1. Avita, K., Mohammad, W., & Goudar, R. H. (2013). Big Data: Issues, Challenges, Tools and Good Practices: Contemporary Computing (IC3), 2013 Sixth International Conference. IEEE.
2. Barham, P., Donnelly, A., Isaacs, R., & Mortier, R. (2004). Using magpie for request extraction and workload modeling. In Proceedings ofOSDI’04: 6th Symposium on Operating Systems Design and Implementation. USENIX Association.
3. Chen, M., Kiciman, E., Fratkin, E., Fox, A., & Brewer, E. (2002). Pinpoint: Problem determination in large, dynamic internet services. In Proceedings of the International Conference on Dependable Systems and Networks (DSN’02) (pp. 595–604). Academic Press.
4. Path-based faliure and evolution management;M. Y.Chen;Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation,2004