Big data: Issues and challenges moving forward, System Sciences (HICSS), 2013 46th Hawaii International Conference on, pp.995-1004, 2013. ,
Using quantile regression for reclaiming unused cloud resources while achieving sla, 2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp.89-98, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01898438
Seti@ home: an experiment in publicresource computing, Communications of the ACM, vol.45, issue.11, pp.56-61, 2002. ,
Condor-a hunter of idle workstations, 1987. ,
Managing performance vs. accuracy trade-offs with loop perforation, Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, pp.124-134, 2011. ,
,
SCONE: Secure linux containers with intel SGX, 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), pp.689-703, 2016. ,
Sabotage-tolerance mechanisms for volunteer computing systems, Future Generation Computer Systems, vol.18, issue.4, pp.561-572, 2002. ,
, cadvisor online documentation, Website, 2019.
Cloud monitoring: A survey, Computer Networks, vol.57, issue.9, pp.2093-2115, 2013. ,
Introduction to machine learning, 2014. ,
Cuckoo: a mechanism for exploiting ephemeral and heterogeneous cloud resource, IEEE International Conference on Cloud Computing, 2019. ,
Nginx: the high-performance web server and reverse proxy, Linux Journal, vol.2008, issue.173, 2008. ,
Mysql, 2001. ,
, , vol.726, 2011.
Filebench: A flexible framework for file system benchmarking, The USENIX Magazine, vol.41, issue.1, 2016. ,
Ffmpeg, 2012. ,
Using the gnu compiler collection, Free Software Foundation, vol.4, issue.02, 2003. ,
Efficient and robust automated machine learning, Advances in Neural Information Processing Systems, pp.2962-2970, 2015. ,
Random forests, Machine learning, vol.45, issue.1, pp.5-32, 2001. ,
Feature selection: Evaluation, application, and small sample performance, IEEE transactions on pattern analysis and machine intelligence, vol.19, pp.153-158, 1997. ,
A survey on feature selection methods, Computers & Electrical Engineering, vol.40, issue.1, pp.16-28, 2014. ,
Comparison of genetic algorithm and sequential search methods for classifier subset selection, Seventh International Conference on Document Analysis and Recognition, pp.765-769, 2003. ,
Feature subset selection using a genetic algorithm, pp.117-136, 1998. ,
Scikit-learn: Machine learning in python, Journal of machine learning research, vol.12, pp.2825-2830, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00650905
The Elements of Statistical Learning, Springer Series in Statistics, 2013. ,
Proofs of ownership in remote storage systems, Proceedings of the 18th ACM conference on Computer and communications security, pp.491-500, 2011. ,
Caching strategies to improve disk system performance, Computer, vol.27, issue.3, pp.38-46, 1994. ,
Investigating machine learning algorithms for modeling ssd i/o performance for container-based virtualization, IEEE Transactions on Cloud Computing, vol.14, pp.1-14, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02013421
Uncheatable grid computing, Algorithms and theory of computation handbook, pp.30-30, 2010. ,
Result verification and trust-based scheduling in peer-to-peer grids," in Peer-toPeer Computing, Fifth IEEE International Conference on, pp.31-38, 2005. ,
Uncheatable distributed computations, Topics in CryptologyCT-RSA, pp.425-440, 2001. ,
Trojan detection using ic fingerprinting, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.296-310, 2007. ,
Hardware trojan detection using path delay fingerprint, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.51-57, 2008. ,
Application classification using packet size distribution and port association, Journal of Network and Computer Applications, vol.32, issue.5, pp.1023-1030, 2009. ,
Cache-based application detection in the cloud using machine learning, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, vol.17, pp.288-300, 2017. ,
Automated traffic classification and application identification using machine learning, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l, pp.250-257, 2005. ,
Beauty and the burst: Remote identification of encrypted video streams, 26th USENIX Security Symposium (USENIX Security 17), pp.1357-1374, 2017. ,