{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T01:09:07Z","timestamp":1768525747136,"version":"3.49.0"},"reference-count":202,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2022,5,31]]},"abstract":"<jats:p>The rapid growth of the cloud industry has increased challenges in the proper governance of the cloud infrastructure. Many intelligent systems have been developing, considering uncertainties in the cloud. Intelligent approaches with the consideration of uncertainties bring optimal management with higher profitability. Uncertainties of different levels and different types exist in various domains of cloud computing. This survey aims to discuss all types of uncertainties and their effect on different components of cloud computing. The article first presents the concept of uncertainty and its quantification. A vast number of uncertain events influence the cloud, as it is connected with the entire world through the internet. Five major uncertain parameters are identified, which are directly affected by numerous uncertain events and affect the performance of the cloud. Notable events affecting major uncertain parameters are also described. Besides, we present notable uncertainty-aware research works in cloud computing. A hype curve on uncertainty-aware approaches in the cloud is also presented to visualize current conditions and future possibilities. We expect the inauguration of numerous uncertainty-aware intelligent systems in cloud management over time. This article may provide a deeper understanding of managing cloud resources with uncertainties efficiently to future cloud researchers.<\/jats:p>","DOI":"10.1145\/3447583","type":"journal-article","created":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T07:22:25Z","timestamp":1621840945000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Uncertainty-aware Decisions in Cloud Computing"],"prefix":"10.1145","volume":"54","author":[{"given":"H. M. Dipu","family":"Kabir","sequence":"first","affiliation":[{"name":"Institute for Intelligent Systems Research and Innovation (IISRI), Deakin University, Australia"}]},{"given":"Abbas","family":"Khosravi","sequence":"additional","affiliation":[{"name":"Institute for Intelligent Systems Research and Innovation (IISRI), Deakin University, Australia"}]},{"given":"Subrota K.","family":"Mondal","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Macau University of Science and Technology, Macao, China"}]},{"given":"Mustaneer","family":"Rahman","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Information Technology, University of Malaya, Malaysia"}]},{"given":"Saeid","family":"Nahavandi","sequence":"additional","affiliation":[{"name":"Institute for Intelligent Systems Research and Innovation (IISRI), Deakin University, Australia"}]},{"given":"Rajkumar","family":"Buyya","sequence":"additional","affiliation":[{"name":"Cloud Computing and Distributed Systems (CLOUDS) Lab, School of Computing and Information Systems, The University of Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,5,24]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241737"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.020"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241038"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the IEEE 6th International Conference on Cloud Computing (CLOUD\u201913)","author":"Lu Qinghua","year":"2013"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2350475"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19030721"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2940754"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2019.8914582"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.glt.2020.06.002"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2019.8754951"},{"key":"e_1_2_1_11_1","first-page":"279","article-title":"Fusion of information and analytics: A discussion on potential methods to cope with uncertainty in complex environments (big data and IoT)","volume":"2","author":"Boss\u00e9 \u00c9loi","year":"2018","journal-title":"Int. J. Dig. Sig. Smart Syst."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.03.008"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/make2030014"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.04.002"},{"key":"e_1_2_1_15_1","volume-title":"Abbas Khosravi, Amir F. Atiya, Saeid Nahavandi, and Dipti Srinivasan.","author":"Kabir H. M.","year":"2020"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2980004"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.995"},{"key":"e_1_2_1_18_1","first-page":"749","article-title":"A survey on various problems and techniques for optimizing energy efficiency in cloud architecture","volume":"14","author":"Pandiyan Sanjeevi","year":"2017","journal-title":"Walailak J. Sci. Technol."},{"key":"e_1_2_1_19_1","volume-title":"ECIS 2013 - Proceedings of the 21st European Conference on Information Systems.","author":"Trenz Manuel"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.387"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2016.11.011"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-015-9359-2"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0638-6"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.10.004"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.08.048"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10670-013-9518-4"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836917"},{"key":"e_1_2_1_28_1","volume-title":"Partial adversarial training for neural network-based uncertainty quantification","author":"Dipu Kabir H. M.","year":"2019"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0263-7863(01)00074-6"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2013.05.075"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2859749"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2585378"},{"key":"e_1_2_1_33_1","unstructured":"Eric W. Weisstein. 2006. Dice. https:\/\/mathworld.wolfram.com\/.  Eric W. Weisstein. 2006. Dice. https:\/\/mathworld.wolfram.com\/."},{"key":"e_1_2_1_34_1","unstructured":"Lex Hoogduin. 2018. Decision Making in a Complex and Uncertain World. Retrieved from https:\/\/www.futurelearn.com\/courses\/complexity-and-uncertainty.  Lex Hoogduin. 2018. Decision Making in a Complex and Uncertain World. Retrieved from https:\/\/www.futurelearn.com\/courses\/complexity-and-uncertainty."},{"key":"e_1_2_1_35_1","first-page":"90","article-title":"Photovoltaic power forecasting using statistical methods: Impact of weather data. IET Sci","volume":"8","author":"Giorgi Maria De","year":"2014","journal-title":"Meas. Technol."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egypro.2017.08.293"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2016.06.001"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enconman.2016.09.069"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4041"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.34"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAR.2017.7942734"},{"key":"e_1_2_1_42_1","unstructured":"Stephen Thorne. 2018. Tenets of SRE available in Retrieved from https:\/\/medium.com\/@jerub\/tenets-of-sre-8af6238ae8a8.  Stephen Thorne. 2018. Tenets of SRE available in Retrieved from https:\/\/medium.com\/@jerub\/tenets-of-sre-8af6238ae8a8."},{"key":"e_1_2_1_43_1","volume-title":"Carmichael","author":"Nasirzadeh Farnad","year":"2020"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2018.09.009"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-011-0153-5"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMHEUR.2015.074251"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the 3rd International Conference on Information Technology and Nanotechnology, Science and Engineering. 1106\u20131111","author":"Bychkov I."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996890.2996902"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.021"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2017.09.003"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2017.42"},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of the 2nd International Conference On Emerging Computation and Information Technologies (ICECIT\u201917)","author":"Bhargavi K."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.014"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1119\/1.1636492"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.06.006"},{"key":"e_1_2_1_56_1","first-page":"16","article-title":"Deconstructing Amazon EC2 spot instance pricing","volume":"1","author":"Ben-Yehuda Orna Agmon","year":"2013","journal-title":"ACM Trans. Econ. Comput."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.78"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the International Conference on Cloud Computing and Services Science. 169\u2013178","author":"Costa Breno G. S.","year":"2018"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057115"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.184"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"e_1_2_1_62_1","doi-asserted-by":"crossref","volume-title":"Introduction to Azure IaaS","author":"Karthikeyan Shijimol Ambi","DOI":"10.1007\/978-1-4842-3763-2_1"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2509-0"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101651"},{"key":"e_1_2_1_65_1","first-page":"9","article-title":"Stochastic reward nets for reliability prediction","volume":"1","author":"Muppala Jogesh","year":"1994","journal-title":"Commun. Reliab., Maintainab. Serviceab."},{"key":"e_1_2_1_66_1","volume-title":"Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI\u201910)","volume":"10","author":"Ford Daniel","year":"2010"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the 1st ACM Symposium on Cloud Computing. ACM, 241\u2013252","author":"Bodik Peter"},{"key":"e_1_2_1_68_1","volume-title":"Disaster recovery as a cloud service: Economic benefits & deployment challenges.HotCloud 10","author":"Wood Timothy","year":"2010"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213556.2213558"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2345057"},{"key":"e_1_2_1_71_1","first-page":"6","article-title":"Parallel cloud computing: Making massive actuarial risk analysis possible","volume":"17","author":"Long Joe","year":"2018","journal-title":"Predict. Anal. Futur."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGC.2013.26"},{"key":"e_1_2_1_73_1","volume-title":"Towards predictable datacenter networks. ACM SIGCOMM Comput. Commun. Rev. 41","author":"Ballani Hitesh","year":"2011"},{"key":"e_1_2_1_74_1","volume-title":"Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement. ACM, 267\u2013280","author":"Benson Theophilus"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.35"},{"key":"e_1_2_1_76_1","volume-title":"Proceedings of the ACM International Symposium on High-performance Parallel and Distributed Computing (HPDC\u201997)","volume":"97","author":"\u00a0al Richard Wolski","year":"1997"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24768-5_14"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1934"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.08.016"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9459-0"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.04.026"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.148"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2013.051913.120278"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.07.030"},{"key":"e_1_2_1_85_1","volume-title":"Proceedings of the International Conference on Information Networking (ICOIN\u201914)","author":"Jheng Jhu-Jyun","year":"2014"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2011.17"},{"key":"e_1_2_1_87_1","unstructured":"Microsoft Corporation. 2009. Optimal Workloads for the cloud. https:\/\/blogs.msdn.microsoft.com\/stevecla01\/2009\/11\/26\/optimal-workloads-for-the-cloud\/.  Microsoft Corporation. 2009. Optimal Workloads for the cloud. https:\/\/blogs.msdn.microsoft.com\/stevecla01\/2009\/11\/26\/optimal-workloads-for-the-cloud\/."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBAC-PAD.2017.19"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.00109"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116476"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA47634.2020.00022"},{"key":"#cr-split#-e_1_2_1_92_1.1","doi-asserted-by":"crossref","unstructured":"Sarah Maroc and Jian Biao Zhang. 2020. Cloud services security-driven evaluation for multiple tenants. Cluster Comput. (2020) 1-19. DOI:10.1007\/s10586-020-03178-z 10.1007\/s10586-020-03178-z","DOI":"10.1007\/s10586-020-03178-z"},{"key":"#cr-split#-e_1_2_1_92_1.2","doi-asserted-by":"crossref","unstructured":"Sarah Maroc and Jian Biao Zhang. 2020. Cloud services security-driven evaluation for multiple tenants. Cluster Comput. (2020) 1-19. DOI:10.1007\/s10586-020-03178-z","DOI":"10.1007\/s10586-020-03178-z"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.027"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2055-1"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_97_1","first-page":"21","article-title":"The Hadoop distributed file system: Architecture and design","volume":"11","author":"Borthakur Dhruba","year":"2007","journal-title":"Hadoop Proj. Website"},{"key":"e_1_2_1_98_1","volume-title":"Proceedings of the IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC\u201917)","author":"Mondal Subrota K."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1548-z"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.14778\/2733085.2733092"},{"key":"e_1_2_1_101_1","unstructured":"Guiding Metrics. 2018. The Cloud Service Industry\u2019s 10 Most Critical Metrics. https:\/\/guidingmetrics.com\/content\/cloud-services-industrys-10-most-critical-metrics\/.  Guiding Metrics. 2018. The Cloud Service Industry\u2019s 10 Most Critical Metrics. https:\/\/guidingmetrics.com\/content\/cloud-services-industrys-10-most-critical-metrics\/."},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600427"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2011.36"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.3390\/computers7040064"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jides.2016.10.010"},{"key":"e_1_2_1_106_1","first-page":"459","article-title":"Best practices in architecting cloud applications in the AWS cloud","volume":"18","author":"Varia Jinesh","year":"2011","journal-title":"Cloud Comput.: Princ. Parad."},{"key":"e_1_2_1_107_1","volume-title":"Smart cyber-physical systems: Toward pervasive intelligence systems. 107","author":"Delicato Flavia C.","year":"2020"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3148149"},{"key":"e_1_2_1_109_1","volume-title":"On elasticity measurement in cloud computing. Sci. Prog. 2016","author":"Ai Wei","year":"2016"},{"key":"e_1_2_1_110_1","volume-title":"Mung Chiang, and Xinyu Wang.","author":"Zheng Liang","year":"2015"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126953"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2019.8755137"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2611918"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787473"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847966"},{"key":"e_1_2_1_116_1","unstructured":"Roshni Pary. 2018. New Amazon EC2 Spot pricing model: Simplified purchasing without bidding and fewer interruptions. Retrieved from https:\/\/aws.amazon.com\/blogs\/compute\/new-amazon-ec2-spot-pricing\/.  Roshni Pary. 2018. New Amazon EC2 Spot pricing model: Simplified purchasing without bidding and fewer interruptions. Retrieved from https:\/\/aws.amazon.com\/blogs\/compute\/new-amazon-ec2-spot-pricing\/."},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2019.08.012"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2059-x"},{"key":"e_1_2_1_119_1","volume-title":"Performance by Design: Computer Capacity Planning by Example","author":"Menasce Daniel A."},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2007.4362193"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.019"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2007.62"},{"key":"e_1_2_1_123_1","unstructured":"Tom Krazit. 2018. How Amazon Web Services uses machine learning to make capacity planning decisions. Retrieved from https:\/\/www.geekwire.com\/2017\/amazon-web-services-uses-machine-learning-make-capacity-planning-decisions\/.  Tom Krazit. 2018. How Amazon Web Services uses machine learning to make capacity planning decisions. Retrieved from https:\/\/www.geekwire.com\/2017\/amazon-web-services-uses-machine-learning-make-capacity-planning-decisions\/."},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736759"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.886296"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.927257"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2353576"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11081-005-1741-7"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1002\/net.21497"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/ONDM.2012.6210204"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.222926"},{"key":"e_1_2_1_132_1","first-page":"35","article-title":"Adaptive least-expected time paths in stochastic, time-varying transportation and data networks. Netw","volume":"37","author":"Miller-Hooks Elise","year":"2001","journal-title":"Int. J."},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.61"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006234103210328"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.66"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543834"},{"key":"e_1_2_1_137_1","volume-title":"Authentication protocols for internet of things: A comprehensive survey. Secur. Commun. Netw. 2017","author":"Ferrag Mohamed Amine","year":"2017"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2911672"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968456.2973748"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2985046"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-018-0639-0"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-8176-5.ch011"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.024"},{"key":"e_1_2_1_144_1","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1109\/TII.2020.2964704","article-title":"A machine learning based cyber attack detection model for wireless sensor networks in microgrids","volume":"17","author":"Abdollah Kavous-Fard","year":"2020","journal-title":"IEEE Trans. Industr. Inform."},{"key":"e_1_2_1_145_1","volume-title":"Investigating overall structure of cyber-attacks on smart-grid control systems to improve cyber resilience in power system. Network 1, 1","author":"Ghiasi Mohammad","year":"2020"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.010"},{"key":"e_1_2_1_147_1","volume-title":"Innovations in Computer Science and Engineering","author":"\u00a0al T. P."},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.031"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_2_1_150_1","doi-asserted-by":"crossref","unstructured":"E. Bauer and R. Adams. 2012. Reliability and Availability of Cloud Computing. Wiley-IEEE Press.  E. Bauer and R. Adams. 2012. Reliability and Availability of Cloud Computing. Wiley-IEEE Press.","DOI":"10.1002\/9781118393994"},{"key":"e_1_2_1_151_1","volume-title":"Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering (ISSRE\u201910)","author":"Trivedi K. S."},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.52"},{"key":"e_1_2_1_153_1","volume-title":"Muppala","author":"Mondal Subrota K.","year":"2016"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.05.007"},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/2843889"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.285"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-013-0276-3"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2013.6567253"},{"key":"e_1_2_1_159_1","volume-title":"Selecting services for multiple users: Let\u2019s be democratic","author":"Benouaret Karim","year":"2018"},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.44"},{"key":"e_1_2_1_161_1","first-page":"18","article-title":"Autonomous orchestration of distributed discrete event simulations in the presence of resource uncertainty","volume":"10","author":"Sui Zhiquan","year":"2015","journal-title":"ACM Trans. Autonom. Adapt. Syst."},{"key":"e_1_2_1_162_1","doi-asserted-by":"crossref","volume-title":"Partial Redundancy in HPC Systems with Non-uniform Node Reliabilities","author":"Hussain Zaeem","DOI":"10.1109\/SC.2018.00047"},{"key":"e_1_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.041"},{"key":"e_1_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04167-0_16"},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2020.07.008"},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2020.04.001"},{"key":"e_1_2_1_167_1","first-page":"1","article-title":"Social and juristic challenges of artificial intelligence","volume":"5","author":"Perc Matja\u017e","year":"2019","journal-title":"Palgrave Commun."},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970118"},{"key":"e_1_2_1_169_1","volume-title":"Dharm Singh Jat, and Anuradha Banerjee","author":"Sufian Abu","year":"2020"},{"key":"e_1_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100118"},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2019.2924870"},{"key":"e_1_2_1_173_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2018.8297294"},{"key":"e_1_2_1_174_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1040-z"},{"key":"e_1_2_1_175_1","volume-title":"Proceedings of the International Workshop on Optimization and Applications","volume":"11","author":"Talia Domenico","year":"2011"},{"key":"e_1_2_1_176_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1626-x"},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.1080\/0952813X.2013.813976"},{"key":"e_1_2_1_178_1","first-page":"44","article-title":"Multi-objective probabilistic reconfiguration considering uncertainty and multi-level load model. IET Sci","volume":"9","author":"Kavousi-Fard Abdollah","year":"2014","journal-title":"Meas. Technol."},{"key":"e_1_2_1_179_1","volume-title":"Handbook of Software Engineering","author":"Dashofy Eric M."},{"key":"e_1_2_1_180_1","volume-title":"Proceedings of the 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA\u201902)","author":"Ghuge Suyash S."},{"key":"e_1_2_1_181_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2017.39"},{"key":"e_1_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.112130030"},{"key":"e_1_2_1_183_1","volume-title":"Optimal uncertainty-guided neural network training. arXiv preprint arXiv:1912.12761","author":"Kabir H. M.","year":"2019"},{"key":"e_1_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2016.03.014"},{"key":"e_1_2_1_185_1","volume-title":"A data-driven frequency scaling approach for deadline-aware energy efficient scheduling on graphics processing units (GPUs). arXiv preprint arXiv:2004.08177","author":"Ilager Shashikant","year":"2020"},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2017.12.002"},{"key":"e_1_2_1_187_1","volume-title":"Igor Iemelianov, Mykhailo Liubarskyi, Vugar Abdullayev, Eugenia Litvinova, and Svetlana Chumachenko.","author":"Hahanov Vladimir","year":"2018"},{"key":"e_1_2_1_188_1","volume-title":"Machine Learning: Essential in Cloud Service Management.","author":"Minick Eric","year":"2018"},{"key":"e_1_2_1_189_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3120-2"},{"key":"e_1_2_1_190_1","volume-title":"Service providers","author":"Mistry Sajib"},{"key":"e_1_2_1_191_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779045"},{"key":"e_1_2_1_192_1","volume-title":"Data Science and Big Data Analytics","author":"\u00a0al Shiva Prakash"},{"key":"e_1_2_1_193_1","volume-title":"Proceedings of the International Conference on Machine Learning. 1050\u20131059","author":"Gal Yarin","year":"2016"},{"key":"e_1_2_1_194_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2018.12.010"},{"key":"e_1_2_1_195_1","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-179443"},{"key":"e_1_2_1_196_1","unstructured":"Amazon.com Inc. 2018. Amazon EC2 Spot Lets you Pause and Resume Your Workloads. https:\/\/aws.amazon.com\/about-aws\/whats-new\/2017\/11\/amazon-ec2-spot-lets-you-pause-and-resume-your-workloads\/.  Amazon.com Inc. 2018. Amazon EC2 Spot Lets you Pause and Resume Your Workloads. https:\/\/aws.amazon.com\/about-aws\/whats-new\/2017\/11\/amazon-ec2-spot-lets-you-pause-and-resume-your-workloads\/."},{"key":"e_1_2_1_197_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509413.2509416"},{"key":"e_1_2_1_198_1","volume-title":"2020 IEEE International Conference on Web Services (ICWS\u201920)","year":"2020"},{"key":"e_1_2_1_199_1","first-page":"86","article-title":"Game-theoretic resource pricing and provisioning strategies in cloud systems","volume":"13","author":"Valerio Valerio Di","year":"2016","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_2_1_200_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787473"},{"key":"e_1_2_1_201_1","doi-asserted-by":"publisher","DOI":"10.1145\/2964791.2901452"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447583","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:37Z","timestamp":1750195717000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447583"}},"subtitle":["Foundations and Future Directions"],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":202,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,5,31]]}},"alternative-id":["10.1145\/3447583"],"URL":"https:\/\/doi.org\/10.1145\/3447583","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"2020-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}