{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T02:59:56Z","timestamp":1773284396466,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,8,21]],"date-time":"2005-08-21T00:00:00Z","timestamp":1124582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,8,21]]},"DOI":"10.1145\/1081870.1081976","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T17:34:39Z","timestamp":1131384879000},"page":"801-807","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Short term performance forecasting in enterprise systems"],"prefix":"10.1145","author":[{"given":"Rob","family":"Powers","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA"}]},{"given":"Moises","family":"Goldszmidt","sequence":"additional","affiliation":[{"name":"Hewlett Packard Research Labs, Palo Alto, CA"}]},{"given":"Ira","family":"Cohen","sequence":"additional","affiliation":[{"name":"Hewlett Packard Research Labs, Palo Alto, CA"}]}],"member":"320","published-online":{"date-parts":[[2005,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"OSDI","author":"Barham P.","year":"2004","unstructured":"P. Barham , R. Isaacs , and R. Mortier . Using magpie for request extraction and workload modeling . In OSDI , 2004 . P. Barham, R. Isaacs, and R. Mortier. Using magpie for request extraction and workload modeling. In OSDI, 2004."},{"key":"e_1_3_2_1_2_1","unstructured":"G.\n      Box G.\n      Jenkins and \n      G.\n      Reinsel\n  . \n  Time Series Analysis: Forecasting and Control (3rd Edition)\n  . \n  Prentice-Hall Engineering 1994\n  .   G. Box G. Jenkins and G. Reinsel. Time Series Analysis: Forecasting and Control (3rd Edition). Prentice-Hall Engineering 1994."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/647883.738238"},{"key":"e_1_3_2_1_4_1","volume-title":"OSDI","author":"Cohen I.","year":"2004","unstructured":"I. Cohen , M. Goldszmidt , T. Kelly , J. Symons , and J. Chase . Correlating instrumentation data to system states: A building block for automated diagnosis and control . In OSDI , 2004 . I. Cohen, M. Goldszmidt, T. Kelly, J. Symons, and J. Chase. Correlating instrumentation data to system states: A building block for automated diagnosis and control. In OSDI, 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007413511361"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0603-54"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007465528199"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the computer measurement group","author":"Hellerstein J.","year":"1998","unstructured":"J. Hellerstein , F. Zhang , and P. Shahabuddin . Characterizing normal operation of a web server: application to workload forecasting and proble detection . In Proceedings of the computer measurement group , 1998 . J. Hellerstein, F. Zhang, and P. Shahabuddin. Characterizing normal operation of a web server: application to workload forecasting and proble detection. In Proceedings of the computer measurement group, 1998."},{"key":"e_1_3_2_1_9_1","unstructured":"Hewlett-Packard Company. HP OpenView Management software. www.managementsoftware.hp.com\/products\/.  Hewlett-Packard Company. HP OpenView Management software. www.managementsoftware.hp.com\/products\/."},{"key":"e_1_3_2_1_10_1","unstructured":"IBM. IBM Tivoli management software. http:\/\/www-306.ibm.com\/software\/tivoli\/.  IBM. IBM Tivoli management software. http:\/\/www-306.ibm.com\/software\/tivoli\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014102"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00043-X"},{"key":"e_1_3_2_1_14_1","volume-title":"System Identification: Theory for the User","author":"Ljung L.","year":"1987","unstructured":"L. Ljung . System Identification: Theory for the User . Prentice-Hall , 1987 . L. Ljung. System Identification: Theory for the User. Prentice-Hall, 1987."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/306225.306235"},{"key":"e_1_3_2_1_16_1","volume-title":"Applied Linear Statistical Models","author":"Neter J.","year":"1996","unstructured":"J. Neter , M. Kutner , C. Nachtshein , and W. Wasserman . Applied Linear Statistical Models . McGraw-Hill , 1996 . J. Neter, M. Kutner, C. Nachtshein, and W. Wasserman. Applied Linear Statistical Models. McGraw-Hill, 1996."},{"key":"e_1_3_2_1_17_1","volume-title":"Morgan Kaufmann","author":"Pearl J.","year":"1988","unstructured":"J. Pearl . Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference . Morgan Kaufmann , 1988 . J. Pearl. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, 1988."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956799"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.44"}],"event":{"name":"KDD05: The Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Chicago Illinois USA","acronym":"KDD05","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1081870.1081976","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1081870.1081976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:18:46Z","timestamp":1750263526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1081870.1081976"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,8,21]]},"references-count":19,"alternative-id":["10.1145\/1081870.1081976","10.1145\/1081870"],"URL":"https:\/\/doi.org\/10.1145\/1081870.1081976","relation":{},"subject":[],"published":{"date-parts":[[2005,8,21]]},"assertion":[{"value":"2005-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}