{"id":"https://openalex.org/W2519835867","doi":"https://doi.org/10.1109/hpcsim.2016.7568396","title":"Anomaly detection for scientific workflow applications on networked clouds","display_name":"Anomaly detection for scientific workflow applications on networked clouds","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2519835867","doi":"https://doi.org/10.1109/hpcsim.2016.7568396","mag":"2519835867"},"language":"en","primary_location":{"id":"doi:10.1109/hpcsim.2016.7568396","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcsim.2016.7568396","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017589330","display_name":"Prathamesh Gaikwad","orcid":null},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]},{"id":"https://openalex.org/I69048370","display_name":"Renaissance Computing Institute","ror":"https://ror.org/01s91ey96","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535","https://openalex.org/I170897317","https://openalex.org/I69048370"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Prathamesh Gaikwad","raw_affiliation_strings":["RENCI - UNC Chapel Hill"],"affiliations":[{"raw_affiliation_string":"RENCI - UNC Chapel Hill","institution_ids":["https://openalex.org/I69048370","https://openalex.org/I114027177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063480283","display_name":"Anirban Mandal","orcid":"https://orcid.org/0000-0001-5145-8618"},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]},{"id":"https://openalex.org/I69048370","display_name":"Renaissance Computing Institute","ror":"https://ror.org/01s91ey96","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535","https://openalex.org/I170897317","https://openalex.org/I69048370"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anirban Mandal","raw_affiliation_strings":["RENCI - UNC Chapel Hill"],"affiliations":[{"raw_affiliation_string":"RENCI - UNC Chapel Hill","institution_ids":["https://openalex.org/I69048370","https://openalex.org/I114027177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072444330","display_name":"Paul Ruth","orcid":"https://orcid.org/0000-0003-1744-847X"},"institutions":[{"id":"https://openalex.org/I69048370","display_name":"Renaissance Computing Institute","ror":"https://ror.org/01s91ey96","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535","https://openalex.org/I170897317","https://openalex.org/I69048370"]},{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul Ruth","raw_affiliation_strings":["RENCI - UNC Chapel Hill"],"affiliations":[{"raw_affiliation_string":"RENCI - UNC Chapel Hill","institution_ids":["https://openalex.org/I69048370","https://openalex.org/I114027177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005056823","display_name":"Gideon Juve","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gideon Juve","raw_affiliation_strings":["USC Information Sciences Institute"],"affiliations":[{"raw_affiliation_string":"USC Information Sciences Institute","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075187387","display_name":"Dariusz Kr\u00f3l","orcid":"https://orcid.org/0000-0002-2715-6000"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dariusz Krol","raw_affiliation_strings":["USC Information Sciences Institute"],"affiliations":[{"raw_affiliation_string":"USC Information Sciences Institute","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031941569","display_name":"Ewa Deelman","orcid":"https://orcid.org/0000-0001-5106-503X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ewa Deelman","raw_affiliation_strings":["USC Information Sciences Institute"],"affiliations":[{"raw_affiliation_string":"USC Information Sciences Institute","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5017589330"],"corresponding_institution_ids":["https://openalex.org/I114027177","https://openalex.org/I69048370"],"apc_list":null,"apc_paid":null,"fwci":3.4278,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.93679135,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"645","last_page":"652"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8910092711448669},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.845187783241272},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7897043228149414},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7709037065505981},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5048516392707825},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5021121501922607},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4914160966873169},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.44326645135879517},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.41351693868637085},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3799450695514679},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.2180120050907135},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0918387770652771}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8910092711448669},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.845187783241272},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7897043228149414},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7709037065505981},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5048516392707825},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5021121501922607},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4914160966873169},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.44326645135879517},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.41351693868637085},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3799450695514679},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2180120050907135},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0918387770652771},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpcsim.2016.7568396","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcsim.2016.7568396","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W790410098","https://openalex.org/W1567699184","https://openalex.org/W1604669054","https://openalex.org/W1941096926","https://openalex.org/W1968371014","https://openalex.org/W1978239142","https://openalex.org/W1983545421","https://openalex.org/W1985847831","https://openalex.org/W2008817097","https://openalex.org/W2016305103","https://openalex.org/W2053125529","https://openalex.org/W2053449529","https://openalex.org/W2084651355","https://openalex.org/W2095345875","https://openalex.org/W2119381135","https://openalex.org/W2122646361","https://openalex.org/W2128525985","https://openalex.org/W2129666400","https://openalex.org/W2148317584","https://openalex.org/W2522722940","https://openalex.org/W2790978849","https://openalex.org/W4231620004","https://openalex.org/W6634092829","https://openalex.org/W7042352617"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W3210364259","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4300558037","https://openalex.org/W4377864969","https://openalex.org/W3030345572"],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2,47],"cloud":[3,25,113],"technologies":[4],"and":[5,43,65,71,78,108,155],"on-demand":[6],"network":[7],"circuits":[8],"have":[9],"created":[10],"an":[11,85],"unprecedented":[12],"opportunity":[13],"to":[14,20,32,61,72,101],"enable":[15],"complex":[16],"scientific":[17,106,153],"workflow":[18],"applications":[19,109],"run":[21],"on":[22,37,96,111],"dynamic,":[23],"networked":[24,112],"infrastructure.":[26,79],"However,":[27],"it":[28],"is":[29,58],"extremely":[30,59],"challenging":[31],"reliably":[33],"execute":[34,110],"these":[35,48],"workflows":[36,107,154],"distributed":[38],"clouds":[39],"because":[40],"performance":[41,103,146],"anomalies":[42,57,104,147],"faults":[44],"are":[45],"frequent":[46],"systems.":[49,114],"Hence,":[50],"accurate,":[51],"automatic,":[52],"proactive,":[53],"online":[54,97],"detection":[55,87,125,141],"of":[56,67,76,120,151],"important":[60],"pinpoint":[62],"the":[63,68,74,133],"time":[64],"source":[66],"observed":[69],"anomaly":[70,86,124],"guide":[73],"adaptation":[75],"application":[77],"In":[80],"this":[81],"work,":[82],"we":[83],"present":[84,116],"algorithm":[88,142],"that":[89,137],"uses":[90],"auto-regression":[91,122],"(AR)":[92],"based":[93,123,140],"statistical":[94],"methods":[95],"monitoring":[98],"time-series":[99],"data":[100],"detect":[102,145],"when":[105],"We":[115],"a":[117,149],"thorough":[118],"evaluation":[119],"our":[121,138],"approach":[126],"by":[127],"injecting":[128],"artificial,":[129],"competing":[130],"loads":[131],"into":[132],"system.":[134],"Results":[135],"show":[136],"AR":[139],"can":[143],"accurately":[144],"for":[148],"variety":[150],"exemplar":[152],"applications.":[156]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
