{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:20:56Z","timestamp":1759033256885,"version":"3.41.0"},"reference-count":75,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2008,7,1]],"date-time":"2008-07-01T00:00:00Z","timestamp":1214870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2008,7]]},"abstract":"<jats:p>Efficient management of distributed Web-based systems requires several mechanisms that decide on request dispatching, load balance, admission control, request redirection. The algorithms behind these mechanisms typically make fast decisions on the basis of the load conditions of the system resources. The architecture complexity and workloads characterizing most Web-based services make it extremely difficult to deduce a representative view of a resource load from collected measures that show extreme variability even at different time scales. Hence, any decision based on instantaneous or average views of the system load may lead to useless or even wrong actions. As an alternative, we propose a two-phase strategy that first aims to obtain a representative view of the load trend from measured system values and then applies this representation to support runtime decision systems. We consider two classical problems behind decisions: how to detect significant and nontransient load changes of a system resource and how to predict its future load behavior. The two-phase strategy is based on stochastic functions that are characterized by a computational complexity that is compatible with runtime decisions. We describe, test, and tune the two-phase strategy by considering as a first example a multitier Web-based system that is subject to different classes of realistic and synthetic workloads. Also, we integrate the proposed strategy into a framework that we validate by applying it to support runtime decisions in a cluster Web system and in a locally distributed Network Intrusion Detection System.<\/jats:p>","DOI":"10.1145\/1377488.1377491","type":"journal-article","created":{"date-parts":[[2008,7,8]],"date-time":"2008-07-08T16:02:15Z","timestamp":1215532935000},"page":"1-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Models and framework for supporting runtime decisions in Web-based systems"],"prefix":"10.1145","volume":"2","author":[{"given":"Mauro","family":"Andreolini","sequence":"first","affiliation":[{"name":"University of Modena and Reggio Emilia, Modena, Italy"}]},{"given":"Sara","family":"Casolari","sequence":"additional","affiliation":[{"name":"University of Modena and Reggio Emilia, Modena, Italy"}]},{"given":"Michele","family":"Colajanni","sequence":"additional","affiliation":[{"name":"University of Modena and Reggio Emilia, Modena, Italy"}]}],"member":"320","published-online":{"date-parts":[[2008,7,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.980028"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190095.1190129"},{"volume-title":"Proceedings of 12th International World Wide Web Conf. (WWW'03)","author":"Andreolini M.","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","unstructured":"Apache. 1999. Apache HTTP server project. http:\/\/www.apache.org.]]  Apache. 1999. Apache HTTP server project. http:\/\/www.apache.org.]]"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/383034.383036"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2005.45"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/277851.277897"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCW.2005.17"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2004.10.003"},{"key":"e_1_2_1_10_1","unstructured":"Box G. Jenkins G. and Reinsel G. 1994. Time Series Analysis Forecasting and Control. Prentice Hall.]]   Box G. Jenkins G. and Reinsel G. 1994. Time Series Analysis Forecasting and Control. Prentice Hall.]]"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/17326"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.855480"},{"volume-title":"Proceedings of the 7th International Symposium on High-Performance Computer Architecture (HPCA'01)","author":"Cain H. W.","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Canali C. Xiao Z. and Rabinovich M. 2004. Utility computing for Internet applications. In Web Content Delivery X. Tang J. Xu and S. Chanson Eds. Vol. 2. Springer Verlag 131--151.]]  Canali C. Xiao Z. and Rabinovich M. 2004. Utility computing for Internet applications. In Web Content Delivery X. Tang J. Xu and S. Chanson Eds. Vol. 2. Springer Verlag 131--151.]]","DOI":"10.1007\/0-387-27727-7_6"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/508352.508355"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2003.1195408"},{"volume-title":"Proceedings of the 8th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS'00)","author":"Cardellini V.","key":"e_1_2_1_17_1"},{"volume-title":"Proceedings of the International Conference on Control Applications (CCA'99)","author":"Castro M.","key":"e_1_2_1_18_1"},{"volume-title":"Proceedings of the 4th Middleware Conference. Rio de Janeiro, Brazil.]]","author":"Cecchet E.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.826289"},{"volume-title":"Proceedings of the 21th IEEE International Conference on Computer Communications (INFOCOM'02)","author":"Chen H.","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(03)00178-6"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1084772.1084776"},{"volume-title":"Proceedings of the 7th International Workshop on Quality of Service (IWQoS'99)","author":"Cherkasova L.","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1009151"},{"volume-title":"Proceedings of the 16th IEEE International Conference on Communications (ICC'03)","author":"Choi B.","key":"e_1_2_1_26_1"},{"volume-title":"Proceedings of the IEEE\/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM'06)","author":"Colajanni M.","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","unstructured":"Crovella M. E. Taqqu M. S. and Bestavros A. 1998. Heavy-tailed probability distributions in the World Wide Web. In A Practical Guide To Heavy Tails. Chapman and Hall 3--26.]]   Crovella M. E. Taqqu M. S. and Bestavros A. 1998. Heavy-tailed probability distributions in the World Wide Web. In A Practical Guide To Heavy Tails. Chapman and Hall 3--26.]]"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.888643"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019048724544"},{"volume-title":"Proceedings of the 27th International Computer Measurement Group Conference","author":"Dodge R. C.","key":"e_1_2_1_31_1"},{"volume-title":"Proceedings of the 19th IEEE International Conference on Computer Communications (INFOCOM'00)","author":"Duffield N. G.","key":"e_1_2_1_32_1"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988710"},{"key":"e_1_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Eubank R. L. and Eubank E. 1999. Non parametric regression and spline smoothing. CRC Press.]]  Eubank R. L. and Eubank E. 1999. Non parametric regression and spline smoothing. CRC Press.]]","DOI":"10.1201\/9781482273144"},{"volume-title":"Proceedings of the 12th IFIP WG 7.3 International Symposium on Computer Performance Modeling, Measurement and Evaluation (PERFORMANCE'87)","author":"Ferrari D.","key":"e_1_2_1_35_1"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138464.1138467"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.944338"},{"key":"e_1_2_1_38_1","unstructured":"Forsythe G. E. Malcolm M. A. and Moler C. B. 1977. Computer Methods for Mathematical Computations. Prentice-Hall.]]   Forsythe G. E. Malcolm M. A. and Moler C. B. 1977. Computer Methods for Mathematical Computations. Prentice-Hall.]]"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.421.0005"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.13"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/645609.662636"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511485"},{"volume-title":"Proceedings of the 12th International Workshop on Quality of Service (IWQOS'04)","author":"Kamra A.","key":"e_1_2_1_43_1"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564773"},{"volume-title":"Proceedings of the USENIX Workshop on Real, Large Distributed Systems (WORLDS'05)","year":"2005","author":"Kelly T.","key":"e_1_2_1_45_1"},{"key":"e_1_2_1_46_1","unstructured":"Kendall M. and Ord J. 1990. Time Series. Oxford University Press.]]  Kendall M. and Ord J. 1990. Time Series. Oxford University Press.]]"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Lilja D. J. 2000. Measuring Computer Performance. A Practitioner's Guide. Cambridge University Press.]]   Lilja D. J. 2000. Measuring Computer Performance. A Practitioner's Guide. Cambridge University Press.]]","DOI":"10.1017\/CBO9780511612398"},{"volume-title":"Proceedings of the 8th International Parallel and Distributed Processing Symposium (IPDPS'03)","author":"Lingyun Y.","key":"e_1_2_1_49_1"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/645838.670722"},{"volume-title":"Proceedings of the 37th IEEE Winter Simulation Conference (WSC'05)","author":"Luo S.","key":"e_1_2_1_51_1"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2007.11"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.824633"},{"key":"e_1_2_1_54_1","unstructured":"MySQL 2005. MySQL Database server. http:\/\/www.mysql.com\/.]]  MySQL 2005. MySQL Database server. http:\/\/www.mysql.com\/.]]"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/291069.291048"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/277697.277742"},{"volume-title":"Proceedings of the 6th Conference on Protocols for Multimedia systems (PROMS'01)","author":"Pierre G.","key":"e_1_2_1_57_1"},{"key":"e_1_2_1_58_1","article-title":"Piecewise regression using cubic spline","volume":"68","author":"Poirier D. J.","year":"1973","journal-title":"J. Amer. Statist. Ass."},{"volume-title":"Proceedings of the 10th International Workshop on Quality of Service (IWQOS'02)","author":"Pradhan P.","key":"e_1_2_1_59_1"},{"volume-title":"Proceedings of the 9th IEEE Global Internet Symposium","author":"Rabinovich M.","key":"e_1_2_1_60_1"},{"volume-title":"Proceedings of the 8th International Workshop of Web Content Caching and Distribution (WCW'03)","author":"Rabinovich M.","key":"e_1_2_1_61_1"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.774906"},{"volume-title":"Proceedings of the 19th IEEE International Conference on Computer Communications (INFOCOM'00)","author":"Sang A.","key":"e_1_2_1_63_1"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266708"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1035570.1035573"},{"key":"e_1_2_1_66_1","unstructured":"SpecWEB05 2005. The SPECWeb05 benchmark. http:\/\/www.spec.org\/osg\/web2005\/.]]  SpecWEB05 2005. The SPECWeb05 benchmark. http:\/\/www.spec.org\/osg\/web2005\/.]]"},{"key":"e_1_2_1_67_1","unstructured":"SpecWEB96 1996. The SPECWeb96 benchmark. http:\/\/www.spec.org\/osg\/web96\/.]]  SpecWEB96 1996. The SPECWeb96 benchmark. http:\/\/www.spec.org\/osg\/web96\/.]]"},{"key":"e_1_2_1_68_1","first-page":"199","article-title":"Simulations of three adaptive, decentralized controlled, job scheduling algorithms","volume":"8","author":"Stankovic J. A.","year":"1984","journal-title":"Comput. Netw."},{"key":"e_1_2_1_69_1","unstructured":"Tomcat 2005. The Tomcat Servlet Engine. http:\/\/jakarta.apache.org\/tomcat\/.]]  Tomcat 2005. The Tomcat Servlet Engine. http:\/\/jakarta.apache.org\/tomcat\/.]]"},{"key":"e_1_2_1_70_1","unstructured":"TPC-W 2004. TPC-W transactional Web e-commerce benchmark. http:\/\/www.tpc.org\/tpcw\/.]]  TPC-W 2004. TPC-W transactional Web e-commerce benchmark. http:\/\/www.tpc.org\/tpcw\/.]]"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.1271185"},{"key":"e_1_2_1_72_1","unstructured":"Utts J. M. 2004. Seeing Through Statistics. Thomson Brooks\/Cole.]]  Utts J. M. 2004. Seeing Through Statistics. Thomson Brooks\/Cole.]]"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2005.63"},{"volume-title":"Proceedings of the International Conference on Computer Graphics","author":"Wolber G.","key":"e_1_2_1_74_1"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(99)00025-4"}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1377488.1377491","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1377488.1377491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:55Z","timestamp":1750255075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1377488.1377491"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":75,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,7]]}},"alternative-id":["10.1145\/1377488.1377491"],"URL":"https:\/\/doi.org\/10.1145\/1377488.1377491","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"type":"print","value":"1559-1131"},{"type":"electronic","value":"1559-114X"}],"subject":[],"published":{"date-parts":[[2008,7]]},"assertion":[{"value":"2007-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}