{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:35Z","timestamp":1750221155465,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T00:00:00Z","timestamp":1528761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Qatar National Research Fund","award":["NPRP8-519-1-108"],"award-info":[{"award-number":["NPRP8-519-1-108"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,12]]},"DOI":"10.1145\/3204949.3204954","type":"proceedings-article","created":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T12:22:47Z","timestamp":1530102167000},"page":"113-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic input anomaly detection in interactive multimedia services"],"prefix":"10.1145","author":[{"given":"Mohammed","family":"Shatnawi","sequence":"first","affiliation":[{"name":"Microsoft and Simon Fraser University, Burnaby, BC, Canada"}]},{"given":"Mohamed","family":"Hefeeda","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Burnaby, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2018,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_2_1","unstructured":"Ben Christensen. 2012. Introducing Hystrix for Resilience Engineering. http:\/\/techblog.netflix.com\/2012\/11\/hystrix.html. and https:\/\/github.com\/Netflix\/Hystrix.  Ben Christensen. 2012. Introducing Hystrix for Resilience Engineering. http:\/\/techblog.netflix.com\/2012\/11\/hystrix.html. and https:\/\/github.com\/Netflix\/Hystrix."},{"volume-title":"Proc. of Software Test Professionals (STP'12)","year":"2012","author":"Elliot E.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"M. Kantarczic. 2011. Data Mining Concepts Models Methods and Algorithms (2nd ed.). Wiley and IEEE Press.   M. Kantarczic. 2011. Data Mining Concepts Models Methods and Algorithms (2nd ed.). Wiley and IEEE Press.","DOI":"10.1002\/9781118029145"},{"key":"e_1_3_2_1_5_1","unstructured":"John D. Kelleher Brian Mac Namee and Aoife D'Arcy. 2015. Fundamentals of Machine Learning for Predictive Data Analytics. MIT Press.   John D. Kelleher Brian Mac Namee and Aoife D'Arcy. 2015. Fundamentals of Machine Learning for Predictive Data Analytics. MIT Press."},{"key":"e_1_3_2_1_6_1","unstructured":"R. Kimball and M. Ross. 2013. The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling (3rd ed.). Wiley Computer Publishing.   R. Kimball and M. Ross. 2013. The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling (3rd ed.). Wiley Computer Publishing."},{"key":"e_1_3_2_1_7_1","first-page":"427","article-title":"Improving availability in distributed systems with failure informers. In Proc. of USENIX conference on Networked Systems Design and Implementation (NSDI'13)","author":"Leners J. B.","year":"2013","journal-title":"Lombard"},{"volume-title":"Proc. of USENIX Symp. on Networked Systems Design and Implementation (NSDI'10)","author":"Li Z.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654943"},{"volume-title":"Machine Learning: A Probabilistic Perspective (Adaptive Computation and Machine Learning series)","year":"2012","author":"Murphy P.","key":"e_1_3_2_1_10_1"},{"volume-title":"Proc. of USENIX Conference on Networked Systems Design and Implementation (NSDI'12)","author":"Nagaraj K.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"F. Provost and T. Fawcett. 2013. Data Science for Business: What you need to know about data mining. O'Reilly Media Inc.   F. Provost and T. Fawcett. 2013. Data Science for Business: What you need to know about data mining. O'Reilly Media Inc."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654938"},{"volume-title":"Proc. of Symp. on Networked Systems Design and Implementation (NSDI'06)","author":"Reynolds P.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.132"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1670679.1670680"},{"volume-title":"Proc. of USENIX Workshop on Analysis of System Logs (WASL'08)","author":"Salfner F.","key":"e_1_3_2_1_17_1"},{"volume-title":"Proc. of USENIX Symposium on Networked Systems Design and Implementation (NSDI'11)","author":"Sambasivan R. R.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2733373.2806275"},{"volume-title":"Proc. of IEEE INFOCOM'15","author":"Shatnawi M.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2072298.2072313"},{"volume-title":"Proc. of IEEE International Conference on Communications (ICC'09)","author":"Snyder M. E.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1459359.1459395"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874193"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"volume-title":"Proc. of IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN'09)","author":"Zheng Z.","key":"e_1_3_2_1_26_1"}],"event":{"name":"MMSys '18: 9th ACM Multimedia Systems Conference","sponsor":["SIGMM ACM Special Interest Group on Multimedia","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Amsterdam Netherlands","acronym":"MMSys '18"},"container-title":["Proceedings of the 9th ACM Multimedia Systems Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3204949.3204954","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3204949.3204954","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:32Z","timestamp":1750208912000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3204949.3204954"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,12]]},"references-count":26,"alternative-id":["10.1145\/3204949.3204954","10.1145\/3204949"],"URL":"https:\/\/doi.org\/10.1145\/3204949.3204954","relation":{},"subject":[],"published":{"date-parts":[[2018,6,12]]},"assertion":[{"value":"2018-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}