Proceedings of the 9th International Conference on Autonomic Computing 2012
DOI: 10.1145/2371536.2371572
|View full text |Cite
|
Sign up to set email alerts
|

Ubl

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 122 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…The ADS proposed in this paper relies on system monitoring data corresponding to software counters (such as CPU consumption, free memory...), collected through the hypervisors or the operating systems hosting the virtual machines on which the cloud services are deployed. As shown in previous works Nguyen et al (2013); Gong et al (2010a); Dean et al (2012); Guan and Fu (2013); Silvestre et al (2014); , such data are well suited to reflect the behavior of the monitored target system at runtime. In our context, relying on such data is also motivated by the requirement to develop generic and service-agnostic detection mechanisms that can be easily applied to different types of services.…”
Section: Introductionmentioning
confidence: 93%
See 2 more Smart Citations
“…The ADS proposed in this paper relies on system monitoring data corresponding to software counters (such as CPU consumption, free memory...), collected through the hypervisors or the operating systems hosting the virtual machines on which the cloud services are deployed. As shown in previous works Nguyen et al (2013); Gong et al (2010a); Dean et al (2012); Guan and Fu (2013); Silvestre et al (2014); , such data are well suited to reflect the behavior of the monitored target system at runtime. In our context, relying on such data is also motivated by the requirement to develop generic and service-agnostic detection mechanisms that can be easily applied to different types of services.…”
Section: Introductionmentioning
confidence: 93%
“…As for any computing system, the performance of a cloud service can be observed and analyzed based on several means such as system or application logs, system monitoring data, or audit trails as shown in Simache et al (2002); Simache and Kaâniche (2001); Tan et al (2012); Dean et al (2012).…”
Section: Monitoringmentioning
confidence: 99%
See 1 more Smart Citation
“…The literature thus applies self-adaptive systems to manage these threats. Beginning by setting protection scopes, the abnormal behavior can be monitored, analyzed, identified, anticipated, and isolated without much intervention of the centralized system administrator (Chen et al, 2014;Claudel et al, 2006;Dean et al, 2012;Qu et al, 2010). The distributed agents, if provided with proper decision capability, can monitor lowerlevel or front-line signals and react accordingly.…”
Section: Casementioning
confidence: 99%
“…This happens as a result of exhaustion of resources of operating system, accumulation of errors, data corruption, memory leaks, unreleased file locks, data fragments, unreleased database locks and so on. Software aging has been reported in cloud environment [2], web servers [3]- [4], enterprise clusters [5], online transaction processing systems [6], spacecraft systems [7] and military systems [8]. The presented work here focuses on software aging in virtualized environment as it provides the platform for cloud computing environment.…”
Section: Introductionmentioning
confidence: 99%