{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:52Z","timestamp":1750307932156,"version":"3.41.0"},"reference-count":12,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["1720X04"],"award-info":[{"award-number":["1720X04"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMETRICS Perform. Eval. Rev."],"published-print":{"date-parts":[[2007,12]]},"abstract":"<jats:p>In recent years, enterprise applications faced an ever growing complexity of business processes as well as an increase in the number of interacting hardware and software components. The ability to efficiently manage their IT infrastructure up to the application level is therefore critical to a company's success and results in rising importance of Service Level Management (SLM) technologies [6, 10]. As a prerequisite for application management, monitoring and instrumentation techniques face growing interest. Depending on the criticality of an application, monitoring can either be based on statistical samples, or can require monitoring of each request handled by the system, e.g. for validation or verification purposes. While most enterprise applications belong to the first category, air traffic control scenarios are an example for the second category. Here, even a statistically small number of slow requests may result in dangerous situations or fatal accidents.<\/jats:p>","DOI":"10.1145\/1328690.1328701","type":"journal-article","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T18:20:10Z","timestamp":1199384410000},"page":"28-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["eMIVA"],"prefix":"10.1145","volume":"35","author":[{"given":"Kai","family":"Engels","sequence":"first","affiliation":[{"name":"Deutsche Flugsicherung GmbH (DFS), Langen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ralf","family":"Heidger","sequence":"additional","affiliation":[{"name":"Deutsche Flugsicherung GmbH (DFS), Langen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reinhold","family":"Kroeger","sequence":"additional","affiliation":[{"name":"Wiesbaden University of Applied Sciences, Wiesbaden, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Morris","family":"Milekovic","sequence":"additional","affiliation":[{"name":"Deutsche Flugsicherung GmbH (DFS), Langen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jan","family":"Schaefer","sequence":"additional","affiliation":[{"name":"Wiesbaden University of Applied Sciences, Wiesbaden, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Markus","family":"Schmid","sequence":"additional","affiliation":[{"name":"Wiesbaden University of Applied Sciences, Wiesbaden, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcus","family":"Thoss","sequence":"additional","affiliation":[{"name":"tang-IT Consulting GmbH, Wiesbaden, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2007,12]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_1_1_1","DOI":"10.1145\/945445.945454"},{"key":"e_1_2_1_2_1","volume-title":"Using Magpie for Request Extraction and Workload Modelling. In Symp. on Operating Systems Design and Implementation (OSDI)","author":"Barham P. T.","year":"2004","unstructured":"P. T. Barham , A. Donnelly , R. Isaacs , and R. Mortier . Using Magpie for Request Extraction and Workload Modelling. In Symp. on Operating Systems Design and Implementation (OSDI) , 2004 . P. T. Barham, A. Donnelly, R. Isaacs, and R. Mortier. Using Magpie for Request Extraction and Workload Modelling. In Symp. on Operating Systems Design and Implementation (OSDI), 2004."},{"doi-asserted-by":"publisher","key":"e_1_2_1_3_1","DOI":"10.5555\/647883.738238"},{"key":"e_1_2_1_4_1","volume-title":"European Journal of Navigation","author":"Heidger R.","year":"2006","unstructured":"R. Heidger . A new generation RDP fallback system in the DFS . European Journal of Navigation , Sept. 2006 , 2006. R. Heidger. A new generation RDP fallback system in the DFS. European Journal of Navigation, Sept. 2006, 2006."},{"key":"e_1_2_1_5_1","first-page":"473","volume-title":"Int. CMG Conf.","author":"Johnson M. W.","year":"2004","unstructured":"M. W. Johnson . Monitoring and Diagnosing Applications with ARM 4.0 . In Int. CMG Conf. , pages 473 -- 484 . Computer Measurement Group , 2004 . M. W. Johnson. Monitoring and Diagnosing Applications with ARM 4.0. In Int. CMG Conf., pages 473--484. Computer Measurement Group, 2004."},{"key":"e_1_2_1_6_1","volume-title":"Service Level Management for Enterprise Networks","author":"Lewis L.","year":"1999","unstructured":"L. Lewis . Service Level Management for Enterprise Networks . Artech House Publishers , 1999 . L. Lewis. Service Level Management for Enterprise Networks. Artech House Publishers, 1999."},{"doi-asserted-by":"publisher","key":"e_1_2_1_7_1","DOI":"10.1109\/2.774920"},{"key":"e_1_2_1_8_1","volume-title":"Application Response Measurement -- ARM","author":"The Open Group","year":"2006","unstructured":"The Open Group . Application Response Measurement -- ARM , 2006 . The Open Group. Application Response Measurement -- ARM, 2006."},{"doi-asserted-by":"publisher","key":"e_1_2_1_9_1","DOI":"10.1007\/11773887_13"},{"key":"e_1_2_1_10_1","volume-title":"Foundations of Service Level Management","author":"Sturm R.","year":"2000","unstructured":"R. Sturm , W. Morris , and M. Jander . Foundations of Service Level Management . SAMS Publishing , April 2000 . R. Sturm, W. Morris, and M. Jander. Foundations of Service Level Management. SAMS Publishing, April 2000."},{"unstructured":"C. Weimer. IDE-gestuetzte Generierung von Quellcode zur Instrumentierung von Anwendungen April 2005. in German.  C. Weimer. IDE-gestuetzte Generierung von Quellcode zur Instrumentierung von Anwendungen April 2005. in German.","key":"e_1_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_12_1","DOI":"10.1145\/1217935.1217972"}],"container-title":["ACM SIGMETRICS Performance Evaluation Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1328690.1328701","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1328690.1328701","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:58Z","timestamp":1750258318000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1328690.1328701"}},"subtitle":["tool support for the instrumentation of critical distributed applications"],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,12]]}},"alternative-id":["10.1145\/1328690.1328701"],"URL":"https:\/\/doi.org\/10.1145\/1328690.1328701","relation":{},"ISSN":["0163-5999"],"issn-type":[{"type":"print","value":"0163-5999"}],"subject":[],"published":{"date-parts":[[2007,12]]},"assertion":[{"value":"2007-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}