{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T01:39:57Z","timestamp":1769305197656,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,15]],"date-time":"2009-06-15T00:00:00Z","timestamp":1245024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,15]]},"DOI":"10.1145\/1555228.1555270","type":"proceedings-article","created":{"date-parts":[[2009,9,25]],"date-time":"2009-09-25T19:39:18Z","timestamp":1253907558000},"page":"179-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["NAP"],"prefix":"10.1145","author":[{"given":"Muli","family":"Ben-Yehuda","sequence":"first","affiliation":[{"name":"IBM Haifa Research Lab, Haifa, Israel"}]},{"given":"David","family":"Breitgand","sequence":"additional","affiliation":[{"name":"IBM Haifa Research Lab, Haifa, Israel"}]},{"given":"Michael","family":"Factor","sequence":"additional","affiliation":[{"name":"IBM Haifa Research Lab, Haifa, Israel"}]},{"given":"Hillel","family":"Kolodner","sequence":"additional","affiliation":[{"name":"IBM Haifa Research Lab, Haifa, Israel"}]},{"given":"Valentin","family":"Kravtsov","sequence":"additional","affiliation":[{"name":"Technion, Israel Institute of Technology, Haifa, Israel"}]},{"given":"Dan","family":"Pelleg","sequence":"additional","affiliation":[{"name":"Haifa Research Lab, Haifa, Israel"}]}],"member":"320","published-online":{"date-parts":[[2009,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The Amazon Elastic Compute Cloud (Amazon EC2) web site. http:\/\/aws.amazon.com\/ec2.  The Amazon Elastic Compute Cloud (Amazon EC2) web site. http:\/\/aws.amazon.com\/ec2."},{"key":"e_1_3_2_1_2_1","unstructured":"Gogrid. http:\/\/www.gogrid.com.  Gogrid. http:\/\/www.gogrid.com."},{"key":"e_1_3_2_1_3_1","unstructured":"VMWare B-Hive. http:\/\/www.bhive.net\/.  VMWare B-Hive. http:\/\/www.bhive.net\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2001.918085"},{"key":"e_1_3_2_1_5_1","first-page":"C3954","volume":"9","author":"Claise B.","year":"2004","unstructured":"B. Claise , Ed. Cisco Systems NetFlow Services Export Version 9 , RF C3954 , Oct 2004 . B. Claise, Ed. Cisco Systems NetFlow Services Export Version 9, RFC3954, Oct 2004.","journal-title":"Ed. Cisco Systems NetFlow Services Export Version"},{"key":"e_1_3_2_1_6_1","volume-title":"RFC5101","author":"Claise B.","year":"2008","unstructured":"B. Claise , Ed. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information , RFC5101 , Jan 2008 . B. Claise, Ed. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information, RFC5101, Jan 2008."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_8_1","volume-title":"IFIP\/IEEE IM'09","author":"Breitgand D.","unstructured":"D. Breitgand , M. Goldstein , E. Henis , and O. Shehory . Reducing Levels of Negative and Positive False Alarms via Multiple Adaptive Thresholds . In IFIP\/IEEE IM'09 , to appear, June 2009. D. Breitgand, M. Goldstein, E. Henis, and O. Shehory. Reducing Levels of Negative and Positive False Alarms via Multiple Adaptive Thresholds. In IFIP\/IEEE IM'09, to appear, June 2009."},{"key":"e_1_3_2_1_9_1","first-page":"16","volume-title":"OSDI'04","author":"Cohen I.","year":"2004","unstructured":"I. Cohen , M. Goldszmidt , T. Kelly , J. Symons , and J. S. Chase . Correlating instrumentation data to system states: a building block for automated diagnosis and control . In OSDI'04 , pages 16 -- 16 , Berkeley, CA, USA , 2004 . USENIX Association. I. Cohen, M. Goldszmidt, T. Kelly, J. Symons, and J. S. Chase. Correlating instrumentation data to system states: a building block for automated diagnosis and control. In OSDI'04, pages 16--16, Berkeley, CA, USA, 2004. USENIX Association."},{"key":"e_1_3_2_1_10_1","unstructured":"J. Coleman and T. Lau. Set up and run a Trade6 benchmark with DB2 UDB - IBM tutorial. http:\/\/www.ibm.com\/developerworks\/edu\/dm-dw-dm-0506lau.html.  J. Coleman and T. Lau. Set up and run a Trade6 benchmark with DB2 UDB - IBM tutorial. http:\/\/www.ibm.com\/developerworks\/edu\/dm-dw-dm-0506lau.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Distributed Systems Architecture Group at Universidad Complutense de Madrid. OpenNebula 2008.  Distributed Systems Architecture Group at Universidad Complutense de Madrid. OpenNebula 2008."},{"key":"e_1_3_2_1_12_1","volume-title":"The 12-th Annual Conference on Neural Information Processing Systems (NIPS)","author":"Feng Y.","year":"2006","unstructured":"Y. Feng , G. Hamerly , and C. Elkan . PG-means: learning the number of clusters in data . In The 12-th Annual Conference on Neural Information Processing Systems (NIPS) , 2006 . Y. Feng, G. Hamerly, and C. Elkan. PG-means: learning the number of clusters in data. In The 12-th Annual Conference on Neural Information Processing Systems (NIPS), 2006."},{"key":"e_1_3_2_1_13_1","first-page":"281","volume-title":"The 7th Annual Conference on Neural Information Processing Systems (NIPS)","author":"Hamerly Greg","year":"2003","unstructured":"Greg Hamerly and Charles Elkan . Learning the k in k-means. In The 7th Annual Conference on Neural Information Processing Systems (NIPS) , pages 281 -- 288 , 2003 . Greg Hamerly and Charles Elkan. Learning the k in k-means. In The 7th Annual Conference on Neural Information Processing Systems (NIPS), pages 281--288, 2003."},{"key":"e_1_3_2_1_15_1","first-page":"596","volume-title":"AAAI'00","author":"Hellerstein J.","year":"2000","unstructured":"J. Hellerstein , T. Jayram , and I. Rish . Recognizing end-user transactions in performance management . In AAAI'00 , pages 596 -- 602 , Menlo Park, CA , USA, 2000 . AAAI Press J. Hellerstein, T. Jayram, and I. Rish. Recognizing end-user transactions in performance management. In AAAI'00, pages 596--602, Menlo Park, CA, USA, 2000. AAAI Press"},{"key":"e_1_3_2_1_16_1","volume-title":"IBM Research","author":"Kato S.","year":"2007","unstructured":"S. Kato , T. Yamane , and T. Noagayama . Automated performance problem determination by observing service demand. Technical report , IBM Research , Tokyo Research Lab , 2007 . S. Kato, T. Yamane, and T. Noagayama. Automated performance problem determination by observing service demand. Technical report, IBM Research, Tokyo Research Lab, 2007."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080118"},{"key":"e_1_3_2_1_18_1","volume-title":"A Proof of the Queuing Formula L = l W. Operations Research, 9(383--387)","author":"J. D.","year":"1961","unstructured":"Little, J. D. C. A Proof of the Queuing Formula L = l W. Operations Research, 9(383--387) , 1961 . Little, J. D. C. A Proof of the Queuing Formula L = l W. Operations Research, 9(383--387), 1961."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370018.1370032"},{"key":"e_1_3_2_1_20_1","volume-title":"Real-Time Analysis of Flow Data for Network Attack Detection. In IFIP\/IEEE IM'07","author":"M\u00fcnz G.","year":"2007","unstructured":"G. M\u00fcnz and G. Carle . Real-Time Analysis of Flow Data for Network Attack Detection. In IFIP\/IEEE IM'07 , May 2007 . G. M\u00fcnz and G. Carle. Real-Time Analysis of Flow Data for Network Attack Detection. In IFIP\/IEEE IM'07, May 2007."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341312.1341319"},{"key":"e_1_3_2_1_22_1","first-page":"727","volume-title":"ICMLA'00","author":"Pelleg D.","year":"2000","unstructured":"D. Pelleg and A. Moore . X-means: Extending K-means with efficient estimation of the number of clusters . In ICMLA'00 , pages 727 -- 734 , San Francisco , 2000 . Morgan Kaufmann. D. Pelleg and A. Moore. X-means: Extending K-means with efficient estimation of the number of clusters. In ICMLA'00, pages 727--734, San Francisco, 2000. Morgan Kaufmann."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1850659.1850663"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605403"},{"key":"e_1_3_2_1_25_1","unstructured":"The Open Group. Application Response Measurement -- ARM 4.0 Version 2. http:\/\/www.opengroup.org\/management\/arm\/ 2007.  The Open Group. Application Response Measurement -- ARM 4.0 Version 2. http:\/\/www.opengroup.org\/management\/arm\/ 2007."},{"key":"e_1_3_2_1_26_1","first-page":"229","volume-title":"Black-box and Gray-box Strategies for Virtual Machine Migration. In USENIX NSDI'07","author":"Wood T.","year":"2007","unstructured":"T. Wood , P. Shenoy , V. Arun , and Y. Mazin . Black-box and Gray-box Strategies for Virtual Machine Migration. In USENIX NSDI'07 , pages 229 -- 242 , 2007 . T. Wood, P. Shenoy, V. Arun, and Y. Mazin. Black-box and Gray-box Strategies for Virtual Machine Migration. In USENIX NSDI'07, pages 229--242, 2007."}],"event":{"name":"ICAC '09: 6th International Conference on Autonomic Computing","location":"Barcelona Spain","acronym":"ICAC '09","sponsor":["ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 6th international conference on Autonomic computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1555228.1555270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1555228.1555270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:03Z","timestamp":1750249383000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1555228.1555270"}},"subtitle":["a building block for remediating performance bottlenecks via black box network analysis"],"short-title":[],"issued":{"date-parts":[[2009,6,15]]},"references-count":25,"alternative-id":["10.1145\/1555228.1555270","10.1145\/1555228"],"URL":"https:\/\/doi.org\/10.1145\/1555228.1555270","relation":{},"subject":[],"published":{"date-parts":[[2009,6,15]]},"assertion":[{"value":"2009-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}