{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T14:52:14Z","timestamp":1772463134301,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,18]],"date-time":"2012-09-18T00:00:00Z","timestamp":1347926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,18]]},"DOI":"10.1145\/2371536.2371545","type":"proceedings-article","created":{"date-parts":[[2012,9,25]],"date-time":"2012-09-25T23:48:43Z","timestamp":1348616923000},"page":"43-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Provisioning multi-tier cloud applications using statistical bounds on sojourn time"],"prefix":"10.1145","author":[{"given":"Upendra","family":"Sharma","sequence":"first","affiliation":[{"name":"University of Massachusetts, Amherst, MA, USA"}]},{"given":"Prashant","family":"Shenoy","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, MA, USA"}]},{"given":"Donald F.","family":"Towsley","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,9,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.980028"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2005.50"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/580550.876444"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2006.1662403"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1009151"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/647809.737969"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294281"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of Fourth USENIX Symposium on Internet Technologies and Systems (USITS '03)","author":"Doyle R.","year":"2003","unstructured":"R. Doyle , J. Chase , O. Asad , W. Jin , and A. Vahdat . Model-based resource provisioning in a web service utility . In Proceedings of Fourth USENIX Symposium on Internet Technologies and Systems (USITS '03) , Seattle, WA , March 2003 . R. Doyle, J. Chase, O. Asad, W. Jin, and A. Vahdat. Model-based resource provisioning in a web service utility. In Proceedings of Fourth USENIX Symposium on Internet Technologies and Systems (USITS '03), Seattle, WA, March 2003."},{"key":"e_1_3_2_1_9_1","unstructured":"Haproxy the reliable high performance tcp\/http load balancer. http:\/\/haproxy.1wt.eu\/.  Haproxy the reliable high performance tcp\/http load balancer. http:\/\/haproxy.1wt.eu\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/511334.511345"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1250588"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337024"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02024663"},{"key":"e_1_3_2_1_14_1","unstructured":"Opennebula. http:\/\/www.opennebula.org.  Opennebula. http:\/\/www.opennebula.org."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2002.1006569"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. USENIX Symp. on Networked Systems Design and Implementation (NSDI)","author":"Stewart C.","year":"2005","unstructured":"C. Stewart and K. Shen . Performance Modeling and System Management for Multi-component Online Services . In Proc. USENIX Symp. on Networked Systems Design and Implementation (NSDI) , May 2005 . C. Stewart and K. Shen. Performance Modeling and System Management for Multi-component Online Services. In Proc. USENIX Symp. on Networked Systems Design and Implementation (NSDI), May 2005."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064252"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1342171.1342172"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2004.1309357"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.423"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01182931"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-008-0052-0"}],"event":{"name":"ICAC '12: 9th International Conference on Autonomic Computing","location":"San Jose California USA","acronym":"ICAC '12","sponsor":["University of Arizona University of Arizona","SIGARCH ACM Special Interest Group on Computer Architecture","IEEE"]},"container-title":["Proceedings of the 9th international conference on Autonomic computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2371536.2371545","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2371536.2371545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:22Z","timestamp":1750238482000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2371536.2371545"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,18]]},"references-count":22,"alternative-id":["10.1145\/2371536.2371545","10.1145\/2371536"],"URL":"https:\/\/doi.org\/10.1145\/2371536.2371545","relation":{},"subject":[],"published":{"date-parts":[[2012,9,18]]},"assertion":[{"value":"2012-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}