F. Osman-abul, M. Bonchi, and . Nanni, Never walk alone: Uncertainty for anonymity in moving objects databases, IEEE 24th International Conference on, pp.376-385, 2008.

F. Osman-abul, M. Bonchi, and . Nanni, Anonymization of moving objects databases by clustering and perturbation, Information Systems, vol.35, issue.8, pp.884-910, 2010.

B. Agir, G. Thanasis, R. Papaioannou, K. Narendula, J. Aberer et al., User-side adaptive protection of location privacy in participatory sensing. GeoInformatica, vol.18, pp.165-191, 2014.

A. Faraz, L. Seyong, T. Mithuna, and T. Vijaykumar, Puma: Purdue mapreduce benchmarks suite, 2012.

D. Al-jumeily, A. Hussain, and P. Fergus, Using adaptive neural networks to provide self-healing autonomic software, International Journal of Space-Based and Situated Computing, vol.5, issue.3, pp.129-140, 2015.

M. Alamir and G. Bornard, On the stability of receding horizon control of nonlinear discretetime systems, Systems & Control Letters, vol.23, issue.4, pp.291-296, 1994.

A. Ali-eldin, J. Tordsson, and E. Elmroth, An adaptive hybrid elasticity controller for cloud infrastructures, IEEE Network Operations and Management Symposium (NOMS), pp.204-212, 2012.

A. Ali-eldin, M. Kihl, J. Tordsson, and E. Elmroth, Efficient provisioning of bursty scientific workloads on the cloud using adaptive elasticity control, Proceedings of the 3rd workshop on Scientific Cloud Computing, ScienceCloud '12, pp.31-40, 2012.

, Custom Applications and IaaS Trends, pp.2019-2020, 2017.

J. Almeida, V. Almeida, D. Ardagna, C. Francalanci, and M. Trubian, Resource management in the autonomic service-oriented architecture, Autonomic Computing, 2006. ICAC'06. IEEE International Conference on, pp.84-92, 2006.

A. Abdullah-alsaffar, H. P. Pham, C. Hong, E. Huh, and M. Aazam, An architecture of iot service delegation and resource allocation based on collaboration between fog and cloud computing, Mobile Information Systems, 2016.

. Amazon, Amazon web services AWS Auto Scaling, 2018.

.. Amazon and . Scaling, , 2018.

, Amazon. Amazon Web Services (AWS) -Cloud Computing Services, pp.2019-2020

. Amazon, Amazon Web Services -elastic MapReduce EMR, 2019.

. Amazon, Amazon web services EC2, pp.2019-2020

X. An, E. Rutten, J. Diguet, and A. Gamatié, Model-based design of correct controllers for dynamically reconfigurable architectures, ACM Transactions on Embedded Computing Systems (TECS), vol.15, issue.3, p.51, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01272077

M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, Geo-indistinguishability: Differential Privacy for Location-based Systems, CCS, pp.901-914, 2013.

C. S. Julio, I. Anjos, W. Carrera, A. L. Kolberg, L. B. Tibola et al., Mra++: Scheduling and data placement on mapreduce for heterogeneous environments, Future Generation Computer Systems, vol.42, pp.22-35, 2015.

I. Ari, B. Hong, E. L. Miller, A. Scott, D. Brandt et al., Managing flash crowds on the internet, 11th IEEE/ACM Int. Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, pp.246-249, 2003.

K. E. Årzén, A simple event-based PID controller, Preprints of the 14th World Congress of IFAC, 1999.

K. J. Aström, Event based control, Analysis and Design of Nonlinear Control Systems, pp.127-147, 2008.

K. J. Åström and T. Hägglund, PID controllers: theory, design, and tuning, Systems, and Automation Society, vol.2, 1995.

M. Berekmeri, D. Serrano, S. Bouchenak, N. Marchand, and B. Robu, A control approach for performance of big data systems, Proceeedings of the 19th World Congress of IFAC, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00980372

M. Berekmeri, Modeling and control of cloud services : application to MapReduce performance and dependability, 2015.
URL : https://hal.archives-ouvertes.fr/tel-01278177

M. Berekmeri, D. Serrano, S. Bouchenak, N. Marchand, and B. Robu, Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems, IEEE Transactions on Cloud Computing, vol.6, issue.4, pp.1004-1016, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01297026

R. Alastair, F. Beresford, and . Stajano, Location privacy in pervasive computing, IEEE Pervasive computing, issue.1, pp.46-55, 2003.

R. Alastair, F. Beresford, and . Stajano, Mix zones: User privacy in location-aware services, Proceedings of the Second IEEE Annual Conference on, pp.127-131, 2004.

I. Bilogrevic, K. Huguenin, M. Jadliwala, F. Lopez, J. Hubaux et al., Inferring Social Ties in Academic Networks Using Short-Range Wireless Communications, Wpes, pp.179-188, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00853975

V. Bindschaedler and R. Shokri, Synthesizing plausible privacy-preserving location traces, Security and Privacy (SP), 2016 IEEE Symposium on, pp.546-563, 2016.

A. Boutet, S. B. Mokhtar, L. Bouzouina, P. Bonnel, O. Brette et al., PRIVA'MOV: Analysing Human Mobility Through Multi-Sensor Datasets, NetMob, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01578557

I. Boutsis and V. Kalogeraki, Privacy preservation for participatory sensing data, 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp.103-113, 2013.

I. Boutsis and V. Kalogeraki, Location Privacy-Preserving Applications and Services, pp.373-398, 2018.

K. Cai, B. Gu, H. Hu, and Y. Li, Adaptive software testing with fixedmemory feedback, Journal of Systems and Software, vol.80, issue.8, pp.1328-1348, 2007.

L. Cano, G. Carello, and D. Ardagna, A framework for joint resource allocation of mapreduce and web service applications in a shared cloud cluster, Journal of Parallel and Distributed Computing, 2018.

F. Cappello, E. Caron, M. Dayde, F. Desprez, Y. Jegou et al., Grid'5000: A large scale and highly reconfigurable grid experimental testbed, Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, pp.99-106, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00684943

G. Christos, S. Cassandras, and . Lafortune, Introduction to discrete event systems, 2009.

S. Cerf, S. B. Mokhtar, S. Bouchenak, N. Marchand, and B. Robu, Dynamic Modeling of Location Privacy Protection Mechanisms, 18th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems (DAIS 2018), Held as Part of the 13th International Federated Conference on Distributed Computing Techniques (DisCoTec 2018), volume LNCS-10853 of Lecture Notes in Computer Science, pp.26-39, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01824641

S. Cerf, M. Berekmeri, N. Marchand, S. Bouchenak, and B. Robu, Adaptive Modelling and Control in Distributed Systems, Phd Forum 34th International Symposium on Reliable Distributed Systems (SRDS), 2015.
URL : https://hal.archives-ouvertes.fr/hal-01240558

S. Cerf, M. Berekmeri, B. Robu, N. Marchand, and S. Bouchenak, Adaptive Optimal Control of MapReduce Performance, Availability and Costs, 11th International Workshop on Feedback Computing (Feedback Computing, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01331024

S. Cerf, M. Berekmeri, B. Robu, N. Marchand, and S. Bouchenak, Cost Function based Event Triggered Model Predictive Controllers -Application to Big Data Cloud Services, Proceedings of the 55th IEEE International Conference on Decision and Control, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01348687

S. Cerf, M. Berekmeri, B. Robu, N. Marchand, and S. Bouchenak, Towards Control of MapReduce Performance and Availability, 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), 2016.
URL : https://hal.archives-ouvertes.fr/hal-01316521

S. Cerf, M. Berekmeri, B. Robu, N. Marchand, S. Bouchenak et al., Adaptive Feedforward and Feedback Control for Cloud Services, 20th IFAC World Congress (IFAC WC 2017, vol.50, pp.5504-5509, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01397666

S. Cerf, R. Birke, and L. Y. Chen, Duo Learning for Classifications with Noisy Labels, Continual Learning Workshop, Neural Information Processing Systems (NIPS), 2018.

S. Cerf, S. Bouchenak, B. Robu, N. Marchand, V. Primault et al., Automatic Privacy and Utility Preservation of Mobility Data: A Nonlinear Model-Based Approach, IEEE Transactions on Dependable and Secure Computing, 2019.
URL : https://hal.archives-ouvertes.fr/hal-01910687

S. Cerf, V. Primault, A. Boutet, S. B. Mokhtar, S. Bouchenak et al., Données de mobilité : protection de la vie privée vs. utilité des données, Conférence francophone d'informatique en parallélisme, architecture et système (ComPAS), Proceedings of the Conférence francophone d'informatique en parallélisme, architecture et système (ComPAS), 2017.

S. Cerf, V. Primault, A. Boutet, S. B. Mokhtar, R. Birke et al., Pulp: Achieving privacy and utility trade-off in user mobility data, Reliable Distributed Systems (SRDS), 2017 IEEE 36th Symposium on, pp.164-173, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01578635

S. Cerf, B. Robu, N. Marchand, A. Boutet, V. Primault et al., Toward an Easy Configuration of Location Privacy Protection Mechanisms, ACM/IFIP/USENIX Middleware conference, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01376640

S. Cerf, B. Robu, N. Marchand, S. B. Mokhtar, and S. Bouchenak, A control-theoretic approach for location privacy in mobile applications, IEEE Conference on Control Technology and Applications (CCTA), pp.1488-1493, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01863625

A. Chandra, W. Gong, and P. Shenoy, Dynamic resource allocation for shared data centers using online measurements, International Workshop on Quality of Service, pp.381-398, 2003.

A. Chandra, P. Pradhan, R. Tewari, S. Sahu, and P. Shenoy, An observation-based approach towards self-managing web servers, Computer Communications, vol.29, issue.8, pp.1174-1188, 2006.

K. Chatzikokolakis, C. Palamidessi, and M. Stronati, A predictive differentially-private mechanism for mobility traces, International Symposium on Privacy Enhancing Technologies Symposium, pp.21-41, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01011260

K. Chatzikokolakis, C. Palamidessi, and M. Stronati, Constructing elastic distinguishability metrics for location privacy, PETS, vol.2015, pp.156-170, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01270197

M. Chen, S. Mao, and Y. Liu, Big data: A survey. Mobile networks and applications, vol.19, pp.171-209, 2014.

C. Cheng, H. Yang, M. Lyu, and I. King, Where you like to go next: Successive point-of-interest recommendation, IJCAI International Joint Conference on Artificial Intelligence, vol.01, p.2013

C. Chow, M. F. Mokbel, and X. Liu, A peer-to-peer spatial cloaking algorithm for anonymous location-based service, Proceedings of the 14th ACM international symposium on Advances in geographic information systems, pp.171-178, 2006.

. Cloudtimes, Microsoft says to spend 90% of r&d on cloud strategy, 2011.

H. Rogério-de-lemos, . Giese, A. Hausi, M. Müller, J. Shaw et al., Software engineering for self-adaptive systems: A second research roadmap, Software Engineering for Self-Adaptive Systems II, pp.1-32, 2013.

T. D. Ruiter, A workload model for MapReduce, 2012.

J. Dean and S. Ghemawat, MapReduce: simplified data processing on large clusters, Communications of the ACM, vol.51, issue.1, pp.107-113, 2008.

M. Donkers and W. Heemels, Output-based event-triggered control with guaranteedgain and improved and decentralized event-triggering. Automatic Control, IEEE Transactions on, vol.57, issue.6, pp.1362-1376, 2012.

C. John, . Doyle, A. Bruce, A. R. Francis, and . Tannenbaum, Feedback control theory. Courier Corporation, 2013.

M. Duckham and L. Kulik, A formal model of obfuscation and negotiation for location privacy, International conference on pervasive computing, pp.152-170, 2005.

S. Durand and N. Marchand, Further results on event-based pid controller, Proceedings of the European Control Conference, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00368535

C. Dwork, Differential Privacy, Automata, Languages and Programming, vol.4052, pp.1-12, 2006.

A. Eqtami, D. V. Dimarogonas, and K. J. Kyriakopoulos, Event-triggered control for discretetime systems, Proceedings of the IEEE American Control Conference, 2010.

. Evolven,

, Downtime, outages and failures -understanding their true costs, 2013.

S. Shaheen, M. Fatima, N. Wooldridge, and . Jennings, A comparative study of game theoretic and evolutionary models of bargaining for software agents, Artificial Intelligence Review, vol.23, issue.2, pp.187-205, 2005.

K. Fawaz, G. Kang, and . Shin, Location privacy protection for smartphone users, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.239-250, 2014.

A. D. Ferguson, P. Bodik, S. Kandula, E. Boutin, and R. Fonseca, Jockey: guaranteed job latency in data parallel clusters, EuroSys, pp.99-112, 2012.

A. Filieri, M. Maggio, K. Angelopoulos, D. Nicolas, I. Ippolito et al., Software engineering meets control theory, Proceedings of the 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, pp.71-82, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01119461

L. Franceschi-bicchierai, Redditor cracks anonymous data trove to pinpoint muslim cab drivers, 2015.

S. Gambs, M. Killijian, and M. Cortez, Deanonymization Attack on Geolocated Data, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.789-797, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01242268

S. Gambs, M. Killijian, and M. Cortez, Show Me How You Move and I Will Tell You Who You Are, Transactions on Data Privacy, vol.4, issue.2, pp.103-126, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00556833

S. Gambs, M. Killijian, and M. Cortez, Next place prediction using mobility markov chains, Proceedings of the First Workshop on Measurement, Privacy, and Mobility, p.3, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00736947

A. Gandhi, M. Harchol-balter, R. Raghunathan, and M. Kozuch, Autoscale: Dynamic, robust capacity management for multi-tier data centers, ACM Transactions on Computer Systems (TOCS), vol.30, issue.4, p.14, 2012.

J. Gao and R. Jamidar, Machine learning applications for data center optimization, 2014.

E. Garcia, J. Panos, and . Antsaklis, Model-based event-triggered control for systems with quantization and time-varying network delays. Automatic Control, IEEE Transactions on, vol.58, issue.2, pp.422-434, 2013.

, GDPR. reform of eu data protection rules, 2018.

B. Gedik and L. Liu, A customizable k-anonymity model for protecting location privacy, 2004.

B. Gedik and L. Liu, Location privacy in mobile systems: A personalized anonymization model, Distributed Computing Systems, 2005. ICDCS 2005. Proceedings. 25th IEEE International Conference on, pp.620-629, 2005.

G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. Tan, Private queries in location based services: anonymizers are not necessary, Proceedings of the, 2008.

, ACM SIGMOD international conference on Management of data, pp.121-132, 2008.

B. Ghit, N. Yigitbasi, A. Iosup, and D. Epema, Balanced resource allocations across multiple dynamic mapreduce clusters. SIGMETRICS Perform, Eval. Rev, vol.42, issue.1, pp.329-341, 2014.

A. Girault and É. Rutten, Automating the addition of fault tolerance with discrete controller synthesis, Formal Methods in System Design, vol.35, issue.2, p.190, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00748687

Z. Gong, X. Gu, and J. Wilkes, Press: Predictive elastic resource scaling for cloud systems, International Conference on Network and Service Management (CNSM), pp.9-16, 2010.

S. F. Graham-c-goodwin, M. E. Graebe, and . Salgado, Control system design. Upper Saddle River, vol.13, 2001.

D. Grosu and . Anthony-t-chronopoulos, Noncooperative load balancing in distributed systems, Journal of parallel and distributed computing, vol.65, issue.9, pp.1022-1034, 2005.

T. Guardian, Fitness tracking app strava gives away location of secret us army bases, 2018.

J. Guitart, J. Torres, and E. Ayguadé, A survey on performance management for internet applications, Concurrency and Computation: Practice and Experience, vol.22, issue.1, pp.68-106, 2010.

J. Guo, F. Liu, D. Zeng, C. S. John, H. Lui et al., A cooperative game based allocation for sharing data center networks, INFOCOM, 2013 Proceedings IEEE, pp.2139-2147, 2013.

Y. Joseph-l-hellerstein, S. Diao, D. M. Parekh, and . Tilbury, Feedback control of computing systems, 2004.

B. Hoh and M. Gruteser, Protecting location privacy through path confusion, Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on, pp.194-205, 2005.

C. Imes, H. K. David, M. Kim, H. Maggio, and . Hoffmann, Poet: a portable approach to minimizing energy under soft real-time constraints, Real-Time and Embedded Technology and Applications Symposium (RTAS), pp.75-86, 2015.

P. Jamshidi, A. Ahmad, and C. Pahl, Autonomic resource provisioning for cloudbased software, Proceedings of the 9th international symposium on software engineering for adaptive and self-managing systems, pp.95-104, 2014.

P. Jamshidi, A. Sharifloo, C. Pahl, A. Metzger, and G. Estrada, Self-learning cloud controllers: Fuzzy q-learning for knowledge evolution, 2015.

Y. Ji, S. Vijay, . Mookerjee, P. Suresh, and . Sethi, Optimal software development: A control theoretic approach, Information Systems Research, vol.16, issue.3, pp.292-306, 2005.

K. Jiang, D. Shao, S. Bressan, T. Kister, and K. Tan, Publishing trajectories with differential privacy guarantees, Proceedings of the 25th International Conference on Scientific and Statistical Database Management, p.12, 2013.

O. Jeffrey, D. M. Kephart, and . Chess, The vision of autonomic computing, Computer, issue.1, pp.41-50, 2003.

E. C. Kerrigan, Feedback and time are essential for the optimal control of computing systems, 5th IFAC Conference on Nonlinear Model Predictive Control NMPC, vol.48, pp.380-387, 2015.

H. Kido, Y. Yanagisawa, and T. Satoh, Protection of location privacy using dummies for location-based services, Data Engineering Workshops. 21st International Conference on, pp.1248-1248, 2005.

K. Kim, K. Jeon, H. Han, S. Kim, H. Jung et al., Mrbench: A benchmark for mapreduce framework, Parallel and Distributed Systems, 2008. ICPADS'08. 14th IEEE International Conference on, pp.11-18, 2008.

N. Kiukkonen, J. Blom, O. Dousse, D. Gatica-perez, and L. J. , Towards rich mobile phone datasets: Lausanne data collection campaign, ICPS, 2010.

Y. Koh, R. Knauerhase, P. Brett, M. Bowman, Z. Wen et al., An analysis of performance interference effects in virtual environments, IEEE Int. Symposium on Performance Analysis of Systems & Software, pp.200-209, 2007.

M. Kotaru, K. Joshi, D. Bharadia, S. Katti, and . Spotfi, Decimeter level localization using wifi. SIGCOMM Comput, vol.45, pp.269-282, 2015.

F. Koufogiannis, J. George, and . Pappas, Location-dependent privacy, Decision and Control (CDC), 2016 IEEE 55th Conference on, pp.7586-7591, 2016.

J. Krumm, Inference attacks on location tracks, International Conference on Pervasive Computing, pp.127-143, 2007.

J. Krumm, A survey of computational location privacy. Personal and Ubiquitous Computing, vol.13, pp.391-399, 2009.

P. Lalanda, A. Diaconescu, and M. A. Julie, Autonomic Computing -Principles, Design and Implementation. Undergraduate Topics in Computer Science, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00854882

D. Ioan, T. Landau, O. Airimit, and A. Castellanos-silva, and Aurelian Constantinescu. Adaptive and Robust Active Vibration Control: Methodology and Tests, 2016.

D. Ioan, J. Landau, S. Saavedra, B. Cerf, N. Robu et al., Can adaptive feedforward control improve operation of cloud services?, 2018 26th Mediterranean Conference on Control and Automation (MED), pp.1-9, 2018.

R. Ioan-doré-landau, . Lozano, M. Mohammed, A. Saad, and . Karimi, Adaptive control: algorithms, analysis and applications, 2011.

K. Juha, D. Laurila, I. Gatica-perez, J. Aad, O. Blom et al., From big smartphone data to worldwide research: The mobile data challenge, Pervasive Mob. Comput, vol.9, issue.6, pp.752-771, 2013.

Z. Li, Y. Shen, B. Yao, and M. Guo, Ofscheduler: A dynamic network optimizer for mapreduce in heterogeneous cluster, International Journal of Parallel Programming, vol.43, issue.3, pp.472-488, 2015.

N. Lim, S. Majumdar, and P. Ashwood-smith, Mrcp-rm: A technique for resource allocation and scheduling of mapreduce jobs with deadlines, IEEE Transactions on Parallel and Distributed Systems, vol.28, issue.5, pp.1375-1389, 2017.

X. Liu, H. Zhao, M. Pan, H. Yue, X. Li et al., Traffic-aware multiple mix zone placement for protecting location privacy, INFOCOM, 2012 Proceedings IEEE, pp.972-980, 2012.

X. Liu, J. Heo, L. Sha, and X. Zhu, Adaptive control of multi-tiered web applications using queueing predictor, Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP, pp.106-114, 2006.

Z. Liu, S. Mark, J. L. Squillante, and . Wolf, On maximizing service-level-agreement profits, Proceedings of the 3rd ACM conference on Electronic Commerce, pp.213-223, 2001.

Z. Liu, Q. Zhang, M. F. Zhani, R. Boutaba, Y. Liu et al., Dreams: Dynamic resource allocation for mapreduce with data skew, Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on, pp.18-26, 2015.

T. Lorido-botran, J. Miguel-alonso, and J. Lozano, A review of auto-scaling techniques for elastic applications in cloud environments, Journal of Grid Computing, vol.12, issue.4, pp.559-592, 2014.

J. Lunze and D. Lehmann, A state-feedback approach to event-based control, Automatica, vol.46, pp.211-215, 2010.

R. Frank-d-macías-escrivá, R. D. Haber, V. Toro, and . Hernandez, Self-adaptive systems: A survey of current approaches, research challenges and applications, Expert Systems with Applications, vol.40, issue.18, pp.7267-7279, 2013.

M. Maggio, E. Bini, G. Chasparis, and K. Årzén, A game-theoretic resource manager for rt applications, Real-Time Systems (ECRTS), 2013 25th Euromicro Conference on, pp.57-66, 2013.

N. Maheshwari, R. Nanduri, and V. Varma, Dynamic energy efficient data placement and cluster reconfiguration algorithm for mapreduce framework, Future Generation Computer Systems, vol.28, issue.1, pp.119-127, 2012.

L. Malrait, S. Bouchenak, and N. Marchand, Fluid modeling and control for server system performance and availability, Proceedings of the 39th annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), p.367666, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00367666

H. Mao, M. Alizadeh, I. Menache, and S. Kandula, Resource management with deep reinforcement learning, Proceedings of the 15th ACM Workshop on Hot Topics in Networks, pp.50-56, 2016.

M. Maouche, S. B. Mokhtar, and S. Bouchenak, Ap-attack: A novel user reidentification attack on mobility datasets, MobiQuitous, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01785155

N. Marchand, S. Durand, and J. Castellanos, A general formula for event-based stabilization of nonlinear systems, IEEE Transactions on Automatic Control, vol.58, issue.5, pp.1332-1337, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00675946

S. Maroulis, I. Boutsis, and V. Kalogeraki, Context-aware point of interest recommendation using tensor factorization, 2016 IEEE International Conference on Big Data (Big Data), pp.963-968, 2016.

A. Matsunaga and J. Fortes, On the use of machine learning to predict the time and resources consumed by applications, Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp.495-504, 2010.

D. Q. Mayne and H. Michalska, Receding horizon control of nonlinear systems, IEEE Trans. on Automatic Control, vol.35, issue.7, pp.814-824, 1990.

K. Micinski, P. Phelps, and J. Foster, An empirical study of location truncation on android, p.21, 2013.

. Microsoft, Azure Cloud Computing Platform & Services, pp.2019-2020

. Microsoft, . Hdinsight--hadoop, . Spark, and . Kafka-service-|-microsoft-azure, , 2019.

J. Darakhshan, S. Mir, R. Isaacman, M. Cáceres, R. N. Martonosi et al., Dp-where: Differentially private modeling of human mobility, Big Data, 2013 IEEE International Conference on, pp.580-588, 2013.

D. Mituzas, Wikipedia embarrassment, 2009.

F. Mohamed, C. Mokbel, W. Chow, and . Aref, The new casper: Query processing for location services without compromising privacy, Proceedings of the 32nd international conference on Very large data bases, pp.763-774, 2006.

F. Fui-hoon and . Nah, A study on tolerable waiting time: how long are web users willing to wait?, Behaviour & Information Technology, vol.23, issue.3, pp.153-163, 2004.

J. Nash, Non-cooperative games, Annals of mathematics, pp.286-295, 1951.

, Navigation National Coordination Office for Space-Based Positioning and Timing. Gps accuracy, 2017.

H. Ngo and J. Kim, Location privacy via differential private perturbation of cloaking area, Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, pp.63-74, 2015.

H. Nguyen, Z. Shen, X. Gu, S. Subbiah, and J. Wilkes, Agile: Elastic distributed resource scaling for infrastructure-as-a-service, Proceedings of the 10th International Conference on Autonomic Computing, pp.69-82, 2013.

. Nyansa and . Voyance-live, , 2016.

T. Nylander, M. Thelander-andrén, K. Årzén, and M. Maggio, Cloud application predictability through integrated load-balancing and service time control, 2018 IEEE International Conference on Autonomic Computing (ICAC), pp.51-60, 2018.

P. Oreizy, N. Medvidovic, and R. Taylor, Runtime software adaptation: framework, approaches, and styles, Companion of the 30th international conference on Software engineering, pp.899-910, 2008.

X. Pan, J. Xu, and X. Meng, Protecting location privacy against locationdependent attacks in mobile services, IEEE Transactions on Knowledge and Data Engineering, vol.24, issue.8, pp.1506-1519, 2012.

T. Patikirikorala, A. Colman, J. Han, and L. Wang, A systematic survey on the design of self-adaptive software systems using control engineering approaches, Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2012 ICSE Workshop on, pp.33-42, 2012.

M. Piorkowski, N. Sarafijanovic-djukic, and M. Grossglauser, CRAWDAD dataset epfl/mobility, 2009.

V. Primault, Practically Preserving and Evaluating Location Privacy, 2018.
URL : https://hal.archives-ouvertes.fr/tel-01806701

V. Primault, S. B. Mokhtar, C. Lauradoux, and L. Brunie, Time distortion anonymization for the publication of mobility data with high utility, TrustCom, pp.539-546, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01170060

V. Primault, A. Boutet, S. B. Mokhtar, and L. Brunie, Adaptive location privacy with alp, Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on, pp.269-278, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01370447

V. Primault, A. Boutet, S. B. Mokhtar, and L. Brunie, The long road to computational location privacy: A survey, IEEE Communications Surveys & Tutorials, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01890014

J. G. Peter, W. Ramadge, and . Murray-wonham, The control of discrete event systems, Proceedings of the IEEE, vol.77, issue.1, pp.81-98, 1989.

S. Ranjan, J. Rolia, H. Fu, and E. Knightly, Qos-driven server migration for internet data centers, Tenth IEEE International Workshop on, pp.3-12, 2002.

Z. Ren, X. Xu, J. Wan, W. Shi, and M. Zhou, Workload characterization on a production Hadoop cluster: A case study on Taobao, IEEE International Symposium on Workload Characterization, pp.4-6, 2012.

E. Rutten, N. Marchand, and D. Simon, Feedback control as mape-k loop in autonomic computing, Software Engineering for Self-Adaptive Systems III. Assurances, pp.349-373, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01285014

A. Sangroya, D. Serrano, and S. Bouchenak, Benchmarking dependability of mapreduce systems, Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on, pp.21-30, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00950645

A. Sangroya, D. Serrano, and S. Bouchenak, Benchmarking Dependability of MapReduce Systems, IEEE 31st Symposium on Reliable Distributed Systems (SRDS), pp.21-30, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00950645

. Gautham-nayak, L. Seetanadi, L. Oliveira, and . Almeida, Karl-Erik Arzén, and Martina Maggio. Game-theoretic network bandwidth distribution for self-adaptive cameras, SIGBED Rev, vol.15, issue.3, pp.31-36, 2018.

P. Shankar, V. Ganapathy, and L. Iftode, Privately querying location-based services with sybilquery, Proceedings of the 11th international conference on Ubiquitous computing, pp.31-40, 2009.

S. Shevtsov, M. Berekmeri, D. Weyns, and M. Maggio, Control-theoretical software adaptation: A systematic literature review, IEEE Transactions on Software Engineering, vol.44, issue.8, pp.784-810, 2018.

L. Song, D. Niyato, Z. Han, and E. Hossain, Game-theoretic resource allocation methods for device-to-device communication, vol.21, pp.136-144, 2014.

S. Vítor, A. Souza, J. Lapouchnian, and . Mylopoulos, (requirement) evolution requirements for adaptive systems, Proceedings of the 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, pp.155-164, 2012.

L. Stenneth, Y. Phillip, and O. Wolfson, Mobile systems location privacy:"mobipriv" a robust k anonymous system, Wireless and Mobile Computing, Networking and Communications (WiMob), pp.54-63, 2010.

R. Subrata, Y. Albert, B. Zomaya, and . Landfeldt, A cooperative game framework for qos guided job allocation schemes in grids, IEEE Transactions on Computers, vol.57, issue.10, pp.1413-1422, 2008.

L. Sweeney, k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.

M. Adja-ndeye-sylla, E. Louvel, G. Rutten, and . Delaval, Modular and hierarchical discrete control for applications and middleware deployment in iot and smart buildings, 2018 IEEE Conference on Control Technology and Applications (CCTA), pp.1472-1479, 2018.

M. Thammawichai and E. C. Kerrigan, Energy-Efficient Real-Time Scheduling for Two-Type Heterogeneous Multiprocessors, 2016.

G. Theodorakopoulos, R. Shokri, C. Troncoso, J. Hubaux, and J. Boudec, Prolonging the hide-and-seek game: Optimal trajectory privacy for locationbased services, Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp.73-82, 2014.

M. Velasco, P. Martí, and E. Bini, On lyapunov sampling for event-driven controllers, Decision and Control, 2009.

. Cdc/ccc, Proceedings of the 48th IEEE Conference on, pp.6238-6243, 2009.

A. Verma, L. Cherkasova, and R. H. Campbell, Aria: automatic resource inference and allocation for mapreduce environments, Proceedings of the 8th ACM international conference on Autonomic computing, ICAC '11, pp.235-244, 2011.

M. Verma, . Gr-gangadharan, C. Nanjangud, R. Narendra, V. Vadlamani et al., Dynamic resource demand prediction and allocation in multi-tenant service clouds. Concurrency and Computation: Practice and Experience, vol.28, pp.4429-4442, 2016.

J. Von-neumann and O. Morgenstern, Theory of games and economic behavior (commemorative edition), 2007.

D. Vrancic, Design of anti-windup and bumpless transfer protection, 1996.

G. Wang, A. R. Butt, P. Pandey, and K. Gupta, Using realistic simulation for performance analysis of mapreduce setups, Proceedings of the 1st ACM workshop on Large-Scale system and application performance, LSAP '09, pp.19-26, 2009.

J. Wang, J. Wang, Y. Wu, J. Wang, H. Zhu et al., A machine learning framework for resource allocation assisted by cloud computing, IEEE Network, vol.32, issue.2, pp.144-151, 2018.

Y. Wang, H. Hyoun-kyu-cho, A. Liao, T. P. Nazeem, S. Kelly et al., Supervisory control of software execution for failure avoidance: Experience from the gadara project, IFAC Proceedings Volumes, vol.43, pp.259-266, 2010.

Y. Wang, D. Xu, X. He, C. Zhang, F. Li et al., L2p2: Location-aware location privacy protection for location-based services, INFOCOM, 2012 Proceedings IEEE, pp.1996-2004, 2012.

G. Wei, V. Athanasios, Y. Vasilakos, N. Zheng, and . Xiong, A game-theoretic method of fair resource allocation for cloud computing services. The journal of supercomputing, vol.54, pp.252-269, 2010.

W. Wei, X. Fan, H. Song, X. Fan, and J. Yang, Imperfect information dynamic stackelberg game based resource allocation using hidden markov for cloud computing, IEEE Transactions on Services Computing, vol.11, issue.1, pp.78-89, 2018.

Y. Xiao and L. Xiong, Protecting locations with differential privacy under temporal correlations, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.1298-1309, 2015.

T. Xu and Y. Cai, Feeling-based location privacy protection for location-based services, Proceedings of the 16th ACM conference on Computer and communications security, pp.348-357, 2009.

G. Yava? and D. Katsaros, Özgür Ulusoy, and Yannis Manolopoulos. A data mining approach for location prediction in mobile environments, Data & Knowledge Engineering, vol.54, issue.2, pp.121-146, 2005.

M. Ye, P. Yin, W. Lee, and D. Lee, Exploiting geographical influence for collaborative point-of-interest recommendation, Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR '11, pp.325-334, 2011.

N. Zacheilas and V. Kalogeraki, A pareto-based scheduler for exploring costperformance trade-offs for mapreduce workloads, EURASIP Journal on Embedded Systems, vol.2017, issue.1, p.29, 2017.

Z. Zhao, S. Cerf, R. Birke, B. Robu, S. Bouchenak et al., Robust Anomaly Detection on Unreliable Data, 49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2019.
URL : https://hal.archives-ouvertes.fr/hal-02056558

Z. Zhao, S. Cerf, B. Robu, and N. Marchand, Feedback Control for Online Training of Neural Networks, 3rd IEEE Conference On Control Technology And Applications (CCTA), 2019.
URL : https://hal.archives-ouvertes.fr/hal-02115916

Y. Zheng, Q. Li, Y. Chen, X. Xie, and W. Ma, Understanding mobility based on gps data, Proceedings of the 10th international conference on Ubiquitous computing, pp.312-321, 2008.

Y. Zheng, X. Xie, and W. Ma, Geolife: A collaborative social networking service among user, location and trajectory, IEEE Data Eng. Bull, vol.33, issue.2, pp.32-39, 2010.

Y. Zheng, L. Zhang, X. Xie, and W. Ma, Mining interesting locations and travel sequences from gps trajectories, WWW, pp.791-800, 2009.

W. An and M. Liang, Fuzzy support vector machine based on within-class scatter for classification problems with outliers or noises, Neurocomput, vol.110, pp.101-110, 2013.

C. Chang and C. Lin, Libsvm: A library for support vector machines, ACM Trans. Intell. Syst. Technol, vol.2, issue.3, 2011.

O. Dekel and O. Shamir, Good learners for evil teachers, Proceedings of the 26th Annual International Conference on Machine Learning, pp.233-240, 2009.

(. Ayhan-demiriz, K. P. Bennett, and J. Shawe,

B. Frénay and M. Verleysen, Classification in the presence of label noise: A survey, IEEE Trans. Neural Netw. Learning Syst, vol.25, issue.5, pp.845-869, 2014.

Y. Li, F. A. Lodewyk, D. Wessels, M. J. De-ridder, and . Reinders, Classification in the presence of class noise using a probabilistic kernel fisher method, Pattern Recognition, vol.40, issue.12, pp.3349-3357, 2007.

X. Ma, Y. Wang, M. E. Houle, S. Zhou, S. M. Erfani et al., Dimensionality-driven learning with noisy labels, pp.3361-3370, 2018.

F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion et al., Scikit-learn: Machine learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

N. Segata, E. Blanzieri, S. J. Delany, and P. Cunningham, Noise reduction for instance-based learning with a local maximal margin approach, J. Intell. Inf. Syst, vol.35, issue.2, pp.301-331, 2010.

J. D. Stamey and R. Gerlach, Bayesian model selection for logistic regression with classified outcomes, Statist. Model, vol.7, issue.3, pp.255-273, 2007.

A. Vahdat, Toward robustness against label noise in training deep discriminative neural networks, NIPS, pp.5601-5610, 2017.

Y. Wang, W. Liu, X. Ma, J. Bailey, H. Zha et al., Iterative learning with open-set noisy labels, 2018.

D. , R. Wilson, and T. R. Martinez, Reduction techniques for instance-basedlearning algorithms, Mach. Learn, vol.38, issue.3, pp.257-286, 2000.

M. Agarwal, D. Pasumarthi, S. Biswas, and S. Nandi, Machine learning approach for detection of flooding dos attacks in 802.11 networks and attacker localization, Int. J. Machine Learning & Cybernetics, vol.7, issue.6, pp.1035-1051, 2016.

W. An and M. Liang, Fuzzy support vector machine based on within-class scatter for classification problems with outliers or noises, Neurocomput, vol.110, pp.101-110, 2013.

M. Anbar, R. Abdullah, A. Bassam-naji-al-tamimi, and . Hussain, A machine learning approach to detect router advertisement flooding attacks in next-generation ipv6 networks, Cognitive Computation, vol.10, issue.2, pp.201-214, 2018.

S. Banescu, C. S. Collberg, and A. Pretschner, Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning, 26th USENIX Security Symposium, pp.661-678, 2017.

B. Biggio, B. Nelson, and P. Laskov, Support vector machines under adversarial label noise, Asian Conference on Machine Learning, pp.97-112, 2011.

R. João, M. Campos, E. Vieira, and . Costa, Exploratory study of machine learning techniques for supporting failure prediction, 14th European Dependable Computing Conference, pp.9-16, 2018.

Y. Fan, J. Li, and D. Zhang, A method for identifying critical elements of a cyber-physical system under data attack, IEEE Access, vol.6, pp.16972-16984, 2018.

J. Ze-han-fang, . Tzeng, T. Chien-chin-chen, and . Chou, A study of machine learning models in epidemic surveillance: Using the query logs of search engines, Pacific Asia Conference on Information Systems, PACIS 2010, p.137, 2010.

B. Frénay and M. Verleysen, Classification in the presence of label noise: A survey, IEEE Trans. Neural Netw. Learning Syst, vol.25, issue.5, pp.845-869, 2014.

G. Giantamidis and S. Tripakis, Learning moore machines from input-output traces, FM 2016: Formal Methods -21st International Symposium, vol.9995, pp.291-309, 2016.

Y. He, J. Gihan, J. Mendis, and . Wei, Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism, IEEE Trans. Smart Grid, vol.8, issue.5, pp.2505-2516, 2017.

D. Hendrycks, M. Mazeika, D. Wilson, and K. Gimpel, Using trusted data to train deep networks on labels corrupted by severe noise, 32nd Conference on Neural Information Processing Systems (NIPS 2018)

J. Kang, I. Joo, and D. Choi, False data injection attacks on contingency analysis: Attack strategies and impact assessment, IEEE Access, vol.6, pp.8841-8851, 2018.

D. Karagiannis and A. Argyriou, Jamming attack detection in a pair of RF communicating vehicles using unsupervised machine learning, Vehicular Communications, vol.13, pp.56-63, 2018.

R. Kozik, M. Choras, M. Ficco, and F. Palmieri, A scalable distributed machine learning approach for attack detection in edge computing environments, J. Parallel Distrib. Comput, vol.119, pp.18-26, 2018.

J. Larsen, M. Nonboe, L. K. Hintz-madsen, and . Hansen, Design of robust neural network classifiers, Proceedings of the 1998 IEEE International Conference on, vol.2, pp.1205-1208, 1998.

Y. Li, J. Yang, Y. Song, L. Cao, J. Luo et al., Learning from noisy labels with distillation, ICCV, pp.1928-1936, 2017.

Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai et al., N-baiotnetworkbased detection of iot botnet attacks using deep autoencoders, IEEE Pervasive Computing, vol.17, issue.3, pp.12-22, 2018.

N. Natarajan, S. Inderjit, . Dhillon, K. Pradeep, A. Ravikumar et al., Learning with noisy labels, Advances in neural information processing systems, pp.1196-1204, 2013.

G. Patrini, A. Rozza, A. K. Menon, R. Nock, and L. Qu, Making deep neural networks robust to label noise: A loss correction approach, Proc. IEEE Conf. Comput. Vis. Pattern Recognit.(CVPR), pp.2233-2241, 2017.

F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion et al., Scikit-learn: Machine learning in Python, Journal of Machine Learning Research, vol.12, pp.2825-2830, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

A. Pellegrini, P. Di-sanzo, and D. R. Avresky, A machine learning-based framework for building application failure prediction models, 2015 IEEE International Parallel and Distributed Processing Symposium Workshop, pp.1072-1081, 2015.

T. Pitakrat, L. André-van-hoorn, and . Grunske, A comparison of machine learning algorithms for proactive hard disk drive failure detection, Proceedings of the 4th international ACM Sigsoft symposium on Architecting critical systems, ISARCS 2013, pp.1-10, 2013.

C. Reiss, J. Wilkes, and J. L. Hellerstein, Google clusterusage traces: format+ schema, pp.1-14, 2011.

U. Reuter, A. Sultan, and D. S. Reischl, A comparative study of machine learning approaches for modeling concrete failure surfaces, Advances in Engineering Software, vol.116, pp.67-79, 2018.

A. Rosà, L. Y. Chen, and W. Binder, Failure analysis and prediction for big-data systems, IEEE Trans. Services Computing, vol.10, issue.6, pp.984-998, 2017.

S. Sukhbaatar, J. Bruna, M. Paluri, L. Bourdev, and R. Fergus, Training convolutional networks with noisy labels, 2014.

A. Kiran-k-thekumparampil, Z. Khetan, S. Lin, and . Oh, Robustness of conditional gans to noisy labels, Advances in Neural Information Processing Systems, pp.10291-10302, 2018.

N. Vadim, M. V. Vagin, and . Fomina, Problem of knowledge discovery in noisy databases, Int. J. Machine Learning & Cybernetics, vol.2, issue.3, pp.135-145, 2011.

A. Vahdat, Toward robustness against label noise in training deep discriminative neural networks, NIPS, pp.5601-5610, 2017.

A. Veit, N. Alldrin, G. Chechik, I. Krasin, A. Gupta et al., Learning from noisy large-scale datasets with minimal supervision, CVPR, pp.6575-6583, 2017.

D. , R. Wilson, and T. R. Martinez, Reduction techniques for instance-basedlearning algorithms, Mach. Learn, vol.38, issue.3, pp.257-286, 2000.

B. Zhou, J. Li, J. Wu, S. Guo, Y. Gu et al., Machine-learning-based online distributed denial-of-service attack detection using spark streaming, 2018 IEEE International Conference on Communications, pp.1-6, 2018.

Y. Lecun, Lenet-5, convolutional neural networks, p.20, 2015.

B. T. Morris and M. M. Trivedi, Learning, modeling, and classification of vehicle track patterns from live video, IEEE Transactions on Intelligent Transportation Systems, vol.9, issue.3, pp.425-437, 2008.

M. Lease, On quality control and machine learning in crowdsourcing, Human Computation, vol.11, 2011.

X. Glorot and Y. Bengio, Understanding the difficulty of training deep feedforward neural networks, Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, AIS-TATS 2010, pp.249-256, 2010.

Y. Bengio, Practical recommendations for gradient-based training of deep architectures, Neural networks: Tricks of the trade, pp.437-478, 2012.

S. Ioffe and C. Szegedy, Batch normalization: Accelerating deep network training by reducing internal covariate shift, CoRR, 2015.

L. N. Smith, Cyclical learning rates for training neural networks, Applications of Computer Vision (WACV, pp.464-472, 2017.

S. Ruder, An overview of gradient descent optimization algorithms, 2016.

X. Wu, R. Ward, and L. Bottou, Wngrad: Learn the learning rate in gradient descent, 2018.

W. An, H. Wang, Y. Zhang, and Q. Dai, Exponential decay sine wave learning rate for fast deep neural network training, 2017 IEEE Visual Communications and Image Processing (VCIP), pp.1-4, 2017.

A. Krizhevsky and G. Hinton, Learning multiple layers of features from tiny images, 2009.

H. Xiao, K. Rasul, and R. Vollgraf, Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms, 2017.

K. He, X. Zhang, S. Ren, and J. Sun, Deep residual learning for image recognition, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.770-778, 2016.

R. Yamashita, M. Nishio, R. K. Do, and K. Togashi, Convolutional neural networks: an overview and application in radiology, Insights into Imaging, vol.9, issue.4, pp.611-629, 2018.

D. H. Hubel and T. N. Wiesel, Receptive fields and functional architecture of monkey striate cortex, Journal of Physiology (London), vol.195, pp.215-243, 1968.

K. Fukushima, Neocognitron: A self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position, Biological Cybernetics, vol.36, pp.193-202, 1980.

F. Chollet, Keras, 2015.