{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:41Z","timestamp":1750306241475,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,14]],"date-time":"2017-01-14T00:00:00Z","timestamp":1484352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,14]]},"DOI":"10.1145\/3034950.3034965","type":"proceedings-article","created":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T16:24:09Z","timestamp":1490286249000},"page":"280-284","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["FAS"],"prefix":"10.1145","author":[{"given":"Yongfeng","family":"Wu","sequence":"first","affiliation":[{"name":"Distributed Computing Lab, School of Software, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Ruonan","family":"Rao","sequence":"additional","affiliation":[{"name":"Distributed Computing Lab, School of Software, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Pei","family":"Hong","sequence":"additional","affiliation":[{"name":"Software Department, China National Aeronautical Radio Electronics Research Institute Shanghai, China"}]},{"given":"Jin","family":"Ma","sequence":"additional","affiliation":[{"name":"Software Department, China National Aeronautical Radio Electronics Research Institute Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2017,1,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2595641"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107499.1107504"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 8th ACM European Conference on Computer Systems.","author":"Shao Zheng","year":"2011","unstructured":"Shao , Zheng . 2011 . Real-time analytics at facebook . In Proceedings of the 8th ACM European Conference on Computer Systems. 2011. Shao, Zheng. 2011. Real-time analytics at facebook. In Proceedings of the 8th ACM European Conference on Computer Systems. 2011."},{"key":"e_1_3_2_1_4_1","unstructured":"Docker overview: https:\/\/www.docker.com\/what-docker  Docker overview: https:\/\/www.docker.com\/what-docker"},{"key":"e_1_3_2_1_5_1","unstructured":"Esper Complex Event Processing http:\/\/www.espertech.com\/esper\/  Esper Complex Event Processing http:\/\/www.espertech.com\/esper\/"},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE","author":"Hoong Ng Kar","year":"2011","unstructured":"Hoong , Ng Kar , et al. Impact of utilizing forecasted network traffic for data transfers. In proceeding of 2011 13th International Conference on Advanced Communication Technology (ICACT) , IEEE , 2011 . Hoong, Ng Kar, et al. Impact of utilizing forecasted network traffic for data transfers. In proceeding of 2011 13th International Conference on Advanced Communication Technology (ICACT), IEEE, 2011."},{"key":"e_1_3_2_1_7_1","volume-title":"IEEE","author":"Yu Yanhua","year":"2011","unstructured":"Yu , Yanhua , et al. 2011 . Network traffic analysis and prediction based on APM. In proceeding of 2011 6th International Conference on Pervasive Computing and Applications (ICPCA) , IEEE , 2011. Yu, Yanhua, et al. 2011. Network traffic analysis and prediction based on APM. In proceeding of 2011 6th International Conference on Pervasive Computing and Applications (ICPCA), IEEE, 2011."},{"key":"e_1_3_2_1_8_1","volume-title":"Prediction of traffic in a public safety network. In proceeding of 2006 IEEE International Symposium on Circuits and Systems","author":"Vujicic Bozidar","year":"2006","unstructured":"Vujicic , Bozidar , Hao Chen , and Ljiljana Trajkovic . 2006. Prediction of traffic in a public safety network. In proceeding of 2006 IEEE International Symposium on Circuits and Systems . 2006 . Vujicic, Bozidar, Hao Chen, and Ljiljana Trajkovic. 2006. Prediction of traffic in a public safety network. In proceeding of 2006 IEEE International Symposium on Circuits and Systems. 2006."},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE","author":"Anand Nikkie C","year":"2008","unstructured":"Anand , Nikkie C . , Caterina Scoglio , and Balasubramaniam Natarajan . 2008 . GARCH---Non-linear time series model for traffic modeling and prediction. In proceeding of 2008 IEEE Network Operations and Management Symposium . IEEE , 2008. Anand, Nikkie C., Caterina Scoglio, and Balasubramaniam Natarajan. 2008. GARCH---Non-linear time series model for traffic modeling and prediction. In proceeding of 2008 IEEE Network Operations and Management Symposium. IEEE, 2008."},{"issue":"5","key":"e_1_3_2_1_10_1","first-page":"583","article-title":"2012","volume":"2","author":"Al-Nafjan Khaled","year":"2012","unstructured":"Al-Nafjan , Khaled , et al. 2012 . Intrusion Detection Using PCA Based Modular Neural Network. International Journal of Machine Learning and Computing 2 . 5 ( 2012 ): 583 . Al-Nafjan, Khaled, et al.2012. Intrusion Detection Using PCA Based Modular Neural Network. International Journal of Machine Learning and Computing 2.5 (2012): 583.","journal-title":"Intrusion Detection Using PCA Based Modular Neural Network. International Journal of Machine Learning and Computing"},{"issue":"6","key":"e_1_3_2_1_11_1","first-page":"1790","article-title":"2010. Feature Reduction using Principal Component Analysis for Effective Anomaly--Based Intrusion Detection on NSL-KDD","volume":"2","author":"Joseph S.","year":"2010","unstructured":"lakhina, S., Joseph , S. , and Verma , B . 2010. Feature Reduction using Principal Component Analysis for Effective Anomaly--Based Intrusion Detection on NSL-KDD . International Journal of Engineering Science and Technology , Vol. 2 ( 6 ), 1790 -- 1799 . 2010 . lakhina, S., Joseph, S., and Verma, B. 2010. Feature Reduction using Principal Component Analysis for Effective Anomaly--Based Intrusion Detection on NSL-KDD. International Journal of Engineering Science and Technology, Vol. 2(6), 1790--1799. 2010.","journal-title":"International Journal of Engineering Science and Technology"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACIIDS.2009.59"},{"key":"e_1_3_2_1_13_1","volume-title":"International Journal of Soft Computing and Engineering (IJSCE)","author":"Dubey G. P.","year":"2011","unstructured":"Dubey , G. P. , Dubey , N. R., and Dubey , K . 2011. A Novel Approach to Intrusion Detection System using Rough Set Theory and Incremental SVM . International Journal of Soft Computing and Engineering (IJSCE) , 2011 ) 2231--2307, Volume-1, Issue-1. Dubey, G. P., Dubey, N. R., and Dubey, K. 2011. A Novel Approach to Intrusion Detection System using Rough Set Theory and Incremental SVM. International Journal of Soft Computing and Engineering (IJSCE), 2011) 2231--2307, Volume-1, Issue-1."},{"key":"e_1_3_2_1_14_1","volume-title":"A family of normalised LMS algorithms","author":"Dubey S. C.","year":"1994","unstructured":"Dubey , S. C. 1994. A family of normalised LMS algorithms , IEEE Signal Processing Letters . 1 (3) ( 1994 ) 49--55. Dubey, S. C.1994. A family of normalised LMS algorithms, IEEE Signal Processing Letters. 1 (3) (1994) 49--55."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the NetDB. 2011","author":"Kreps Jay","year":"2011","unstructured":"Kreps , Jay , Neha Narkhede , and Jun Rao . Kafka . 2011 . A distributed messaging system for log processing . In Proceedings of the NetDB. 2011 Kreps, Jay, Neha Narkhede, and Jun Rao. Kafka. 2011. A distributed messaging system for log processing. In Proceedings of the NetDB. 2011"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806777.2806847"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.61"}],"event":{"name":"ICMSS '17: 2017 International Conference on Management Engineering, Software Engineering and Service Sciences","sponsor":["Wuhan Univ. Wuhan University, China"],"location":"Wuhan China","acronym":"ICMSS '17"},"container-title":["Proceedings of the 2017 International Conference on Management Engineering, Software Engineering and Service Sciences"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3034950.3034965","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3034950.3034965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:33Z","timestamp":1750220613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3034950.3034965"}},"subtitle":["A Flow Aware Scaling Mechanism for Stream Processing Platform Service based on LMS"],"short-title":[],"issued":{"date-parts":[[2017,1,14]]},"references-count":17,"alternative-id":["10.1145\/3034950.3034965","10.1145\/3034950"],"URL":"https:\/\/doi.org\/10.1145\/3034950.3034965","relation":{},"subject":[],"published":{"date-parts":[[2017,1,14]]},"assertion":[{"value":"2017-01-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}