Higher SLA satisfaction in datacenters with continuous VM placement constraints
暂无分享,去创建一个
[1] Satish Narayanasamy,et al. DoublePlay: parallelizing sequential logging and replay , 2011, ASPLOS XVI.
[2] Mendel Rosenblum,et al. The design and implementation of a log-structured file system , 1991, SOSP '91.
[3] James Lau,et al. File System Design for an NFS File Server Appliance , 1994, USENIX Winter.
[4] Paramvir Bahl,et al. Towards highly reliable enterprise network services via inference of multi-level dependencies , 2007, SIGCOMM.
[5] Sanjeev Khanna,et al. On provenance and privacy , 2010, ICDT '11.
[6] Yitao Duan,et al. Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining , 2008, SDM.
[7] Robert Tappan Morris,et al. Eyo: Device-Transparent Personal Storage , 2011, USENIX Annual Technical Conference.
[8] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[9] Robbert van Renesse,et al. Byzantine Chain Replication , 2012, OPODIS.
[10] Sanjeev Arora,et al. Probabilistic checking of proofs: a new characterization of NP , 1998, JACM.
[11] Angela Demke Brown,et al. Comprehensive kernel instrumentation via dynamic binary translation , 2012, ASPLOS XVII.
[12] Andrea C. Arpaci-Dusseau,et al. *-Box: Towards Reliability and Consistency in Dropbox-like File Synchronization Services , 2013, HotStorage.
[13] Renato J. O. Figueiredo,et al. A case for grid computing on virtual machines , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[14] Yitao Duan,et al. P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users , 2010, USENIX Security Symposium.
[15] Fabien Hermenier,et al. BtrPlace: A Flexible Consolidation Manager for Highly Available Applications , 2013, IEEE Transactions on Dependable and Secure Computing.
[16] Srinath T. V. Setty,et al. A Hybrid Architecture for Interactive Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.
[17] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[18] Scott Shenker,et al. Mostly parallel garbage collection , 1991, PLDI '91.
[19] Elisabetta Di Nitto,et al. Reconfiguration Primitives for Self-Adapting Overlays in Distributed Publish-Subscribe Systems , 2012, 2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems.
[20] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, IEEE Symposium on Security and Privacy.
[21] David Hardisty,et al. On the Internet , 2000, Biological Psychiatry.
[22] Jens Groth,et al. Short Pairing-Based Non-interactive Zero-Knowledge Arguments , 2010, ASIACRYPT.
[23] Jeff Huang,et al. LEAP: lightweight deterministic multi-processor replay of concurrent java programs , 2010, FSE '10.
[24] Nicholas Nethercote,et al. How to shadow every byte of memory used by a program , 2007, VEE '07.
[25] Vijayaraghavan Soundararajan,et al. The impact of management operations on the virtualized datacenter , 2010, ISCA '10.
[26] Xavier Lorca,et al. Bin Repacking Scheduling in Virtualized Datacenters , 2011, CP.
[27] Jean-Philippe Martin,et al. Fast Byzantine Consensus , 2006, IEEE Trans. Dependable Secur. Comput..
[28] Eli Ben-Sasson,et al. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge , 2013, CRYPTO.
[29] Luís E. T. Rodrigues,et al. Lightweight cooperative logging for fault replication in concurrent programs , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[30] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[31] Calton Pu,et al. Mistral: Dynamically Managing Power, Performance, and Adaptation Cost in Cloud Infrastructures , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[32] Paul Francis,et al. SplitX: high-performance private analytics , 2013, SIGCOMM.
[33] Srinivasan Seshan,et al. Mercury: a scalable publish-subscribe system for internet games , 2002, NetGames '02.
[34] Sudarshan Rao. Operational Fault Detection in cellular wireless base-stations , 2006, IEEE Transactions on Network and Service Management.
[35] Cong Wang,et al. Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.
[36] J. Gregory Steffan,et al. Compiler Support for Fine-Grain Software-Only Checkpointing , 2012, CC.
[37] Benjamin Braun,et al. Verifying computations with state , 2013, IACR Cryptol. ePrint Arch..
[38] Brian D. Noble,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .
[39] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[40] Andreas Haeberlen,et al. Having your cake and eating it too: routing security with privacy protections , 2011, HotNets-X.
[41] Gerald J. Popek,et al. Formal requirements for virtualizable third generation architectures , 1974, SOSP '73.
[42] Kenneth van Surksum. Book: VMware vSphere 4.1 HA and DRS Technical deepdive , 2010 .
[43] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[44] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[45] Sangmin Lee,et al. Upright cluster services , 2009, SOSP '09.
[46] Edward Walker,et al. Benchmarking Amazon EC2 for High-Performance Scientific Computing , 2008, login Usenix Mag..
[47] Reza Sherafat Kazemzadeh,et al. Reliable and Highly Available Distributed Publish/Subscribe Service , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.
[48] Xavier Lorca,et al. Choco: an Open Source Java Constraint Programming Library , 2008 .
[49] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[50] Mahadev Satyanarayanan,et al. Scale and performance in a distributed file system , 1988, TOCS.
[51] Ion Stoica,et al. ODR: output-deterministic replay for multicore debugging , 2009, SOSP '09.
[52] Luiz André Barroso,et al. The Case for Energy-Proportional Computing , 2007, Computer.
[53] Andrew Warfield,et al. Xen and the art of virtualization , 2003, SOSP '03.
[54] Carsten Lund,et al. Proof verification and the hardness of approximation problems , 1998, JACM.
[55] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[56] Asim Kadav,et al. Fine-grained fault tolerance using device checkpoints , 2013, ASPLOS '13.
[57] Sean Quinlan,et al. Venti: A New Approach to Archival Storage , 2002, FAST.
[58] Jing Zhang,et al. A model-based approach to adding autonomic capabilities to network fault management system , 2008, NOMS.
[59] Brian J. Watson,et al. Autonomic Virtual Machine Placement in the Data Center , 2008 .
[60] T. S. Eugene Ng,et al. The Impact of Virtualization on Network Performance of Amazon EC2 Data Center , 2010, 2010 Proceedings IEEE INFOCOM.
[61] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[62] Srinath T. V. Setty,et al. Making argument systems for outsourced computation practical (sometimes) , 2012, NDSS.
[63] Andrea C. Arpaci-Dusseau,et al. A file is not a file: understanding the I/O behavior of Apple desktop applications , 2011, SOSP 2011.
[64] Alex Delis,et al. Hint-Based Execution of Workloads in Clouds with Nefeli , 2013, IEEE Transactions on Parallel and Distributed Systems.
[65] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[66] Peter Winkler,et al. Comparing information without leaking it , 1996, CACM.
[67] Benjamin Braun,et al. Resolving the conflict between generality and plausibility in verified computation , 2013, EuroSys '13.
[68] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.
[69] Ion Stoica,et al. Declarative networking , 2009, Commun. ACM.
[70] Andreas Haeberlen,et al. PeerReview: practical accountability for distributed systems , 2007, SOSP.
[71] Akshay Kumar,et al. Granary: Comprehensive Kernel Module Instrumentation , 2012 .
[72] Peter Desnoyers,et al. Memory buddies: exploiting page sharing for smart colocation in virtualized data centers , 2009, VEE '09.
[73] Anees Shaikh,et al. A Cost-Aware Elasticity Provisioning System for the Cloud , 2011, 2011 31st International Conference on Distributed Computing Systems.
[74] Michael Dahlin,et al. Making Byzantine Fault Tolerant Systems Tolerate Byzantine Faults , 2009, NSDI.
[75] Adi Shamir,et al. IP = PSPACE , 1992, JACM.
[76] Malgorzata Steinder,et al. A scalable application placement controller for enterprise data centers , 2007, WWW '07.
[77] Jeffrey M. Squyres,et al. Checkpoint/Restart-Enabled Parallel Debugging , 2010, EuroMPI.
[78] László Babai,et al. Trading group theory for randomness , 1985, STOC '85.
[79] Charles Zhang,et al. Stride: Search-based deterministic replay in polynomial time via bounded linkage , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[80] Andrzej Kochut,et al. Dynamic Placement of Virtual Machines for Managing SLA Violations , 2007, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management.
[81] Nir Shavit,et al. Software transactional memory , 1995, PODC '95.
[82] Akshat Verma,et al. pMapper: Power and Migration Cost Aware Application Placement in Virtualized Systems , 2008, Middleware.
[83] Aameek Singh,et al. Server-storage virtualization: integration and load balancing in data centers , 2008, HiPC 2008.
[84] Marko Vukolic,et al. The next 700 BFT protocols , 2010, EuroSys '10.
[85] Andrew Warfield,et al. Live migration of virtual machines , 2005, NSDI.
[86] Yuanyuan Zhou,et al. Learning from mistakes: a comprehensive study on real world concurrency bug characteristics , 2008, ASPLOS.
[87] Andrew J. Blumberg. Toward Practical and Unconditional Verification of Remote Computations , 2011, HotOS.
[88] Ludger Fiege,et al. Self-stabilizing Publish/Subscribe Systems: Algorithms and Evaluation , 2005, Euro-Par.
[89] Andrea C. Arpaci-Dusseau,et al. Optimistic crash consistency , 2013, SOSP.
[90] Arati Baliga,et al. Detecting Kernel-Level Rootkits Using Data Structure Invariants , 2011, IEEE Transactions on Dependable and Secure Computing.
[91] Eitan Farchi,et al. Concurrent bug patterns and how to test them , 2003, Proceedings International Parallel and Distributed Processing Symposium.
[92] Bryan Ford. Icebergs in the Clouds: The Other Risks of Cloud Computing , 2012, HotCloud.
[93] Xin Li,et al. A Realistic Evaluation of Memory Hardware Errors and Software System Susceptibility , 2010, USENIX Annual Technical Conference.
[94] Jia Wang,et al. Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[95] Priya Narasimhan,et al. Thema: Byzantine-fault-tolerant middleware for Web-service applications , 2005, 24th IEEE Symposium on Reliable Distributed Systems (SRDS'05).
[96] Cristiano Giuffrida,et al. We Crashed, Now What? , 2010, HotDep.
[97] Miguel Castro,et al. Fast byte-granularity software fault isolation , 2009, SOSP '09.
[98] Fred B. Schneider,et al. Hypervisor-based fault tolerance , 1996, TOCS.
[99] Jeffrey Dean,et al. Designs, Lessons and Advice from Building Large Distributed Systems , 2009 .
[100] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[101] Madan Musuvathi,et al. Iterative context bounding for systematic testing of multithreaded programs , 2007, PLDI '07.
[102] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[103] Alysson Neves Bessani,et al. DepSky: dependable and secure storage in a cloud-of-clouds , 2011, EuroSys '11.
[104] Samuel T. King,et al. Recovery domains: an organizing principle for recoverable operating systems , 2009, ASPLOS.
[105] Yale N. Patt,et al. Metadata update performance in file systems , 1994, OSDI '94.
[106] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[107] Xu Chen,et al. Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions , 2008, OSDI.
[108] Christof Fetzer,et al. Automatically Tolerating Arbitrary Faults in Non-malicious Settings , 2013, 2013 Sixth Latin-American Symposium on Dependable Computing.
[109] Mary Baker,et al. Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..
[110] Angelos D. Keromytis,et al. ASSURE: automatic software self-healing using rescue points , 2009, ASPLOS.
[111] Toby Velte,et al. Microsoft Virtualization with Hyper-V , 2009 .
[112] Craig Gentry,et al. Quadratic Span Programs and Succinct NIZKs without PCPs , 2013, IACR Cryptol. ePrint Arch..
[113] Michael E. Kounavis,et al. A systematic approach to building high performance software-based CRC generators , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).
[114] Gregory Cooper,et al. Thialfi: a client notification service for internet-scale applications , 2011, SOSP '11.
[115] Elliot K. Kolodner,et al. Guaranteeing High Availability Goals for Virtual Machine Placement , 2011, 2011 31st International Conference on Distributed Computing Systems.
[116] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[117] Kaiwen Zhang,et al. Total Order in Content-Based Publish/Subscribe Systems , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[118] Thomas F. Wenisch,et al. PowerNap: eliminating server idle power , 2009, ASPLOS.
[119] Hein Meling,et al. BChain: Byzantine Replication with High Throughput and Embedded Reconfiguration , 2014, OPODIS.
[120] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[121] Andreas Haeberlen,et al. NetReview: Detecting When Interdomain Routing Goes Wrong , 2009, NSDI.
[122] Paramvir Bahl,et al. Detailed diagnosis in enterprise networks , 2009, SIGCOMM '09.
[123] Emmett Witchel,et al. Ensuring operating system kernel integrity with OSck , 2011, ASPLOS XVI.
[124] Benjamin Braun,et al. Taking Proof-Based Verified Computation a Few Steps Closer to Practicality , 2012, USENIX Security Symposium.
[125] Xiaowei Yang,et al. CloudCmp: comparing public cloud providers , 2010, IMC '10.
[126] Samuel T. King,et al. Debugging Operating Systems with Time-Traveling Virtual Machines (Awarded General Track Best Paper Award!) , 2005, USENIX Annual Technical Conference, General Track.
[127] Van-Anh Truong,et al. Availability in Globally Distributed Storage Systems , 2010, OSDI.
[128] Kaiwen Zhang,et al. Distributed Ranked Data Dissemination in Social Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[129] Koen De Bosschere,et al. JaRec: a portable record/replay environment for multi‐threaded Java applications , 2004, Softw. Pract. Exp..
[130] Leslie Lamport,et al. Paxos Made Simple , 2001 .
[131] Anirudha Sahoo,et al. On Theory of VM Placement: Anomalies in Existing Methodologies and Their Mitigation Using a Novel Vector Based Approach , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[132] Gabriel Bracha,et al. Asynchronous Byzantine Agreement Protocols , 1987, Inf. Comput..
[133] Haibo Chen,et al. ORDER: Object centRic DEterministic Replay for Java , 2011, USENIX Annual Technical Conference.
[134] Todd M. Austin,et al. A case for unlimited watchpoints , 2012, ASPLOS XVII.
[135] Yang Wang,et al. All about Eve: Execute-Verify Replication for Multi-Core Servers , 2012, OSDI.
[136] Arun Venkataramani,et al. Black-box and Gray-box Strategies for Virtual Machine Migration , 2007, NSDI.
[137] 工藤 真臣,et al. VMware vSphere 4 , 2009 .
[138] Pramod Bhatotia,et al. Orchestrating the Deployment of Computations in the Cloud with Conductor , 2012, NSDI.
[139] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[140] Patrick Stuedi,et al. WhereStore: location-based data storage for mobile devices interacting with the cloud , 2010, MCS '10.
[141] Yuanyuan Zhou,et al. PRES: probabilistic replay with execution sketching on multiprocessors , 2009, SOSP '09.
[142] Johan Tordsson,et al. Policy-Driven Service Placement Optimization in Federated Clouds , 2011 .
[143] Geoffrey H. Kuenning,et al. Automated hoarding for mobile computers , 1997, SOSP.
[144] Joan Feigenbaum,et al. Structural cloud audits that protect private information , 2013, CCSW.
[145] Justin Thaler,et al. Time-Optimal Interactive Proofs for Circuit Evaluation , 2013, CRYPTO.
[146] Abhishek Chandra,et al. Starling: Minimizing Communication Overhead in Virtualized Computing Platforms Using Decentralized Affinity-Aware Migration , 2010, 2010 39th International Conference on Parallel Processing.
[147] Krishna P. Gummadi,et al. Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services , 2012, USENIX Security Symposium.
[148] Dhabaleswar K. Panda,et al. IMCa: A High Performance Caching Front-End for GlusterFS on InfiniBand , 2008, 2008 37th International Conference on Parallel Processing.
[149] John Paul Walters,et al. A Comparison of Virtualization Technologies for HPC , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).
[150] Xin Wu,et al. NetPilot: automating datacenter network failure mitigation , 2012, SIGCOMM '12.
[151] Allen Grogan Clement,et al. UpRight fault tolerance , 2010 .
[152] François Laburthe,et al. Cumulative Scheduling with Task Intervals , 1996, JICSLP.
[153] SoundararajanVijayaraghavan,et al. The impact of management operations on the virtualized datacenter , 2010 .
[154] Jason Flinn,et al. Rethink the sync , 2006, OSDI '06.
[155] Jong-Deok Choi,et al. Deterministic replay of Java multithreaded applications , 1998, SPDT '98.
[156] Xi Wang,et al. Software fault isolation with API integrity and multi-principal modules , 2011, SOSP.
[157] Jason Nieh,et al. Record and transplay: partial checkpointing for replay debugging across heterogeneous systems , 2011, SIGMETRICS '11.
[158] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[159] Angelos D. Keromytis,et al. REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points , 2011, IWSEC.
[160] Silvio Micali,et al. Zero-knowledge sets , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[161] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[162] Marko Vukolic,et al. Robust data sharing with key-value stores , 2012, DSN.
[163] Thomas E. Anderson,et al. F10: A Fault-Tolerant Engineered Network , 2013, NSDI.
[164] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[165] Catherine C. Marshall,et al. Cimbiosys: a platform for content-based partial replication , 2009, NSDI 2009.
[166] Miguel Castro,et al. BASE: using abstraction to improve fault tolerance , 2001, SOSP.
[167] Thomas Schulze,et al. An energy aware framework for virtual machine placement in cloud federated data centres , 2012, 2012 Third International Conference on Future Systems: Where Energy, Computing and Communication Meet (e-Energy).
[168] Franz Wotawa,et al. Fault detection in multi-threaded c++ server applications , 2007, PPOPP.
[169] David I. August,et al. SWIFT: software implemented fault tolerance , 2005, International Symposium on Code Generation and Optimization.
[170] George Candea,et al. Execution synthesis: a technique for automated software debugging , 2010, EuroSys '10.
[171] Jeff Huang,et al. CLAP: recording local executions to reproduce concurrency failures , 2013, PLDI.
[172] Gaetano Borriello,et al. Peer-To-Peer Backup for Personal Area Networks , 2003 .
[173] Frédéric Cuppens,et al. Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation , 2004, ICICS.
[174] Carsten Lund,et al. Algebraic methods for interactive proof systems , 1992, JACM.
[175] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[176] Reza Sherafat Kazemzadeh,et al. Opportunistic Multipath Forwarding in Content-Based Publish/Subscribe Overlays , 2012, Middleware.
[177] Larry Rudolph,et al. How to Do a Million Watchpoints: Efficient Debugging Using Dynamic Instrumentation , 2008, CC.
[178] Mark Bickford,et al. Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures , 2008, NSDI.
[179] David S. Rosenblum,et al. Design and evaluation of a wide-area event notification service , 2001, TOCS.
[180] Karl Aberer,et al. A self-organized, fault-tolerant and scalable replication scheme for cloud storage , 2010, SoCC '10.
[181] Steven Hand,et al. The Seven Deadly Sins of Cloud Computing Research , 2012, HotCloud.
[182] Xiaohua Jia,et al. Data storage auditing service in cloud computing: challenges, methods and opportunities , 2011, World Wide Web.
[183] Yael Tauman Kalai,et al. Delegating computation: interactive proofs for muggles , 2008, STOC.
[184] Matías Toril,et al. Learning of model parameters for fault diagnosis in wireless networks , 2010, Wirel. Networks.
[185] C. Lee Giles,et al. CiteSeer x : a cloud perspective , 2010 .
[186] Anne-Marie Kermarrec,et al. The many faces of publish/subscribe , 2003, CSUR.
[187] Miguel Correia,et al. Practical Hardening of Crash-Tolerant Systems , 2012, USENIX Annual Technical Conference.
[188] Bianca Schroeder,et al. Cosmic rays don't strike twice: understanding the nature of DRAM errors and the implications for system design , 2012, ASPLOS XVII.
[189] Ian Lumb,et al. A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.
[190] Benjamin Cheung,et al. Statistical algorithms in fault detection and prediction: Toward a healthier network , 2005, Bell Labs Technical Journal.
[191] Harish Patil,et al. PinADX: an interface for customizable debugging with dynamic instrumentation , 2012, CGO '12.
[192] Krste Asanovic,et al. Mondrix: memory isolation for linux using mondriaan memory protection , 2005, SOSP '05.
[193] Xavier Lorca,et al. Entropy: a consolidation manager for clusters , 2009, VEE '09.