{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:00:48Z","timestamp":1774551648895,"version":"3.50.1"},"reference-count":125,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T00:00:00Z","timestamp":1567123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2020,7,31]]},"abstract":"<jats:p>The dynamic nature of the cloud environment has made the distributed resource management process a challenge for cloud service providers. The importance of maintaining quality of service in accordance with customer expectations and the highly dynamic nature of cloud-hosted applications add new levels of complexity to the process. Advances in big-data learning approaches have shifted conventional static capacity planning solutions to complex performance-aware resource management methods. It is shown that the process of decision-making for resource adjustment is closely related to the behavior of the system, including the utilization of resources and application components. Therefore, a continuous monitoring of system attributes and performance metrics provides the raw data for the analysis of problems affecting the performance of the application. Data analytic methods, such as statistical and machine-learning approaches, offer the required concepts, models, and tools to dig into the data and find general rules, patterns, and characteristics that define the functionality of the system. Obtained knowledge from the data analysis process helps to determine the changes in the workloads, faulty components, or problems that can cause system performance to degrade. A timely reaction to performance degradation can avoid violations of service level agreements, including performing proper corrective actions such as auto-scaling or other resource adjustment solutions. In this article, we investigate the main requirements and limitations of cloud resource management, including a study of the approaches to workload and anomaly analysis in the context of performance management in the cloud. A taxonomy of the works on this problem is presented that identifies main approaches in existing research from the data analysis side to resource adjustment techniques. Finally, considering the observed gaps in the general direction of the reviewed works, a list of these gaps is proposed for future researchers to pursue.<\/jats:p>","DOI":"10.1145\/3337956","type":"journal-article","created":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T12:47:00Z","timestamp":1567514820000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Performance-Aware Management of Cloud Resources"],"prefix":"10.1145","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4967-5960","authenticated-orcid":false,"given":"Sara Kardani","family":"Moghaddam","sequence":"first","affiliation":[{"name":"The University of Melbourne, VIC, Australia"}]},{"given":"Rajkumar","family":"Buyya","sequence":"additional","affiliation":[{"name":"The University of Melbourne, VIC, Australia"}]},{"given":"Kotagiri","family":"Ramamohanarao","sequence":"additional","affiliation":[{"name":"The University of Melbourne, VIC, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,8,30]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.04.001"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.4"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14738\/tmlai.41.1690"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494621.2494630"},{"key":"e_1_2_1_5_1","volume-title":"Retrieved","year":"2019","unstructured":"Amazon. 2019. Amazon. Retrieved July 29, 2019 from https:\/\/aws.amazon.com\/."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2797022.2797039"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.15"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the 16th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing. IEEE, 445--452","author":"Ardagna D.","unstructured":"D. Ardagna, M. Ciavotta, and R. Lancellotti. 2014. A receding horizon approach for the runtime management of IaaS cloud systems. In Proceedings of the 16th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing. IEEE, 445--452."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2018.2875443"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.002"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.07.012"},{"key":"e_1_2_1_12_1","volume-title":"Retrieved","author":"Azure Microsoft","year":"2019","unstructured":"Microsoft Azure. 2019. Azure. Retrieved July 29, 2019 from https:\/\/azure.microsoft.com."},{"key":"e_1_2_1_13_1","volume-title":"IEEE 37th International Conference on Distributed Computing Systems (ICDCS\u201917)","author":"Basu D.","unstructured":"D. Basu, X. Wang, Y. Hong, H. Chen, and S. Bressan. 2017. Learn-as-you-go with Megh: Efficient live migration of virtual machines. In IEEE 37th International Conference on Distributed Computing Systems (ICDCS\u201917). IEEE, 2608--2609."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.08.030"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.001"},{"key":"e_1_2_1_16_1","volume-title":"International CMG Conference. Computer Measurement Group, 1--10","author":"Jeffrey","unstructured":"Jeffrey P. Buzen and Annie W. Shum. 1995. MASF - multivariate adaptive statistical filtering. In International CMG Conference. Computer Measurement Group, 1--10."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2758776.2759000"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.06.001"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","unstructured":"Tao Chen Rami Bahsoon and Xin Yao. 2018. A survey and taxonomy of self-aware and self-adaptive cloud autoscaling systems. Computing Surveys 51 3 61:1--61:40. 10.1145\/3190507","DOI":"10.1145\/3190507"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629087.1629089"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2015.16"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251254.1251270"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.58"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2371536.2371572"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2670987"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2696535.2696551"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229584.3229589"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2013.10.001"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523627"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.02.003"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12293-016-0218-x"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.55"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2606400"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.025"},{"key":"e_1_2_1_37_1","volume-title":"Retrieved","year":"2019","unstructured":"Ganglia. 2019. Ganglia. Retrieved July 29, 2019 from http:\/\/ganglia.sourceforge.net\/."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.08.011"},{"key":"e_1_2_1_39_1","volume-title":"IEEE 41st Annual Computer Software and Applications Conference","volume":"2","author":"Gong S.","unstructured":"S. Gong, B. Yin, W. Zhu, and K. Cai. 2017. Adaptive resource allocation of multiple servers for service-based systems in cloud computing. In IEEE 41st Annual Computer Software and Applications Conference, Vol. 2. IEEE, 603--608."},{"key":"e_1_2_1_40_1","volume-title":"Retrieved","year":"2019","unstructured":"Google. 2019. Google Cloud. Retrieved July 29, 2019 from https:\/\/cloud.google.com."},{"key":"e_1_2_1_41_1","volume-title":"IEEE Global Communications Conference. IEEE, 1--7.","author":"Grimaldi D.","unstructured":"D. Grimaldi, V. Persico, A. Pescape, A. Salvi, and S. Santini. 2015. A feedback-control approach for resource management in public clouds. In IEEE Global Communications Conference. IEEE, 1--7."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2662112"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.128"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251118"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2013.29"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.52"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4171"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","unstructured":"Henry Hoffman. 2013. SEEC: A Framework for Self-aware Management of Goals and Constraints in Computing Systems (Power-aware Computing Accuracy-aware Computing Adaptive Computing Autonomic Computing). Ph.D. Dissertation. Cambridge MA.","DOI":"10.5555\/2520439"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3640"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1380584.1380585"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","unstructured":"Olumuyiwa Ibidunmoye Francisco Hern\u00e1ndez-Rodriguez and Erik Elmroth. 2015. Performance anomaly detection and bottleneck identification. Computing Surveys 48 1 4:1--4:35. 10.1145\/2791120","DOI":"10.1145\/2791120"},{"key":"e_1_2_1_52_1","volume-title":"International Conference on Cloud and Autonomic Computing (ICCAC\u201917)","author":"Ibidunmoye O.","unstructured":"O. Ibidunmoye, E. B. Lakew, and E. Elmroth. 2017. A black-box approach for detecting systems anomalies in virtualized environments. In International Conference on Cloud and Autonomic Computing (ICCAC\u201917). IEEE, 22--33."},{"key":"e_1_2_1_53_1","first-page":"1","article-title":"An architectural blueprint for autonomic computing","volume":"31","author":"IBM.","year":"2006","unstructured":"IBM. 2006. An architectural blueprint for autonomic computing. IBM White Paper 31, 1--6.","journal-title":"IBM White Paper"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155624"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.10.016"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.05.027"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555228.1555261"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.02.018"},{"key":"e_1_2_1_59_1","volume-title":"Manzur Murshed, and Rajkumar Buyya.","author":"Khan Md Anit","year":"2018","unstructured":"Md Anit Khan, Andrew Paplinski, Abdul Malik Khan, Manzur Murshed, and Rajkumar Buyya. 2018. Dynamic Virtual Machine Consolidation Algorithms for Energy-Efficient Cloud Resource Management: A Review. Springer International Publishing, 135--165."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2011.5767653"},{"key":"e_1_2_1_61_1","volume-title":"Receding Horizon Control: Model Predictive Control for State Models","author":"Kwon Wook Hyun","unstructured":"Wook Hyun Kwon and Soo Hee Han. 2006. Receding Horizon Control: Model Predictive Control for State Models. Springer Science 8 Business Media."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2453971"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2016.49"},{"key":"e_1_2_1_64_1","volume-title":"Proceedings of the International Conference on High Performance Computing Simulation (HPCS\u201915)","author":"Li Xi","unstructured":"Xi Li, A. Ventresque, J. O. Iglesias, and J. Murphy. 2015. Scalable correlation-aware virtual machine consolidation using two-phase clustering. In Proceedings of the International Conference on High Performance Computing Simulation (HPCS\u201915). IEEE, 237--245."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.01.009"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"e_1_2_1_68_1","volume-title":"Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS\u201917)","author":"Liu N.","unstructured":"N. Liu, Z. Li, J. Xu, Z. Xu, S. Lin, Q. Qiu, J. Tang, and Y. Wang. 2017. A hierarchical framework of cloud resource allocation and power management using deep reinforcement learning. In Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS\u201917). IEEE, 372--382."},{"key":"e_1_2_1_69_1","volume-title":"International Conference on Computing, Networking and Communications (ICNC\u201918)","author":"Liu Y.","unstructured":"Y. Liu, X. Ruan, S. Cai, R. Li, and H. He. 2018. An optimized VM allocation strategy to make a secure and energy-efficient cloud against co-residence attack. In International Conference on Computing, Networking and Communications (ICNC\u201918). IEEE, 349--353."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.72"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2017.2781236"},{"key":"e_1_2_1_72_1","volume-title":"Internet of Everything","author":"Mahmud Redowan","unstructured":"Redowan Mahmud, Ramamohanarao Kotagiri, and Rajkumar Buyya. 2018. Fog computing: A taxonomy, survey and future directions. In Internet of Everything. Springer, 103--130."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.103"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656204"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851553.2851554"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.701"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40047-6_34"},{"key":"e_1_2_1_78_1","volume-title":"Proceedings of the IEEE Network Operations and Management Symposium. IEEE, 216--223","author":"Mi N.","unstructured":"N. Mi, L. Cherkasova, K. Ozonat, J. Symons, and E. Smirni. 2008. Analysis of application performance and its change via representative application signatures. In Proceedings of the IEEE Network Operations and Management Symposium. IEEE, 216--223."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.12.002"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","unstructured":"Germ\u00e1n Molt\u00f3 Miguel Caballer and Carlos de Alfonso. 2016. Automatic memory-based vertical elasticity and oversubscription on cloud platforms. Future Generation Computer Systems 56 C 1--10. 10.1016\/j.future.2015.10.002","DOI":"10.1016\/j.future.2015.10.002"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2816644"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.26"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038633.2038634"},{"key":"e_1_2_1_84_1","volume-title":"32nd AAAI Conference on Artificial Intelligence. AAAI, 3892--3899","author":"Pang Guansong","year":"2018","unstructured":"Guansong Pang, Longbing Cao, Ling Chen, Defu Lian, and Huan Liu. 2018. Sparse modeling-based sequential ensemble learning for effective outlier detection in high-dimensional numeric data. In 32nd AAAI Conference on Artificial Intelligence. AAAI, 3892--3899."},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.08.012"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.107"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2017.2651810"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.02.035"},{"key":"e_1_2_1_89_1","volume-title":"Retrieved","year":"2019","unstructured":"ProfitBricks. 2019. ProfitBricks. Retrieved July 29, 2019 from https:\/\/www.profitbricks.com\/help\/Live_Vertical_Scaling."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.001"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","unstructured":"Chenhao Qu Rodrigo N. Calheiros and Rajkumar Buyya. 2018. Auto-scaling web applications in clouds: A taxonomy and survey. Computing Surveys 51 4 Article 73 33 pages. 10.1145\/3148149","DOI":"10.1145\/3148149"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2011.47"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555228.1555263"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.42"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2015.46"},{"key":"e_1_2_1_96_1","volume-title":"Proceedings of the International Conference on Advances in Computing, Communications and Informatics. IEEE, 1234--1239","author":"Shamsolmoali P.","unstructured":"P. Shamsolmoali and M. Zareapoor. 2014. Statistical-based filtering system against DDOS attacks in cloud computing. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics. IEEE, 1234--1239."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575298"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038921"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.011"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","unstructured":"Sukhpal Singh and Inderveer Chana. 2015. QoS-aware autonomic resource management in cloud computing: A systematic review. Computing Surveys 48 3 Article 42 46 pages. 10.1145\/2843889","DOI":"10.1145\/2843889"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.054"},{"key":"e_1_2_1_102_1","volume-title":"Proceedings of the IEEE International Conference on Autonomic Computing. IEEE, 300--307","author":"Sommer M.","unstructured":"M. Sommer, M. Klink, S. Tomforde, and J. H\u00f6hner. 2016. Predictive load balancing in cloud computing environments based on ensemble forecasting. In Proceedings of the IEEE International Conference on Autonomic Computing. IEEE, 300--307."},{"key":"e_1_2_1_103_1","volume-title":"Proceedings of the IEEE International Advance Computing Conference (IACC\u201914)","author":"Soni G.","unstructured":"G. Soni and M. Kalra. 2014. A novel approach for load balancing in cloud data center. In Proceedings of the IEEE International Advance Computing Conference (IACC\u201914). IEEE, 807--812."},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.08.021"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.65"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.5555\/1315451.1315479"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1797-5"},{"key":"e_1_2_1_108_1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1177\/003754970107700504","article-title":"Comparison of load balancing strategies on cluster-based web servers","volume":"77","author":"Teo Yong Meng","year":"2001","unstructured":"Yong Meng Teo and Rassul Ayani. 2001. Comparison of load balancing strategies on cluster-based web servers. SIMULATION 77, 5-6, 185--195.","journal-title":"SIMULATION"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294275"},{"key":"e_1_2_1_110_1","volume-title":"Vertical Scaling Capability of OpenStack","author":"Turowski Marian","unstructured":"Marian Turowski and Alexander Lenk. 2015. Vertical Scaling Capability of OpenStack. Springer, 351--362."},{"key":"e_1_2_1_111_1","volume-title":"IEEE Network Operations and Management Symposium (NOMS\u201910)","author":"Urgaonkar R.","unstructured":"R. Urgaonkar, U. C. Kozat, K. Igarashi, and M. J. Neely. 2010. Dynamic resource allocation and power management in virtualized data centers. In IEEE Network Operations and Management Symposium (NOMS\u201910). IEEE, 479--486."},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.15"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807161"},{"key":"e_1_2_1_114_1","volume-title":"7th International Green and Sustainable Computing Conference (IGSC\u201916)","author":"Wajahat M.","unstructured":"M. Wajahat, A. Gandhi, A. Karve, and A. Kochut. 2016. Using machine learning for black-box autoscaling. In 7th International Green and Sustainable Computing Conference (IGSC\u201916). IEEE, 1--8."},{"key":"e_1_2_1_115_1","volume-title":"Proceedings of the 12th IFIP\/IEEE International Symposium on Integrated Network Management (IM\u201911) and Workshops. IEEE, 385--392","author":"Wang C.","unstructured":"C. Wang, K. Viswanathan, L. Choudur, V. Talwar, W. Satterfield, and K. Schwan. 2011. Statistical techniques for online anomaly detection in data centers. In Proceedings of the 12th IFIP\/IEEE International Symposium on Integrated Network Management (IM\u201911) and Workshops. IEEE, 385--392."},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2430834"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.5555\/1973430.1973447"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/2479871.2479909"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2661339"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9459-0"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.146"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.142"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2017.0755"},{"key":"e_1_2_1_124_1","volume-title":"Proceedings of the IEEE 9th International Conference on Cloud Computing. IEEE, 917--920","author":"Zhang X.","unstructured":"X. Zhang, F. Meng, P. Chen, and J. Xu. 2016. TaskInsight: A fine-grained performance anomaly detection and problem locating system. In Proceedings of the IEEE 9th International Conference on Cloud Computing. IEEE, 917--920."},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616448.2616460"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337956","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3337956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:25:20Z","timestamp":1750857920000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337956"}},"subtitle":["A Taxonomy and Future Directions"],"short-title":[],"issued":{"date-parts":[[2019,8,30]]},"references-count":125,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,7,31]]}},"alternative-id":["10.1145\/3337956"],"URL":"https:\/\/doi.org\/10.1145\/3337956","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,30]]},"assertion":[{"value":"2018-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-05-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-08-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}