{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:06:17Z","timestamp":1740171977973,"version":"3.37.3"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2018,10,1]]},"DOI":"10.1109\/tcc.2016.2552516","type":"journal-article","created":{"date-parts":[[2016,4,11]],"date-time":"2016-04-11T18:07:42Z","timestamp":1460398062000},"page":"1164-1177","source":"Crossref","is-referenced-by-count":11,"title":["Stochastic Modeling and Optimization of Stragglers"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7581-1412","authenticated-orcid":false,"given":"Farshid","family":"Farhat","sequence":"first","affiliation":[]},{"given":"Diman","family":"Zad Tootaghaj","sequence":"additional","affiliation":[]},{"given":"Yuxiong","family":"He","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Sivasubramaniam","sequence":"additional","affiliation":[]},{"given":"Mahmut","family":"Kandemir","sequence":"additional","affiliation":[]},{"given":"Chita R.","family":"Das","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/CCGRID.2010.112"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1002\/9781118625651"},{"key":"ref33","first-page":"12","article-title":"Response time approximations in fork-join queues","author":"lebrecht","year":"2007","journal-title":"Proc 23rd Annu UK Perform Eng Workshop"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/s00291-010-0235-y"},{"key":"ref31","first-page":"51","article-title":"How to count: An introduction to combinatorics","author":"allenby","year":"2011"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TSMCA.2003.819490"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1145\/1815961.1816002"},{"key":"ref36","first-page":"145","article-title":"Interpolation approximations for symmetric fork-join queues","volume":"20","author":"makowski","year":"1994","journal-title":"Perform Eval"},{"key":"ref35","article-title":"Numerical methods with applications","author":"kaw","year":"2008","journal-title":"Holistic Numerical Methods Institute"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/1496909.1496921"},{"key":"ref28","first-page":"132","article-title":"On petri nets with deterministic and exponentially distributed firing times","volume":"266","author":"marsan","year":"1987","journal-title":"LNCS Advances in Petri Nets"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/IISWC.2013.6704672"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/INFCOM.1997.631130"},{"key":"ref2","article-title":"Cloud\n analytics: Do we really need to reinvent the storage stack?","author":"ananthanarayanan","year":"2009","journal-title":"Proc of the HotCloud Workshop"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/CloudCom.2010.107"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/2254756.2254761"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1016\/j.peva.2013.08.013"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2591971.2592007"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.14778\/1454159.1454166"},{"key":"ref23","first-page":"21","article-title":"Mapreduce online","author":"condie","year":"2010","journal-title":"Proc 7th USENIX Conf Netw Syst Design Implementation"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/ICDCS.2014.18"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/IISWC.2015.31"},{"year":"2014","author":"farhat","article-title":"Modeling and optimization of straggling mappers","key":"ref50"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.21236\/ADA555881"},{"key":"ref11","first-page":"185","article-title":"Effective straggler mitigation: Attack of\n the clones","author":"ananthanarayanan","year":"2013","journal-title":"Proc 10th Symp Networked Syst Des Implementation"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.21236\/ADA555881"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2150976.2150984"},{"key":"ref13","first-page":"287","article-title":"Scarlett:\n Coping with skewed popularity content in mapreduce clusters","author":"ananthanarayanan","year":"2011","journal-title":"Proc 6th Conf Comput Syst"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1137\/1.9781611973075.76"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/1989323.1989426"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/CCIS.2011.6045080"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ClusterW.2012.24"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.21236\/ADA532848"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/2213836.2213840"},{"year":"2004","author":"dean","article-title":"MapReduce: Simplified data processing on large clusters","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/MITP.2009.40"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1272996.1273005"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/MSST.2010.5496972"},{"key":"ref8","first-page":"265","article-title":"Reining in the outliers in\n map-reduce clusters using Mantri","author":"ananthanarayanan","year":"2010","journal-title":"Proc 9th USENIX Conf Operating Syst Des Implementation"},{"key":"ref7","first-page":"29","article-title":"Improving mapreduce performance in heterogeneous environments","author":"zaharia","year":"2008","journal-title":"Proc 8th USENIX Conf Operating Syst Des Implementation"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1137\/070710111","article-title":"Power-Law distributions in empirical data","volume":"51","author":"clauset","year":"2009","journal-title":"SIAM Rev"},{"year":"2012","author":"ren","article-title":"Hadoop's adolescence: A comparative workload\n analysis from three research clusters","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1017\/S0305004100036094"},{"year":"1984","author":"lazowska","journal-title":"Quantitative System Performance Computer System Analysis Using Queueing Network Models","key":"ref45"},{"year":"0","key":"ref48"},{"year":"0","key":"ref47"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1002\/hyp.6602"},{"key":"ref41","first-page":"289","article-title":"GRASS: Trimming stragglers in approximation analytics","author":"ananthanarayanan","year":"2014","journal-title":"Proc USENIX Symp Networked Systems Design Implementation"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1145\/2408776.2408794"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1145\/1851275.1851192"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/8558660\/07450631.pdf?arnumber=7450631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T04:22:44Z","timestamp":1643257364000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7450631\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,1]]},"references-count":50,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2016.2552516","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"type":"electronic","value":"2168-7161"},{"type":"electronic","value":"2372-0018"}],"subject":[],"published":{"date-parts":[[2018,10,1]]}}}