{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:21:23Z","timestamp":1759134083785,"version":"3.41.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2015,3,9]],"date-time":"2015-03-09T00:00:00Z","timestamp":1425859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Auton. Adapt. Syst."],"published-print":{"date-parts":[[2015,3,25]]},"abstract":"<jats:p>The complexity of systems is considered an obstacle to the progress of the IT industry. Autonomic computing is presented as the alternative to cope with the growing complexity. It is a holistic approach, in which the systems are able to configure, heal, optimize, and protect by themselves. Web-based applications are an example of systems where the complexity is high. The number of components, their interoperability, and workload variations are factors that may lead to performance failures or unavailability scenarios. The occurrence of these scenarios affects the revenue and reputation of businesses that rely on these types of applications.<\/jats:p>\n          <jats:p>\n            In this article, we present a self-healing framework for Web-based applications (\n            <jats:italic>SH\u00f5<\/jats:italic>\n            WA).\n            <jats:italic>SH\u00f5<\/jats:italic>\n            WA is composed by several modules, which monitor the application, analyze the data to detect and pinpoint anomalies, and execute recovery actions autonomously. The monitoring is done by a small aspect-oriented programming agent. This agent does not require changes to the application source code and includes adaptive and selective algorithms to regulate the level of monitoring. The anomalies are detected and pinpointed by means of statistical correlation. The data analysis detects changes in the server response time and analyzes if those changes are correlated with the workload or are due to a performance anomaly. In the presence of performance anomalies, the data analysis pinpoints the anomaly. Upon the pinpointing of anomalies,\n            <jats:italic>SH\u00f5<\/jats:italic>\n            WA executes a recovery procedure. We also present a study about the detection and localization of anomalies, the accuracy of the data analysis, and the performance impact induced by\n            <jats:italic>SH\u00f5<\/jats:italic>\n            WA. Two benchmarking applications, exercised through dynamic workloads, and different types of anomaly were considered in the study. The results reveal that (1) the capacity of\n            <jats:italic>SH\u00f5<\/jats:italic>\n            WA to detect and pinpoint anomalies while the number of end users affected is low; (2)\n            <jats:italic>SH\u00f5<\/jats:italic>\n            WA was able to detect anomalies without raising any false alarm; and (3)\n            <jats:italic>SH\u00f5<\/jats:italic>\n            WA does not induce a significant performance overhead (throughput was affected in less than 1%, and the response time delay was no more than 2 milliseconds).\n          <\/jats:p>","DOI":"10.1145\/2700325","type":"journal-article","created":{"date-parts":[[2015,3,9]],"date-time":"2015-03-09T19:03:01Z","timestamp":1425927781000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["<i>SH\u00f5<\/i>\n            WA"],"prefix":"10.1145","volume":"10","author":[{"given":"Jo\u00e3o Paulo","family":"Magalh\u00e3es","sequence":"first","affiliation":[{"name":"CIICESI, ESTGF-Polytechnic Institute of Porto"}]},{"given":"Luis Moura","family":"Silva","sequence":"additional","affiliation":[{"name":"CISUC, University of Coimbra"}]}],"member":"320","published-online":{"date-parts":[[2015,3,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Aberdeen Group. 2010. Web Performance Today. http:\/\/www.webperformancetoday.com\/2010\/06\/15\/everything-you-wanted-to-know-about-web-performance.  Aberdeen Group. 2010. Web Performance Today. http:\/\/www.webperformancetoday.com\/2010\/06\/15\/everything-you-wanted-to-know-about-web-performance."},{"key":"e_1_2_1_2_1","unstructured":"AppInternals\/SteelCentral. 2014. Riverbed Application Performance Management. http:\/\/www.riverbed.com\/products\/performance-management-control\/application-performance-management.  AppInternals\/SteelCentral. 2014. Riverbed Application Performance Management. http:\/\/www.riverbed.com\/products\/performance-management-control\/application-performance-management."},{"key":"e_1_2_1_3_1","unstructured":"Applications Manager. 2014. Application performance monitoring tool. http:\/\/www.manageengine.com\/products\/applications_manager\/.  Applications Manager. 2014. Application performance monitoring tool. http:\/\/www.manageengine.com\/products\/applications_manager\/."},{"volume-title":"Proceedings of the 8th Workshop on Hot Topics in Operating Systems. 33--38","author":"Remzi","key":"e_1_2_1_4_1","unstructured":"Remzi H. Arpaci-Dusseau and Andrea C. Arpaci-Dusseau. 2001. Fail-stutter fault tolerance . In Proceedings of the 8th Workshop on Hot Topics in Operating Systems. 33--38 . Remzi H. Arpaci-Dusseau and Andrea C. Arpaci-Dusseau. 2001. Fail-stutter fault tolerance. In Proceedings of the 8th Workshop on Hot Topics in Operating Systems. 33--38."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 9th Conference on Hot Topics in Operating Systems. 15","author":"Barham Paul","year":"2003","unstructured":"Paul Barham , Rebecca Isaacs , Richard Mortier , and Dushyanth Narayanan . 2003 . Magpie: Online modelling and performance-aware systems . In Proceedings of the 9th Conference on Hot Topics in Operating Systems. 15 . Paul Barham, Rebecca Isaacs, Richard Mortier, and Dushyanth Narayanan. 2003. Magpie: Online modelling and performance-aware systems. In Proceedings of the 9th Conference on Hot Topics in Operating Systems. 15."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2007.46"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2005.18"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/832311.837386"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-006-7562-4"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882327"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-008-0088-8"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/583854.582443"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/647883.738238"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks. 452--461","author":"Cherkasova Ludmila","year":"2008","unstructured":"Ludmila Cherkasova , Kivanc M. Ozonat , Ningfang Mi , Julie Symons , and Evgenia Smirni . 2008 . Anomaly&quest; application change&quest; or workload change&quest; towards automated detection of application performance anomaly and change . In Proceedings of the International Conference on Dependable Systems and Networks. 452--461 . Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi, Julie Symons, and Evgenia Smirni. 2008. Anomaly&quest; application change&quest; or workload change&quest; towards automated detection of application performance anomaly and change. In Proceedings of the International Conference on Dependable Systems and Networks. 452--461."},{"key":"e_1_2_1_15_1","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen Jacob","unstructured":"Jacob Cohen . 1988. Statistical Power Analysis for the Behavioral Sciences ( 2 nd ed.). Lawrence Erlbaum . Jacob Cohen. 1988. Statistical Power Analysis for the Behavioral Sciences (2nd ed.). Lawrence Erlbaum.","edition":"2"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.421.0005"},{"volume-title":"Proceedings of the the 9th International Symposium on Software Reliability Engineering. 283--292","author":"Garg Sachin","key":"e_1_2_1_17_1","unstructured":"Sachin Garg , Aad Van Moorsel , Kalyanaraman Vaidyanathan , and Kishor S. Trivedi . 1998. A methodology for detection and estimation of software aging . In Proceedings of the the 9th International Symposium on Software Reliability Engineering. 283--292 . Sachin Garg, Aad Van Moorsel, Kalyanaraman Vaidyanathan, and Kishor S. Trivedi. 1998. A methodology for detection and estimation of software aging. In Proceedings of the the 9th International Symposium on Software Reliability Engineering. 283--292."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.175"},{"key":"e_1_2_1_19_1","unstructured":"Gomez. 2014. Compuware Application Performance Management solution. http:\/\/www.ndm.net\/apm\/Compuware\/gomez.  Gomez. 2014. Compuware Application Performance Management solution. http:\/\/www.ndm.net\/apm\/Compuware\/gomez."},{"key":"e_1_2_1_20_1","unstructured":"HP Operations Manager. 2011. Fault and Performance Monitoring. Available at http:\/\/www8.hp.com\/us\/en\/software-solutions\/software.html&quest;compURI=1170678.  HP Operations Manager. 2011. Fault and Performance Monitoring. Available at http:\/\/www8.hp.com\/us\/en\/software-solutions\/software.html&quest;compURI=1170678."},{"key":"e_1_2_1_21_1","unstructured":"IBM Tivoli Monitoring. Proactive Monitoring. Available at http:\/\/www-03.ibm.com\/software\/products\/us\/en\/tivomoni\/.  IBM Tivoli Monitoring. Proactive Monitoring. Available at http:\/\/www-03.ibm.com\/software\/products\/us\/en\/tivomoni\/."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.853411"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053381"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1318471.1318523"},{"volume-title":"Proceedings of the International Symposium on Empirical Software Engineering. 91--100","author":"Li Lei","key":"e_1_2_1_27_1","unstructured":"Lei Li , Kalyanaraman Vaidyanathan , and Kishor S. Trivedi . 2002. An approach for estimation of software aging in a Web server . In Proceedings of the International Symposium on Empirical Software Engineering. 91--100 . Lei Li, Kalyanaraman Vaidyanathan, and Kishor S. Trivedi. 2002. An approach for estimation of software aging in a Web server. In Proceedings of the International Symposium on Empirical Software Engineering. 91--100."},{"key":"e_1_2_1_28_1","volume-title":"Retrieved","author":"Linden Greg","year":"2006","unstructured":"Greg Linden . 2006 . Make Data Useful by Greg Linden, Amazon.com . Retrieved January 29, 2015, from http:\/\/www.scribd.com\/doc\/4970486\/. Greg Linden. 2006. Make Data Useful by Greg Linden, Amazon.com. Retrieved January 29, 2015, from http:\/\/www.scribd.com\/doc\/4970486\/."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/306225.306235"},{"key":"e_1_2_1_30_1","unstructured":"Nagios. 2009. IT Infrastructure Monitoring. Available at http:\/\/www.nagios.org\/.  Nagios. 2009. IT Infrastructure Monitoring. Available at http:\/\/www.nagios.org\/."},{"key":"e_1_2_1_31_1","unstructured":"Oracle Glassfish Server. 2012. Java Application Servers. Available at http:\/\/www.oracle.com\/technetwork\/middleware\/glassfish\/.  Oracle Glassfish Server. 2012. Java Application Servers. Available at http:\/\/www.oracle.com\/technetwork\/middleware\/glassfish\/."},{"key":"e_1_2_1_32_1","series-title":"Lecture Notes in Business Information Processing","volume-title":"Business Process Management Workshops","author":"Pernici Barbara","unstructured":"Barbara Pernici . 2008. Self-healing systems and Web services: The WS-Diamond approach . In Business Process Management Workshops . Lecture Notes in Business Information Processing , Vol. 17 . Springer , 440--442. Barbara Pernici. 2008. Self-healing systems and Web services: The WS-Diamond approach. In Business Process Management Workshops. Lecture Notes in Business Information Processing, Vol. 17. Springer, 440--442."},{"key":"e_1_2_1_34_1","volume-title":"Retrieved","author":"Power Sean","year":"2010","unstructured":"Sean Power . 2010 . Metrics 101: What to Watch . Retrieved January 29, 2015, from http:\/\/www.slideshare.net\/bitcurrent\/metrics-101. Sean Power. 2010. Metrics 101: What to Watch. Retrieved January 29, 2015, from http:\/\/www.slideshare.net\/bitcurrent\/metrics-101."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-010-0122-y"},{"key":"e_1_2_1_36_1","unstructured":"Carroll Rheem. 2010. Consumer response to travel site performance. In A PhoCusWright and Akamai WHITEPAPER.  Carroll Rheem. 2010. Consumer response to travel site performance. In A PhoCusWright and Akamai WHITEPAPER."},{"volume-title":"Making Grids Work. Number 978-0-387-78447-2","author":"Rodrigues Nuno","key":"e_1_2_1_37_1","unstructured":"Nuno Rodrigues , D\u00e9cio Sousa , and Luis Silva . 2008. A fault-injector tool to evaluate failure detectors in grid-services . In Making Grids Work. Number 978-0-387-78447-2 . Springer , 261--271. Nuno Rodrigues, D\u00e9cio Sousa, and Luis Silva. 2008. A fault-injector tool to evaluate failure detectors in grid-services. In Making Grids Work. Number 978-0-387-78447-2. Springer, 261--271."},{"key":"#cr-split#-e_1_2_1_38_1.1","doi-asserted-by":"crossref","unstructured":"Chris Schneider Adam Barker and Simon Dobson. 2014. A survey of self-healing systems frameworks. Software: Practice and Experience. DOI: http:\/\/dx.doi.org\/10.1002\/spe.2250 10.1002\/spe.2250","DOI":"10.1002\/spe.2250"},{"key":"#cr-split#-e_1_2_1_38_1.2","doi-asserted-by":"crossref","unstructured":"Chris Schneider Adam Barker and Simon Dobson. 2014. A survey of self-healing systems frameworks. Software: Practice and Experience. DOI: http:\/\/dx.doi.org\/10.1002\/spe.2250","DOI":"10.1002\/spe.2250"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_2_1_40_1","series-title":"Lecture Notes in Computer Science","volume-title":"Programming Multi-Agent Systems","author":"Shehory Onn","unstructured":"Onn Shehory . 2006. A self-healing approach to designing and deploying complex, distributed and concurrent software systems . In Programming Multi-Agent Systems . Lecture Notes in Computer Science , Vol. 4411 . Springer , 3--13. Onn Shehory. 2006. A self-healing approach to designing and deploying complex, distributed and concurrent software systems. In Programming Multi-Agent Systems. Lecture Notes in Computer Science, Vol. 4411. Springer, 3--13."},{"key":"e_1_2_1_41_1","unstructured":"Bojan Simic. 2010. Ten Areas That Are Changing Market Dynamic in Web Performance Management. Available at http:\/\/www.trac-research.com\/web-performance\/.  Bojan Simic. 2010. Ten Areas That Are Changing Market Dynamic in Web Performance Management. Available at http:\/\/www.trac-research.com\/web-performance\/."},{"key":"e_1_2_1_42_1","unstructured":"Site 24x7. 2010. Website Monitoring. http:\/\/www.site24x7.com.  Site 24x7. 2010. Website Monitoring. http:\/\/www.site24x7.com."},{"key":"e_1_2_1_43_1","unstructured":"Wayne D. Smith. 2001. TPC-W: Benchmarking an Ecommerce Solution. Available at http:\/\/www.tpc.org\/tpcw\/.  Wayne D. Smith. 2001. TPC-W: Benchmarking an Ecommerce Solution. Available at http:\/\/www.tpc.org\/tpcw\/."},{"key":"e_1_2_1_44_1","unstructured":"Stress. Load and Stress Test Tool. http:\/\/linux.die.net\/man\/1\/stress.  Stress. Load and Stress Test Tool. http:\/\/linux.die.net\/man\/1\/stress."},{"key":"e_1_2_1_45_1","unstructured":"Zabbix. 2010. Enterprise Monitoring Solution. http:\/\/www.zabbix.com\/.  Zabbix. 2010. Enterprise Monitoring Solution. http:\/\/www.zabbix.com\/."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1972.10481251"}],"container-title":["ACM Transactions on Autonomous and Adaptive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2700325","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2700325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:44Z","timestamp":1750223264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2700325"}},"subtitle":["A Self-Healing Framework for Web-Based Applications"],"short-title":[],"issued":{"date-parts":[[2015,3,9]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3,25]]}},"alternative-id":["10.1145\/2700325"],"URL":"https:\/\/doi.org\/10.1145\/2700325","relation":{},"ISSN":["1556-4665","1556-4703"],"issn-type":[{"type":"print","value":"1556-4665"},{"type":"electronic","value":"1556-4703"}],"subject":[],"published":{"date-parts":[[2015,3,9]]},"assertion":[{"value":"2014-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-03-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}