Cloud Computing and Services Science
暂无分享,去创建一个
Markus Helfert | Jorge Cardoso | Donald Ferguson | Victor Méndez Muñoz | M. Helfert | J. Cardoso | D. Ferguson | V. Muñoz
[1] Ion Stoica,et al. BlinkDB: queries with bounded errors and bounded response times on very large data , 2012, EuroSys '13.
[2] Hato Schmeiser,et al. Assekuranz 2015 - Eine Standortbestimmung. Neue Koordinaten im deutschsprachigen Versicherungsmarkt , 2010 .
[3] Dirk Fahland,et al. Supporting Domain Experts to Select and Configure Precise Compliance Rules , 2013, Business Process Management Workshops.
[4] Frank Leymann,et al. Compliance Domains: A Means to Model Data-Restrictions in Cloud Environments , 2011, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference.
[5] Min Chen,et al. Statistical Learning for Anomaly Detection in Cloud Server Systems: A Multi-Order Markov Chain Framework , 2018, IEEE Transactions on Cloud Computing.
[6] Zhiqiang Yao,et al. Toward Anomaly Detection in IaaS Cloud Computing Platforms , 2015 .
[7] Irfan Gul,et al. Distributed Cloud Intrusion Detection Model , 2011 .
[8] Martin Knahl,et al. Anomaly Detection in IaaS Clouds , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[9] Erik Elmroth,et al. Performance Anomaly Detection and Bottleneck Identification , 2015, ACM Comput. Surv..
[10] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[11] Jeffrey P. Buzen,et al. MASF - Multivariate Adaptive Statistical Filtering , 1995, Int. CMG Conference.
[12] Gang Yin,et al. Magnifier: Online Detection of Performance Problems in Large-Scale Cloud Computing Systems , 2011, 2011 IEEE International Conference on Services Computing.
[13] Brian S. Penn,et al. Using self-organizing maps to visualize high-dimensional data , 2005, Comput. Geosci..
[14] Karsten Schwan,et al. E2EProf: Automated End-to-End Performance Management for Enterprise Systems , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[15] Ken Schwaber,et al. Agile Software Development with SCRUM , 2001 .
[16] Matteo Frigo. A Fast Fourier Transform Compiler , 1999, PLDI.
[17] Sanjay Ranka,et al. Conditional Anomaly Detection , 2007, IEEE Transactions on Knowledge and Data Engineering.
[18] Frank Leymann,et al. Standards-Based DevOps Automation and Integration Using TOSCA , 2014, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing.
[19] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[20] Cesare Furlanello,et al. mlpy: Machine Learning Python , 2012, ArXiv.
[21] Dirk Fahland,et al. Separating Compliance Management and Business Process Management , 2011, Business Process Management Workshops.
[22] Bernhard Mitschang,et al. Policy4TOSCA: A Policy-Aware Cloud Service Provisioning Approach to Enable Secure Cloud Computing , 2013, OTM Conferences.
[23] Song Fu,et al. Exploring Time and Frequency Domains for Accurate and Automated Anomaly Detection in Cloud Computing Systems , 2013, 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing.
[24] Ahmet Palazoglu,et al. Detection and classification of abnormal process situations using multidimensional wavelet domain hidden Markov trees , 2000 .
[25] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[26] Song Fu,et al. Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing Infrastructures , 2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems.
[27] Paramvir Bahl,et al. Towards highly reliable enterprise network services via inference of multi-level dependencies , 2007, SIGCOMM.
[28] Jim X. Chen,et al. Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment , 2015 .
[29] Vanish Talwar,et al. Online detection of utility cloud anomalies using metric distributions , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.
[30] Vanish Talwar,et al. Statistical techniques for online anomaly detection in data centers , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.
[31] M. Brian Blake,et al. Service-Oriented Computing and Cloud Computing: Challenges and Opportunities , 2010, IEEE Internet Computing.
[32] Ruth Breu,et al. Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning , 2012, EternalS@ECAI.
[33] Eelco Visser,et al. DSL Engineering - Designing, Implementing and Using Domain-Specific Languages , 2013 .
[34] Rajkumar Buyya,et al. Towards autonomic detection of SLA violations in Cloud infrastructures , 2012, Future Gener. Comput. Syst..
[35] Shazia Wasim Sadiq,et al. Modeling Control Objectives for Business Process Compliance , 2007, BPM.
[36] Song Fu,et al. Wavelet-based multi-scale anomaly identification in cloud computing systems , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[37] Manfred Reichert,et al. Modeling the Resource Perspective of Business Process Compliance Rules with the Extended Compliance Rule Graph , 2014, BMMDS/EMMSAD.
[38] Theo Lynn,et al. A survey of Cloud monitoring tools: Taxonomy, capabilities and objectives , 2014, J. Parallel Distributed Comput..
[39] Schahram Dustdar,et al. Low level Metrics to High level SLAs - LoM2HiS framework: Bridging the gap between monitored metrics and SLA parameters in cloud environments , 2010, 2010 International Conference on High Performance Computing & Simulation.
[40] Amin Vahdat,et al. Pip: Detecting the Unexpected in Distributed Systems , 2006, NSDI.
[41] Manfred Reichert,et al. Enabling Flexibility in Process-Aware Information Systems: Challenges, Methods, Technologies , 2012 .
[42] Carlos Maltzahn,et al. Ceph: a scalable, high-performance distributed file system , 2006, OSDI '06.