.. De-fautes, Module, p.63

<. and <. Nop>-<pause-distribution=, uniform" min="0" max="5000

P. Contact, <sip:[$my_dn]@[local_ip]:[local_port];transport=[transport];ob>; +sip.ice;reg-id=1;+sip.instance= REGISTER sip:[$peer_dn]@[service

P. Contact, [local_port];transport=[transport]; ob>;+sip.ice;reg-id=1;+sip.instance= "<urn, pp.3600-3603

P. Contact, ];transport=[transport]; ob>;+sip.ice;reg-id=1;+sip.instance= "<urn

. Allow, . Prack, . Invite, . Ack, . Bye et al., send> <recv response="200" rtd="register"> <action> <add assign_to=

P. Contact, ];transport=[transport]; ob>;+sip.ice;reg-id=1;+sip.instance="<urn:uuid:00000000-0000-0000-0000-000000000001>" Contact: <sip:[$peer_dn]@[local_ip]:[local_port];transport=[transport]; ob>;expires=0;+sip.ice;reg-id=1;+sip.instance="<urn Expires, p.3600

C. Contact, ];transport=[transport]; ob>;+sip.ice Max-Forwards, p.70

. Call-id, Contact: <sip:[$peer_dn]@[$nat_ip_addr][$nat_port];transport=[transport]; ob>;+sip.ice Content-Length: 0 ]]> </send> <recv response="200" rtd="call-teardown"> </recv> <!--definition of the response time repartition table (unit is ms) --> <ResponseTimeRepartition value=, pp.3000-4000, 1000.

<. Aggarwal, J. Han, J. Wang, and P. S. Yu, A Framework for Clustering Evolving Data Streams, Proceedings of the 29th International Conference on Very Large Data Bases, pp.81-92, 2003.
DOI : 10.1016/B978-012722442-8/50016-1

J. Aggarwal, J. Han, P. S. Wang, and . Yu, A Framework for Projected Clustering of High Dimensional Data Streams, Proceedings of the Thirtieth International Conference on Very Large Data Bases, pp.852-863, 2004.
DOI : 10.1016/B978-012088469-8.50075-9

C. Charu and . Aggarwal, A survey of stream clustering algorithms, Data Clustering : Algorithms and Applications, pp.231-258, 2013.

C. Charu, . Aggarwal, K. Chandan, and . Reddy, Data clustering : Algorithms and applications, Chapman & Hall/CRC, pp.2013-2040, 2013.

J. Rakesh-agrawal, D. Gehrke, P. Gunopulos, and . Raghavan, Automatic subspace clustering of high dimensional data for data mining applications, ACM SIGMOD Record, vol.27, issue.2, pp.94-105, 1998.
DOI : 10.1145/276305.276314

]. E. Aleskerov, B. Freisleben, and B. Rao, CARDWATCH: a neural network based database mining system for credit card fraud detection, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr), pp.220-226, 1997.
DOI : 10.1109/CIFER.1997.618940

K. Allix, F. Tegawendé, Q. Bissyandé, J. Jérome, and . Klein, Empirical assessment of machine learning-based malware detectors for Android, Empirical Software Engineering, vol.98888, issue.14, pp.183-211, 2016.
DOI : 10.1109/SP.2012.16

]. J. Arlat, M. Aguera, L. Amat, Y. Crouzet, J. Fabre et al., Fault injection for dependability validation: a methodology and some applications, IEEE Transactions on Software Engineering, vol.16, issue.2, pp.166-182, 1990.
DOI : 10.1109/32.44380

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

E. Bauer and R. Adams, Reliability and availability of cloud computing, p.2012, 2012.
DOI : 10.1002/9781118393994

. Ll, Í. Berral, R. Goiri, F. Nou, J. Julià et al., Towards Energy-aware Scheduling in Data Centers Using Machine Learning, Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking, e-Energy '10, pp.215-224, 2010.

K. Beyer, J. Goldstein, R. Ramakrishnan, and U. Shaft, When Is ???Nearest Neighbor??? Meaningful?, Database Theory ? ICDT'99, pp.217-235, 1999.
DOI : 10.1007/3-540-49257-7_15

URL : https://minds.wisconsin.edu/bitstream/handle/1793/60174/TR1377.pdf?sequence=1

S. Amjad-hussain-bhat, D. Patra, and . Jena, Machine learning approach for intrusion detection on cloud virtual machines, International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol.2, issue.6, pp.56-66, 2013.

P. Bodík, R. Griffith, C. Sutton, A. Fox, M. Jordan et al., Statistical Machine Learning Makes Automatic Control Practical for Internet Datacenters, Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud'09, 2009.

P. Andrew and . Bradley, The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern recognition, vol.30, issue.7, pp.1145-1159, 1997.

]. Breiman, Random Forests, Machine Learning, pp.5-32, 2001.

]. J. Buzen and U. O. Gagliardi, The evolution of virtual machine architecture, Proceedings of the June 4-8, 1973, national computer conference and exposition on, AFIPS '73, pp.291-299, 1973.
DOI : 10.1145/1499586.1499667

F. Cao, M. Ester, W. Qian, and A. Zhou, Density-Based Clustering over an Evolving Data Stream with Noise, 2006 SIAM Conference on Data Mining, pp.328-339, 2006.
DOI : 10.1137/1.9781611972764.29

C. Cassisi, A. Ferro, R. Giugno, G. Pigola, and A. Pulvirenti, Enhancing density-based clustering: Parameter reduction and outlier detection, Information Systems, vol.38, issue.3, pp.317-330, 2013.
DOI : 10.1016/j.is.2012.09.001

]. Cerf, M. Berekmeri, B. Robu, N. Marchand, and S. Bouchenak, Cost function based event triggered Model Predictive Controllers application to Big Data Cloud services, 2016 IEEE 55th Conference on Decision and Control (CDC), p.2016, 2016.
DOI : 10.1109/CDC.2016.7798503

URL : https://hal.archives-ouvertes.fr/hal-01348687

F. Tony, G. H. Chan, . Golub, J. Randall, and . Leveque, Updating formulae and a pairwise algorithm for computing sample variances, COMPSTAT 1982 5th Symposium held at Toulouse 1982, pp.30-41, 1982.

A. Varun-chandola, V. Banerjee, and . Kumar, Anomaly detection, ACM Computing Surveys, vol.41, issue.3, pp.1-15, 2009.
DOI : 10.1145/1541880.1541882

J. S. Chase, D. C. Anderson, P. N. Thakar, M. Amin, R. P. Vahdat et al., Managing energy and server resources in hosting centers, ACM SIGOPS Operating Systems Review, vol.35, issue.5, pp.103-116, 2001.
DOI : 10.1145/502059.502045

L. Cherkasova, K. Ozonat, N. Mi, J. Symons, and E. Smirni, Automated anomaly detection and performance modeling of enterprise applications, ACM Transactions on Computer Systems, vol.27, issue.3, pp.1-6, 2009.
DOI : 10.1145/1629087.1629089

I. Cohen, M. Goldszmidt, T. Kelly, J. Symons, and J. S. Chase, Correlating instrumentation data to system states : a building block for automated diagnosis and control, Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation USENIX Association . (Cité en, pp.16-16, 2004.

B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears, Benchmarking cloud serving systems with YCSB, Proceedings of the 1st ACM symposium on Cloud computing, SoCC '10, pp.143-154, 2010.
DOI : 10.1145/1807128.1807152

URL : http://www.brianfrankcooper.net/pubs/ycsb.pdf

D. Dean, H. Nguyen, and X. Gu, UBL, Proceedings of the 9th international conference on Autonomic computing, ICAC '12, pp.191-200, 2012.
DOI : 10.1145/2371536.2371572

]. D. Denning, An Intrusion-Detection Model, IEEE Transactions on Software Engineering, issue.2, pp.222-232, 1987.

S. Songyun-duan, K. Babu, and . Munagala, Fa : A system for automating failure diagnosis, IEEE 25th International Conference on Data Engineering, pp.1012-1023, 2009.

G. Esfandani and H. Abolhassani, MSDBSCAN: Multi-density Scale-Independent Clustering Algorithm Based on DBSCAN, Advanced Data Mining and Applications, pp.202-213, 2010.
DOI : 10.1145/335191.335388

]. Ester, H. Peter-kriegel, J. Sander, and X. Xu, A density-based algorithm for discovering clusters in large spatial databases with noise, KDD, pp.226-231, 1996.

M. Farshchi, J. G. Schneider, I. Weber, and J. Grundy, Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis, 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), pp.24-34, 2015.
DOI : 10.1109/ISSRE.2015.7381796

M. Farshchi, J. G. Schneider, I. Weber, and J. Grundy, Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis, 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), pp.24-34, 2015.
DOI : 10.1109/ISSRE.2015.7381796

]. I. Foster, Y. Zhao, I. Raicu, and S. Lu, Cloud Computing and Grid Computing 360-Degree Compared, 2008 Grid Computing Environments Workshop, pp.1-10, 2008.
DOI : 10.1109/GCE.2008.4738445

M. Gander, M. Felderer, B. Katt, A. Tolbaru, R. Breu et al., Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning, pp.103-116, 2013.
DOI : 10.1007/978-3-642-45260-4_8

W. Matt, S. Gardner, and . Dorling, Artificial neural networks (the multilayer perceptron)?a review of applications in the atmospheric sciences Atmospheric environment, pp.2627-2636, 1998.

]. R. Goldberg, Architecture of Virtual Machines, Proceedings of the Workshop on Virtual Computer Systems, pp.74-112, 1973.

P. Robert and . Goldberg, Survey of Virtual Machine Research, Computer, vol.7, issue.9, pp.34-45, 1974.

Z. Gong, X. Gu, and J. Wilkes, Press : Predictive elastic resource scaling for cloud systems, 2010 International Conference on Network and Service Management, pp.9-16, 2010.

C. Guan-2012a-]-qiang-guan, Z. Chiu, S. Zhang, and . Fu, Efficient and Accurate Anomaly Identification Using Reduced Metric Space in Utility Clouds, Networking, Architecture and Storage (NAS), 2012 IEEE 7th International Conference on, pp.207-216, 2012.

Z. Qiang-guan, S. Zhang, and . Fu, Ensemble of bayesian predictors and decision trees for proactive failure management in cloud computing systems, Journal of Communications, vol.7, issue.1, pp.52-61, 2012.

]. T. Hastie, R. Tibshirani, and J. H. Friedman, The elements of statistical learning : Data mining, inference, and prediction. Springer series in statistics, 2001.

]. L. Heberlein, Network security monitor (NSM)?final report, 1995.

]. Hsu and C. Lin, A comparison of methods for multiclass support vector machines, IEEE Transactions on Neural Networks, vol.13, issue.2, pp.415-425, 2002.

T. K. Mei-chen-hsueh, R. K. Tsai, and . Iyer, Fault injection techniques and tools, Computer, vol.30, issue.4, pp.75-82, 1997.
DOI : 10.1109/2.585157

]. A. Jain, M. N. Murty, and P. J. Flynn, Data clustering: a review, ACM Computing Surveys, vol.31, issue.3, pp.264-323, 1999.
DOI : 10.1145/331499.331504

A. Lakhina, M. Crovella, and C. Diot, Diagnosing Network-wide Traffic Anomalies, Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications , SIGCOMM '04, pp.219-230, 2004.
DOI : 10.1145/1015467.1015492

URL : http://cs-people.bu.edu/anukool/pubs/subspacemethod-sigc04.pdf

J. Jean-claude-laprie, A. Arlat, J. Costes, and . Blanquart, Guide de la sûreté de fonctionnement. Cépaduès-éditions, 1995.

I. ]-yann-lecun, . Kanter, A. Sara, and . Solla, Second Order Properties of Error Surfaces : Learning Time and Generalization, Advances in Neural Information Processing Systems, pp.918-924, 1991.

S. J. Wenke-lee, K. W. Stolfo, and . Mok, A data mining framework for building intrusion detection models, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.120-132, 1999.
DOI : 10.1109/SECPRI.1999.766909

A. Christian-leistner, J. Saffari, H. Santner, and . Bischof, Semi-supervised random forests, IEEE 12th International Conference on Computer Vision, pp.506-513, 2009.

K. Leung and C. Leckie, Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters, Proceedings of the Twenty-eighth Australasian Conference on Computer Science - ACSC '05, pp.333-342, 2005.

M. Zhang, A. Jette, R. Sivasubramaniam, and . Sahoo, BlueGene/L Failure Analysis and Prediction Models, Dependable Systems and Networks, 2006. DSN 2006. International Conference on, pp.425-434, 2006.

Y. Liang, H. Zhang, R. Xiong, and . Sahoo, Failure Prediction in IBM BlueGene/L Event Logs, Seventh IEEE International Conference on Data Mining (ICDM 2007), pp.583-588, 2007.
DOI : 10.1109/ICDM.2007.46

L. Sebastian and M. Lazarescu, Incremental Clustering of Dynamic Data Streams Using Connectivity Based Representative Points, Data Knowl. Eng, vol.68, issue.1, pp.1-27, 2009.

]. J. Macqueen, Some Methods for classification and analysis of multivariate observations, Procedings of the Fifth Berkeley Symposium on Math, Statistics, and Probability, pp.281-297, 1967.

L. Matthew, B. N. Massie, D. E. Chun, and . Culler, The Ganglia Distributed Monitoring System : Design, Implementation And Experience, Parallel Computing, vol.30, 2003.

]. A. Matsunaga and J. A. Fortes, On the Use of Machine Learning to Predict the Time and Resources Consumed by Applications, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp.495-504, 2010.
DOI : 10.1109/CCGRID.2010.98

M. Miyazawa, M. Hayashi, and R. Stadler, vNMF: Distributed fault detection using clustering approach for network function virtualization, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.640-645, 2015.
DOI : 10.1109/INM.2015.7140349

]. B. Mukherjee, L. T. Heberlein, and K. N. Levitt, Network intrusion detection, IEEE Network, vol.8, issue.3, pp.26-41, 1994.
DOI : 10.1109/65.283931

]. Natella, D. Cotroneo, S. Henrique, and . Madeira, Assessing Dependability with Software Fault Injection, ACM Computing Surveys, vol.48, issue.3, pp.44-2016, 2016.
DOI : 10.1109/DSN.2001.941426

H. Nguyen, Z. Shen, Y. Tan, and X. Gu, FChain: Toward Black-Box Online Fault Localization for Cloud Systems, 2013 IEEE 33rd International Conference on Distributed Computing Systems, pp.21-30, 2013.
DOI : 10.1109/ICDCS.2013.26

M. Hayashi and R. Stadler, Universal fault detection for NFV using SOM-based clustering, Network Operations and Management Symposium (APNOMS), 2015 17th Asia-Pacific, pp.315-320, 2015.

D. Pham, Z. Chen, R. K. Kalbarczyk, and . Iyer, CloudVal: A framework for validation of virtualization environment in cloud infrastructure, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pp.189-196, 2011.
DOI : 10.1109/DSN.2011.5958218

J. Foster, T. Provost, R. Fawcett, and . Kohavi, The Case Against Accuracy Estimation for Comparing Induction Algorithms, Proceedings of the Fifteenth International Conference on Machine Learning, ICML '98, pp.445-453, 1998.

F. Salfner and M. Malek, Using Hidden Semi-Markov Models for Effective Online Failure Prediction, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007), pp.161-174, 2007.
DOI : 10.1109/SRDS.2007.35

]. Salfner, M. Lenk, and M. Malek, A survey of online failure prediction methods, ACM Computing Surveys, vol.42, issue.3, pp.1-10, 2010.
DOI : 10.1145/1670679.1670680

C. Sauvanaud, G. Silvestre, M. Kaâniche, and K. Kanoun, Data Stream Clustering for Online Anomaly Detection in Cloud Applications, 2015 11th European Dependable Computing Conference (EDCC), pp.73-134, 2015.
DOI : 10.1109/EDCC.2015.22

URL : https://hal.archives-ouvertes.fr/hal-01211774

C. Sauvanaud, K. Lazri, M. Kaâniche, and K. Kanoun, Anomaly Detection and Root Cause Localization in Virtual Network Functions, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), 2016.
DOI : 10.1109/ISSRE.2016.32

URL : https://hal.archives-ouvertes.fr/hal-01419014

]. R. Scandariato, J. Walden, A. Hovsepyan, and W. Joosen, Predicting Vulnerable Software Components via Text Mining, IEEE Transactions on Software Engineering, vol.40, issue.10, pp.993-1006, 2014.
DOI : 10.1109/TSE.2014.2340398

B. Schölkopf, J. C. Platt, J. C. Shawe-taylor, A. J. Smola, and R. C. Williamson, Estimating the Support of a High-Dimensional Distribution, Neural Computation, vol.6, issue.1, pp.1443-1471, 2001.
DOI : 10.1214/aos/1069362732

R. Shockley, J. Smart, D. Romero-morales, and P. Tufano, Analytics : The real-world use of big data. IBM Institute for Business Value, pp.2012-2028

D. Serrano, S. Bouchenak, Y. Kouki, F. Alvares-de-oliveira-jr, T. Ledoux et al., SLA guarantees for cloud services, Future Generation Computer Systems, vol.54, pp.233-246, 2016.
DOI : 10.1016/j.future.2015.03.018

URL : https://hal.archives-ouvertes.fr/hal-01162654

B. Abhishek, H. Sharma, M. Chen, K. Ding, G. Yoshihira et al., Fault detection and localization in distributed systems using invariant relationships, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.1-8, 2013.

]. Shen, C. Stewart, C. Li, and X. Li, Referencedriven Performance Anomaly Identification, SIGMETRICS Perform. Eval. Rev, vol.37, issue.1, pp.85-96, 2009.
DOI : 10.1145/1555349.1555360

URL : http://www.cs.rochester.edu/~kshen/papers/sigmetrics2009.pdf

C. Guthemberg-silvestre, M. Sauvanaud, K. Kaâniche, and . Kanoun, An anomaly detection approach for scale-out storage systems, 26th International Symposium on Computer Architecture and High Performance Computing, pp.45-68, 2014.

D. Guthemberg-silvestre, K. Buffoni, S. Pires, P. Monnet, and . Sens, Boosting streaming video delivery with wisereplica, Transactions on Large-Scale Data-and Knowledge-Centered Systems XX, pp.34-58, 2015.

C. Guthemberg-silvestre, M. Sauvanaud, K. Kaâniche, and . Kanoun, Tejo : A Supervised Anomaly Detection Scheme for NewSQL Databases, 7th International Workshop on Software Engineering for Resilient Systems, pp.35-76, 2015.

C. Simache and M. Kaâniche, Measurement-based availability analysis of Unix systems in a distributed environment, Proceedings 12th International Symposium on Software Reliability Engineering, pp.346-355, 2001.
DOI : 10.1109/ISSRE.2001.989489

URL : https://hal.archives-ouvertes.fr/hal-00852425

C. Simache, M. Kaâniche, and A. Saidane, Event log based dependability analysis of Windows NT and 2K systems, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings., 2002.
DOI : 10.1109/PRDC.2002.1185651

]. D. Stott, B. Floering, D. Burke, Z. Kalbarczpk, and R. K. Iyer, NF- TAPE : a framework for assessing dependability in distributed systems with lightweight fault injectors, Computer Performance and Dependability Symposium, pp.91-100, 2000.

Y. Tan, X. Gu, and H. Wang, Adaptive system anomaly prediction for large-scale hosting infrastructures, Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, PODC '10, pp.173-182, 2010.
DOI : 10.1145/1835698.1835741

URL : http://dance.csc.ncsu.edu/papers/podc10.pdf

Y. Tan, H. Nguyen, Z. Shen, X. Gu, C. Venkatramani et al., PREPARE: Predictive Performance Anomaly Prevention for Virtualized Cloud Systems, 2012 IEEE 32nd International Conference on Distributed Computing Systems, pp.285-294, 2012.
DOI : 10.1109/ICDCS.2012.65

URL : http://www4.ncsu.edu/~ytan2/icdcs2012_tan.pdf

]. , T. , and Y. Chen, Bellwether analysis, ACM Transactions on Knowledge Discovery from Data, vol.3, issue.1, pp.1-12, 2009.
DOI : 10.1145/1497577.1497582

]. Van-hulse, M. Taghi, A. Khoshgoftaar, and . Napolitano, Experimental perspectives on learning from imbalanced data, Proceedings of the 24th international conference on Machine learning, ICML '07, pp.935-942, 2007.
DOI : 10.1145/1273496.1273614

]. Wang, V. Talwar, K. Schwan, and P. Ranganathan, Online detection of utility cloud anomalies using metric distributions, 2010 IEEE Network Operations and Management Symposium -NOMS 2010, pp.96-103, 2010.

Y. Watanabe, H. Otsuka, M. Sonoda, S. Kikuchi, and Y. Matsumoto, Online failure prediction in cloud datacenters by real-time message pattern learning, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp.504-511, 2012.
DOI : 10.1109/CloudCom.2012.6427566

J. Sonya, P. Wierman, and . Narasimhan, Vajra : Evaluating byzantine-fault-tolerant distributed systems, pp.163-183, 2008.

]. A. Williams, S. M. Pertet, and P. Narasimhan, Tiresias: Black-Box Failure Prediction in Distributed Systems, 2007 IEEE International Parallel and Distributed Processing Symposium, pp.1-8, 2007.
DOI : 10.1109/IPDPS.2007.370345

C. Xiaoyun, M. Yufang, Z. Yan, and W. Ping, GMDBS- CAN : Multi-Density DBSCAN Cluster Based on Grid, IEEE International Conference on, pp.780-783, 2008.

]. Xu, L. Huang, A. Fox, D. Patterson, and M. I. Jordan, Detecting large-scale system problems by mining console logs, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pp.117-132, 2009.
DOI : 10.1145/1629575.1629587

URL : http://www.sigops.org/sosp/sosp09/papers/xu-sosp09.pdf

D. Yuan, Y. Luo, X. Zhuang, G. R. Rodrigues, X. Zhao et al., Simple Testing Can Prevent Most Critical Failures : An Analysis of Production Failures in Distributed Data-Intensive Systems, 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14) 2014. USENIX Association. (Cité en page 63, pp.249-265, 2014.

A. Lotfi and . Zadeh, Fuzzy sets, Information and control, vol.8, issue.3, pp.338-353, 1965.

]. Zhang, R. Ramakrishnan, and M. Livny, BIRCH : An Efficient Data Clustering Method for Very Large Databases, 1996.

B. Zhang, M. Hong, B. Zhang, W. Deng, and . Lin, eCAD: Cloud Anomalies Detection From an Evolutionary View, 2013 International Conference on Cloud Computing and Big Data, pp.328-334, 2013.
DOI : 10.1109/CLOUDCOM-ASIA.2013.57