibana","year":"0","key":"ref3"},{"journal-title":"ATLAS","year":"2015","key":"ref6"},{"journal-title":"Vector","year":"2016","key":"ref29"},{"journal-title":"OpenTSDB","year":"0","key":"ref5"},{"journal-title":"Autoscaling","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945454"},{"journal-title":"IBM BlueMix","year":"0","key":"ref2"},{"journal-title":"CloudWatch","year":"0","key":"ref9"},{"journal-title":"Elastic Search","year":"0","key":"ref1"},{"journal-title":"Driver stacks","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1889(88)90055-3"},{"journal-title":"Grafana","year":"0","key":"ref21"},{"key":"ref24","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in Neural Information Processing Systems 25"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.165"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005750"}],"event":{"name":"2018 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2018,12,10]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8610059\/8621858\/08622058.pdf?arnumber=8622058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T21:04:50Z","timestamp":1643231090000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8622058\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2018.8622058","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}