Parallel trace analysis: project deliverable D4.3

[1]  Peter Kilpatrick,et al.  A Lightweight Tool for Anomaly Detection in Cloud Data Centres , 2015, CLOSER.

[2]  Allen B. Downey,et al.  The elusive goal of workload characterization , 1999, PERV.

[3]  Soila Pertet,et al.  Causes of Failure in Web Applications (CMU-PDL-05-109) , 2005 .

[4]  Rajeev Gandhi,et al.  Light-weight black-box failure detection for distributed systems , 2012 .

[5]  Haifeng Chen,et al.  PeerWatch: a fault detection and diagnosis tool for virtualized consolidation systems , 2010, ICAC '10.

[6]  Ravi Kumar,et al.  Pig latin: a not-so-foreign language for data processing , 2008, SIGMOD Conference.

[7]  R. Khan,et al.  Sequential Tests of Statistical Hypotheses. , 1972 .

[8]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[9]  Riccardo Gusella,et al.  Characterizing the Variability of Arrival Processes with Indexes of Dispersion , 1991, IEEE J. Sel. Areas Commun..

[10]  Chengwei Wang,et al.  EbAT: online methods for detecting utility cloud anomalies , 2009, MDS '09.

[11]  Adam Barker,et al.  Varanus: In Situ Monitoring for Large Scale Cloud Systems , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[12]  Evgenia Smirni,et al.  Fastrack for taming burstiness and saving power in multi-tiered systems , 2010, 2010 22nd International Teletraffic Congress (lTC 22).

[13]  Archana Ganapathi,et al.  Why Do Internet Services Fail, and What Can Be Done About It? , 2002, USENIX Symposium on Internet Technologies and Systems.

[14]  Evgenia Smirni,et al.  Burstiness in Multi-tier Applications: Symptoms, Causes, and New Models , 2008, Middleware.

[15]  Michael I. Jordan,et al.  Characterizing, modeling, and generating workload spikes for stateful services , 2010, SoCC '10.

[16]  Neil J. Gunther Analyzing computer system performance with Perl::PDQ , 2005 .

[17]  João Paulo Magalhães,et al.  Adaptive Profiling for Root-Cause Analysis of Performance Anomalies in Web-Based Applications , 2011, 2011 IEEE 10th International Symposium on Network Computing and Applications.

[18]  Karsten Schwan,et al.  iManage: Policy-Driven Self-management for Enterprise-Scale Systems , 2007, Middleware.

[19]  Jerome A. Rolia,et al.  Automatic Stress Testing of Multi-tier Systems by Dynamic Bottleneck Switch Generation , 2009, Middleware.

[20]  Martin Arlitt,et al.  A workload characterization study of the 1998 World Cup Web site , 2000, IEEE Netw..

[21]  E. S. Page CONTINUOUS INSPECTION SCHEMES , 1954 .

[22]  Michael I. Jordan,et al.  Detecting large-scale system problems by mining console logs , 2009, SOSP '09.

[23]  Johan Tordsson,et al.  How will Your Workload Look Like in 6 Years? Analyzing Wikimedia's Workload , 2014, 2014 IEEE International Conference on Cloud Engineering.

[24]  Narendran Calluru Rajasekar,et al.  Exploitation of Vulnerabilities in Cloud Storage , 2010 .

[25]  Qiang Fu,et al.  Mining Invariants from Console Logs for System Problem Detection , 2010, USENIX Annual Technical Conference.

[26]  Erik Elmroth,et al.  Performance Anomaly Detection and Bottleneck Identification , 2015, ACM Comput. Surv..

[27]  Johan Tordsson,et al.  The CACTOS Vision of Context-Aware Cloud Topology Optimization and Simulation , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.

[28]  Randy H. Katz,et al.  Chukwa: A System for Reliable Large-Scale Log Collection , 2010, LISA.

[29]  Thomas Reidemeister,et al.  System monitoring with metric-correlation models: problems and solutions , 2009, ICAC '09.

[30]  Hai Jin,et al.  Improving disk I/O performance in a virtualized system , 2013, J. Comput. Syst. Sci..

[31]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[32]  John P. Rouillard Real-time Log File Analysis Using the Simple Event Correlator (SEC) , 2004, LISA.

[33]  Armando Fox,et al.  Fingerprinting the datacenter: automated classification of performance crises , 2010, EuroSys '10.

[34]  Babak Falsafi,et al.  Clearing the clouds: a study of emerging scale-out workloads on modern hardware , 2012, ASPLOS XVII.

[35]  Thomas Fahringer,et al.  Identification, Modelling and Prediction of Non-periodic Bursts in Workloads , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.

[36]  Paulo Veríssimo,et al.  Detection and Prediction of Resource-Exhaustion Vulnerabilities , 2008, 2008 19th International Symposium on Software Reliability Engineering (ISSRE).

[37]  Christopher B. Hauser,et al.  Evaluation methodology for the CACTOS runtime and prediction toolkits: project deliverable D5.4 , 2017 .

[38]  Fredrik Gustafsson,et al.  Adaptive filtering and change detection , 2000 .

[39]  Stephen E. Hansen,et al.  Automated System Monitoring and Notification with Swatch , 1993, LISA.

[40]  Kamal Dahbur,et al.  A survey of risks, threats and vulnerabilities in cloud computing , 2011, ISWSA '11.

[41]  James E. Prewett Analyzing cluster log files using Logsurfer , 2003 .

[42]  Johan Tordsson,et al.  Online Spike Detection in Cloud Workloads , 2015, 2015 IEEE International Conference on Cloud Engineering.