The main goal of this research is to contribute to automated performance anomaly detection for large-scale and complex distributed systems, especially for Big Data applications within cloud computing. The main points that we will investigate are: - Automated detection of anomalous performance behaviors by finding the relevant performance metrics with which to characterize behavior of systems. - Performance anomaly localization: To pinpoint the cause of a performance anomaly due to internal or external faults. - Investigation of the possibility of anomaly prediction. Failure prediction aims to determine the possible occurrences of catastrophic events in the near future and will enable system developers to utilize effective monitoring solu...
In the last decades, many works have been done to enhance data performances in the computer field. D...
This thesis investigates the possibility of using anomaly detection on performance data of virtual s...
Counteracting cyber threats to ensure secure cyberspace faces great challenges as cyber-attacks are ...
The main goal of this thesis is to contribute to the research on automated performance anomaly detec...
Late detection and manual resolutions of performance anomalies in Cloud Computing and Big Data syste...
Abstract Effectively detecting run-time performance anomalies is crucial for clouds to identify abno...
In recent years, microservices have gained popularity due to their benefits such as increased mainta...
Due to the growth of Big Data processing technologies and cloudcomputing services, it is common to h...
Context: With an increasing number of applications running on a microservices-based cloud system (su...
Software applications can feature intrinsic variability in their execution time due to interference ...
Cloud is one of the emerging technologies in the field of computer science and is extremely popular ...
Distributed systems have become pervasive in current society. From laptops and mobile phones, to ser...
Cloud computing technology is on the rise as it provides an easy to scale environment for Internet u...
Cloud datacenters comprise hundreds or thousands of disparate application services, each having stri...
Fundamental properties of cloud computing such as resource sharing and on-demand self-servicing is d...
In the last decades, many works have been done to enhance data performances in the computer field. D...
This thesis investigates the possibility of using anomaly detection on performance data of virtual s...
Counteracting cyber threats to ensure secure cyberspace faces great challenges as cyber-attacks are ...
The main goal of this thesis is to contribute to the research on automated performance anomaly detec...
Late detection and manual resolutions of performance anomalies in Cloud Computing and Big Data syste...
Abstract Effectively detecting run-time performance anomalies is crucial for clouds to identify abno...
In recent years, microservices have gained popularity due to their benefits such as increased mainta...
Due to the growth of Big Data processing technologies and cloudcomputing services, it is common to h...
Context: With an increasing number of applications running on a microservices-based cloud system (su...
Software applications can feature intrinsic variability in their execution time due to interference ...
Cloud is one of the emerging technologies in the field of computer science and is extremely popular ...
Distributed systems have become pervasive in current society. From laptops and mobile phones, to ser...
Cloud computing technology is on the rise as it provides an easy to scale environment for Internet u...
Cloud datacenters comprise hundreds or thousands of disparate application services, each having stri...
Fundamental properties of cloud computing such as resource sharing and on-demand self-servicing is d...
In the last decades, many works have been done to enhance data performances in the computer field. D...
This thesis investigates the possibility of using anomaly detection on performance data of virtual s...
Counteracting cyber threats to ensure secure cyberspace faces great challenges as cyber-attacks are ...