{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T23:28:09Z","timestamp":1767828489554,"version":"3.49.0"},"publisher-location":"New York, New York, USA","reference-count":35,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CMMI-0927178, Purdue's Office of Technology Commercialization TRASK grant"],"award-info":[{"award-number":["CMMI-0927178, Purdue's Office of Technology Commercialization TRASK grant"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1145\/2663165.2663330","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T15:45:24Z","timestamp":1417016724000},"page":"277-288","source":"Crossref","is-referenced-by-count":49,"title":["Mitigating interference in cloud services by middleware reconfiguration"],"prefix":"10.1145","author":[{"given":"Amiya K.","family":"Maji","sequence":"first","affiliation":[]},{"given":"Subrata","family":"Mitra","sequence":"additional","affiliation":[]},{"given":"Bowen","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Saurabh","family":"Bagchi","sequence":"additional","affiliation":[]},{"given":"Akshat","family":"Verma","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2663165.2663330-1","unstructured":"Basic Linear Algebra Subprograms. http:\/\/www.netlib.org\/blas."},{"key":"key-10.1145\/2663165.2663330-2","doi-asserted-by":"crossref","unstructured":"X. Bu, J. Rao, and C.-Z. Xu. Coordinated self-configuration of virtual machines and appliances using a model-free learning approach.Parallel and Distributed Systems, IEEE Transactions on, 24(4):681--690, 2013.","DOI":"10.1109\/TPDS.2012.174"},{"key":"key-10.1145\/2663165.2663330-3","doi-asserted-by":"crossref","unstructured":"I.-H. Chung and J. K. Hollingsworth. Automated cluster-based web service performance tuning. InHigh performance Distributed, Computing, 2004. Proceedings. 13th IEEE International Symposium on, pages 36--44. IEEE, 2004.","DOI":"10.1109\/HPDC.2004.1323484"},{"key":"key-10.1145\/2663165.2663330-4","doi-asserted-by":"crossref","unstructured":"C. Delimitrou and C. Kozyrakis. Paragon: Qos-aware scheduling for heterogeneous datacenters. InProceedings of the eighteenth international conference on Architectural support for programming languages and operating systems, ASPLOS '13, pages 77--88, New York, NY, USA, 2013. ACM.","DOI":"10.1145\/2451116.2451125"},{"key":"key-10.1145\/2663165.2663330-5","unstructured":"Y. Diao, N. Gandhi, J. Hellerstein, S. Parekh, and D. Tilbury. Using mimo feedback control to enforce policies for interrelated metrics with application to the apache web server. InNetwork Operations and Management Symposium, 2002. NOMS 2002. 2002 IEEE\/IFIP, pages 219--234."},{"key":"key-10.1145\/2663165.2663330-6","unstructured":"EPFL. CloudSuite. http:\/\/parsa.epfl.ch\/cloudsuite\/cloudsuite.html."},{"key":"key-10.1145\/2663165.2663330-7","doi-asserted-by":"crossref","unstructured":"S. Govindan, A. R. Nath, A. Das, B. Urgaonkar, and A. Sivasubramaniam. Xen and co.: communication-aware cpu scheduling for consolidated xen-based hosting platforms. InProceedings of the 3rd international conference on Virtual execution environments, VEE '07, pages 126--136, New York, NY, USA, 2007. ACM.","DOI":"10.1145\/1254810.1254828"},{"key":"key-10.1145\/2663165.2663330-8","unstructured":"A. Gulati, A. Merchant, and P. J. Varman. mclock: handling throughput variability for hypervisor io scheduling. InProceedings of the 9th USENIX conference on Operating systems design and implementation, pages 1--7. USENIX Association, 2010."},{"key":"key-10.1145\/2663165.2663330-9","doi-asserted-by":"crossref","unstructured":"D. Gupta, L. Cherkasova, R. Gardner, and A. Vahdat. Enforcing performance isolation across virtual machines in xen. InProceedings of the ACM\/IFIP\/USENIX 2006 International Conference on Middleware, pages 342--362. Springer-Verlag New York, Inc., 2006.","DOI":"10.1007\/11925071_18"},{"key":"key-10.1145\/2663165.2663330-10","doi-asserted-by":"crossref","unstructured":"M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. The weka data mining software: An update.SIGKDD Explor. Newsl., 11(1):10--18, Nov. 2009.","DOI":"10.1145\/1656274.1656278"},{"key":"key-10.1145\/2663165.2663330-11","unstructured":"R. J. F. Inc.). More details on today's outage, 2011. https:\/\/www.facebook.com\/note.php?note\\_id=431441338919\\&#38;id=9445547199."},{"key":"key-10.1145\/2663165.2663330-12","doi-asserted-by":"crossref","unstructured":"R. Koller, A. Verma, and A. Neogi. Wattapp: An application aware power meter for shared data centers. InICAC, 2010.","DOI":"10.1145\/1809049.1809055"},{"key":"key-10.1145\/2663165.2663330-13","doi-asserted-by":"crossref","unstructured":"X. Liu, L. Sha, Y. Diao, S. Froehlich, J. L. Hellerstein, and S. Parekh. Online response time optimization of apache web server. InProceedings of the 11th international conference on Quality of service, IWQoS'03, pages 461--478, Berlin, Heidelberg, 2003. Springer-Verlag.","DOI":"10.1007\/3-540-44884-5_25"},{"key":"key-10.1145\/2663165.2663330-14","unstructured":"R. P. Mahowald and M. Rounds. It buyer market guide: Cloud services. InIDCReport, July, 2013."},{"key":"key-10.1145\/2663165.2663330-15","unstructured":"A. K. Maji. Httpd with Online Reconfiguration, 2014. https:\/\/github.com\/amaji\/httpd-online-2.4.3.git."},{"key":"key-10.1145\/2663165.2663330-16","unstructured":"A. K. Maji, S. Mitra, B. Zhou, S. Bagchi, and A. Verma. IC2: Interference-aware Application Configuration in Clouds, September 2014. Technical Report, School of Electrical and Computer Engineering, Purdue University, http:\/\/docs.lib.purdue.edu\/ecetr\/."},{"key":"key-10.1145\/2663165.2663330-17","unstructured":"T. Moscibroda and O. Mutlu. Memory performance attacks: Denial of memory service in multi-core systems. InProceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pages 1--18. USENIX Association, 2007."},{"key":"key-10.1145\/2663165.2663330-18","doi-asserted-by":"crossref","unstructured":"R. Nathuji, A. Kansal, and A. Ghaffarkhah. Q-clouds: Managing performance interference effects for qos-aware clouds. InProceedings of the 5th European Conference on Computer Systems, EuroSys '10, pages 237--250, New York, NY, USA, 2010. ACM.","DOI":"10.1145\/1755913.1755938"},{"key":"key-10.1145\/2663165.2663330-19","unstructured":"Netcraft. May 2014 Web Server Survey, 2014. http:\/\/news.netcraft.com\/archives\/2014\/05\/07\/may-2014-web-server-survey.html."},{"key":"key-10.1145\/2663165.2663330-20","unstructured":"D. Novakovic, N. Vasic, S. Novakovic, D. Kostic, and R. Bianchini. Deepdive: Transparently identifying and managing performance interference in virtualized environments. InUSENIX ATC, 2013."},{"key":"key-10.1145\/2663165.2663330-21","unstructured":"Olio. The Workload. http:\/\/incubator.apache.org\/olio\/the-workload.html."},{"key":"key-10.1145\/2663165.2663330-22","unstructured":"OProfile. OProfile. http:\/\/oprofile.sourceforge.net\/about\/."},{"key":"key-10.1145\/2663165.2663330-23","unstructured":"Oracle. Jdk-6558100: Cms crash following parallel work queue overflow, 2011. http:\/\/bugs.sun.com\/view_bug.do?bug_id=6558100."},{"key":"key-10.1145\/2663165.2663330-24","unstructured":"K. T. (PCWorld). Thanks, Amazon: The Cloud Crash Reveals Your Importance, 2011, http:\/\/www.pcworld.com\/article\/226033\/thanks\\_amazon\\_for\\_making\\_possible\\_much\\_of\\_the\\_internet.html."},{"key":"key-10.1145\/2663165.2663330-25","doi-asserted-by":"crossref","unstructured":"T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. InProceedings of the 16th ACM conference on Computer and communications security, CCS '09,' pages 199--212, New York, NY, USA, 2009. ACM.","DOI":"10.1145\/1653662.1653687"},{"key":"key-10.1145\/2663165.2663330-26","doi-asserted-by":"crossref","unstructured":"B. Sharma, P. Jayachandran, A. Verma, and C. Das. Cloudpd: Problem determination and diagnosis in. shared dynamic clouds. InProc. DSN, 2013.","DOI":"10.1109\/DSN.2013.6575298"},{"key":"key-10.1145\/2663165.2663330-27","doi-asserted-by":"crossref","unstructured":"A. Shieh, S. Kandula, A. Greenberg, and C. Kim. Seawall: performance isolation for cloud datacenter networks. InProceedings of the 2nd USENIX conference on Hot topics in cloud computing (HotCloud), pages 1--6. USENIX Association, 2010.","DOI":"10.1145\/1868447.1868468"},{"key":"key-10.1145\/2663165.2663330-28","doi-asserted-by":"crossref","unstructured":"V. Varadarajan, T. Kooburat, B. Farley, T. Ristenpart, and M. M. Swift. Resource-freeing attacks: improve your cloud performance (at your neighbor's expense). InProceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pages 281--292, New York, NY, USA, 2012. ACM.","DOI":"10.1145\/2382196.2382228"},{"key":"key-10.1145\/2663165.2663330-29","doi-asserted-by":"crossref","unstructured":"A. Verma, P. Ahuja, and A. Neogi. pmapper: Power and migration cost aware application placement in virtualized systems. InProc. Middleware, 2008.","DOI":"10.1007\/978-3-540-89856-6_13"},{"key":"key-10.1145\/2663165.2663330-30","doi-asserted-by":"crossref","unstructured":"A. Verma, G. Kumar, R. Koller, and A. Sen. Cosmig: Modeling the impact of reconfiguration in a cloud. InIEEE MASCOTS, 2011.","DOI":"10.1109\/MASCOTS.2011.37"},{"key":"key-10.1145\/2663165.2663330-31","doi-asserted-by":"crossref","unstructured":"L. Wang, J. Xu, and M. Zhao. Application-aware cross-layer virtual machine resource management. InProceedings of the 9th international conference on Autonomic computing, ICAC '12, pages 13--22, New York, NY, USA, 2012. ACM.","DOI":"10.1145\/2371536.2371541"},{"key":"key-10.1145\/2663165.2663330-32","unstructured":"A. Whitaker, R. S. Cox, and S. D. Gribble. Configuration debugging as search: Finding the needle in the haystack. InProceedings of the 6th conference on Symposium on Opearling Systems Design &#38; Implementation, volume 6, pages 1--14, 2004."},{"key":"key-10.1145\/2663165.2663330-33","doi-asserted-by":"crossref","unstructured":"B. Xi, Z. Liu, M. Raghavachari, C. H. Xia, and L. Zhang. A smart hill-climbing algorithm for application server configuration. InProceedings of the 13th international conference on World Wide Web, pages 287--296. ACM, 2004.","DOI":"10.1145\/988672.988711"},{"key":"key-10.1145\/2663165.2663330-34","doi-asserted-by":"crossref","unstructured":"C.-Z. Xu, J. Rao, and X. Bu. Url: A unified reinforcement learning approach for autonomic cloud management.Journal on Parallel and Distributed, Computing (JPDC), 72(2):95--105, Feb. 2012.","DOI":"10.1016\/j.jpdc.2011.10.003"},{"key":"key-10.1145\/2663165.2663330-35","doi-asserted-by":"crossref","unstructured":"W. Zheng, R. Bianchini, and T. D. Nguyen. Automatic configuration of internet services. InProceedings of the 2nd ACM SIGOPS\/EuroSys European Conference on Computer Systems 2007, EuroSys '07, pages 219--229, New York, NY, USA, 2007. ACM.","DOI":"10.1145\/1272996.1273020"}],"event":{"name":"the 15th International Middleware Conference","location":"Bordeaux, France","acronym":"Middleware '14","number":"15","sponsor":["Raytheon BBN Technologies","IFIP","Conseil R\u00e9gional d'Aquitaine","USENIX","ACM, Association for Computing Machinery","LaBRI","HP","Bordeaux, City of Bordeaux","GDR ASR, GDR Architecture, Syst\u00e8mes et R\u00e9seaux"],"start":{"date-parts":[[2014,12,8]]},"end":{"date-parts":[[2014,12,12]]}},"container-title":["Proceedings of the 15th International Middleware Conference on - Middleware '14"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663165.2663330","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2663330&amp;ftid=1515768&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:46Z","timestamp":1750227226000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2663165.2663330"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1145\/2663165.2663330","relation":{},"subject":[],"published":{"date-parts":[[2014]]}}}