{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:06:26Z","timestamp":1740171986975,"version":"3.37.3"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1617046","1717588","1730128"],"award-info":[{"award-number":["1617046","1717588","1730128"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004316","name":"International Business Machines Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004316","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2020,1,1]]},"DOI":"10.1109\/tcc.2017.2771402","type":"journal-article","created":{"date-parts":[[2017,11,10]],"date-time":"2017-11-10T19:20:14Z","timestamp":1510341614000},"page":"269-281","source":"Crossref","is-referenced-by-count":14,"title":["Providing Performance Guarantees for Cloud-Deployed Applications"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2351-6523","authenticated-orcid":false,"given":"Anshul","family":"Gandhi","sequence":"first","affiliation":[]},{"given":"Parijat","family":"Dube","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1836-959X","authenticated-orcid":false,"given":"Alexei","family":"Karve","sequence":"additional","affiliation":[]},{"given":"Andrzej","family":"Kochut","sequence":"additional","affiliation":[]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/0470045345"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SBAC-PAD.2014.16"},{"year":"0","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1555228.1555263"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.55"},{"key":"ref30","first-page":"217","article-title":"The mystery machine: End-to-end performance analysis of large-scale internet services","author":"chow","year":"2014","journal-title":"Proc 11th USENIX Symp Operating Syst Des Implementation"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1035167.1035193"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2007.51"},{"journal-title":"An Introduction to Queueing Networks","year":"1988","author":"walrand","key":"ref35"},{"key":"ref34","article-title":"Parameter estimation for performance models of distributed application systems","author":"rolia","year":"1995","journal-title":"Proc Conf Centre Adv Stud Collaborative Res"},{"article-title":"Auto-scaling techniques for elastic applications in cloud environments","year":"2012","author":"lorido-botr","key":"ref60"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2006.1662396"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2930659"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.30"},{"year":"0","key":"ref28"},{"key":"ref64","first-page":"29","article-title":"K-scope: Online performance tracking for dynamic cloud applications","author":"zhang","year":"2013","journal-title":"Proc 10th Int Conf Autonomic Comput"},{"year":"0","key":"ref27","article-title":"Chef."},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1555228.1555261"},{"year":"0","key":"ref66","article-title":"VMware vFabric AppInsight."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038921"},{"year":"0","key":"ref67","article-title":"How to scale an application."},{"year":"0","key":"ref68","article-title":"Auto scaling on the Google cloud platform."},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1326561.1326569"},{"year":"0","key":"ref2","article-title":"Internap public cloud survey reveals performance as top challenge for cloud-wise organizations."},{"year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IGCC.2011.6008611"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2014.2304865"},{"year":"0","key":"ref21"},{"year":"0","key":"ref24"},{"year":"0","key":"ref23"},{"year":"0","key":"ref26"},{"year":"0","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838238"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.857208"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2006.1662383"},{"key":"ref58","article-title":"Scaling of cloud applications using machine learning","author":"padala","year":"2014","journal-title":"VMware Technical Journal"},{"key":"ref57","first-page":"67","article-title":"Using reinforcement learning for autonomic resource allocation in clouds: Towards a fully automated workflow","author":"dutreilh","year":"2011","journal-title":"Proc 7th Int Conf Autonomic Auton Syst"},{"article-title":"Automating datacenter operations using machine learning.","year":"2010","author":"bodik","key":"ref56"},{"key":"ref55","first-page":"163","article-title":"The SCADS director: Scaling a distributed storage system under stringent performance requirements","author":"trushkowsky","year":"2011","journal-title":"Proc 9th USENIX Conf File Storage Technol"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541941"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1988008.1988021"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2014.29"},{"year":"0","key":"ref10"},{"key":"ref11","first-page":"219","article-title":"DeepDive: Transparently identifying and managing performance interference in virtualized environments","author":"novakovi?","year":"2013","journal-title":"Proc USENIX Conf Annu Tech Conf"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-0346-0433-8_3"},{"key":"ref12","first-page":"20","article-title":"Modeling the parallel execution of black-box services","author":"mann","year":"2011","journal-title":"Proc 3rd USENIX Conf Hot Topics Cloud Comput"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1851290.1851294"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2382553.2382556"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2005.27"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064252"},{"key":"ref17","first-page":"69","article-title":"AGILE: Elastic distributed resource scaling for infrastructure-as-a-service","author":"nguyen","year":"2013","journal-title":"Proc 10th Int Conf Autonomic Comput"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2371536.2371567"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.42"},{"year":"2012","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1730836.1730842"},{"year":"0","key":"ref6"},{"year":"2013","key":"ref5","article-title":"Cloud service provider (CSP) and inbound marketing."},{"year":"0","key":"ref8"},{"year":"0","key":"ref7","article-title":"Auto-scaling arrays."},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2479871.2479899"},{"year":"0","key":"ref9","article-title":"Rackspace cloud monitoring."},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408794"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1137\/0145007"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/BF01182931"},{"year":"0","key":"ref42","article-title":"WITS: Waikato internet traffic storage."},{"year":"0","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2526-1"},{"year":"0","key":"ref43","article-title":"The internet traffic archives: WorldCup98."}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6245519\/9027016\/8103799-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/9027016\/08103799.pdf?arnumber=8103799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:23:20Z","timestamp":1651080200000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8103799\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":69,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2017.2771402","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"type":"electronic","value":"2168-7161"},{"type":"electronic","value":"2372-0018"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}