{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:12:15Z","timestamp":1773375135494,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icinfa.2015.7279807","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T17:51:38Z","timestamp":1443721898000},"page":"3026-3031","source":"Crossref","is-referenced-by-count":1,"title":["O-MAP: A per-component online anomaly predicting method for Cloud infrastructure"],"prefix":"10.1109","author":[{"given":"Bin","family":"Hong","sequence":"first","affiliation":[]},{"given":"Fuyang","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Yuchao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"328","article-title":"eCAD: Cloud Anomalies Prediction From an Evolutionary View[C]\/\/Cloud Computing and Big Data (CloudCom-Asia)","author":"zhang","year":"2013","journal-title":"2013 International Conference on IEEE"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1016\/j.ndteint.2005.04.003","article-title":"Multi-fault diagnosis of rolling bearing elements using wavelet analysis and hidden Markov model based fault recognition[J]","volume":"38","author":"purushotham","year":"2005","journal-title":"NDT & E International"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2011.01.013"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1670679.1670680"},{"key":"ref14","first-page":"121","article-title":"Predicting traffic in the cloud: A statistical approach[C]\/\/Cloud and Green Computing (CGC)","author":"lopes dalmazo","year":"2013","journal-title":"2013 Third International Conference on IEEE"},{"key":"ref15","author":"sladescu","year":"2012","journal-title":"Event aware workload prediction A study using auction events[M]"},{"key":"ref4","author":"stamp","year":"2004","journal-title":"A revealing introduction to hidden Markov models"},{"key":"ref3","first-page":"18","article-title":"Hidden markov models","author":"blunsom","year":"2004","journal-title":"Lecture notes"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.165"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"ref8","first-page":"285","article-title":"Prepare: Predictive performance anomaly prevention for virtualized cloud systems[C]\/\/Distributed Computing Systems (ICDCS)","author":"tan","year":"2012","journal-title":"2012 IEEE 32nd International Conference on IEEE"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.4"},{"key":"ref2","year":"0","journal-title":"Amazon CloudWatch Developer Guide"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.04.001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2371536.2371572"}],"event":{"name":"2015 IEEE International Conference on Information and Automation (ICIA)","location":"Lijiang, China","start":{"date-parts":[[2015,8,8]]},"end":{"date-parts":[[2015,8,10]]}},"container-title":["2015 IEEE International Conference on Information and Automation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7267673\/7279248\/07279807.pdf?arnumber=7279807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:36:48Z","timestamp":1498235808000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7279807\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icinfa.2015.7279807","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}