2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC) 2018
DOI: 10.1109/cic.2018.00050
|View full text |Cite
|
Sign up to set email alerts
|

ysla: Reusable and Configurable SLAs for Large-Scale SLA Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…For instance, if one tenant experiences a crash, it should not affect or interrupt other tenants. Additionally, in scenarios where a tenant demands peak database performance, other tenants sharing the same resources must still fulfill their respective service level agreements (SLA) without compromise [24], [25].…”
Section: Data Management Strategies-in-memory Databasementioning
confidence: 99%
“…For instance, if one tenant experiences a crash, it should not affect or interrupt other tenants. Additionally, in scenarios where a tenant demands peak database performance, other tenants sharing the same resources must still fulfill their respective service level agreements (SLA) without compromise [24], [25].…”
Section: Data Management Strategies-in-memory Databasementioning
confidence: 99%
“…Research on this SLA definition is more diversified in many different domains [59]. • Real-time SLA monitoring.…”
Section: A Service-level Agreementsmentioning
confidence: 99%
“…Mubeen et al 2017), provide formalisms to define generic constructs like metrics, SLIs and SLOs, classification systems (cf. Engel et al 2018), inclusion/exclusion rules, penalties/rewards (cf. García et al 2017;Muller et al 2018), etc.…”
Section: Complexity Of Bilateral Slas In Large Business Engagementsmentioning
confidence: 99%
“…However, due to the large sizes of the engagements between companies A and C i as well as A and P, respectively, the corresponding SLAs in all of the aforementioned business engagements are the result of extensive negotiations during contract closure, and are correspondingly complex. Consequently, A employs a dedicated SLA management system using some modern SLA formalism from current literature (e.g., L-USDL or ysla; García et al 2017;Engel et al 2018) for management and monitoring of these SLAs. In particular, the custom SLAs reflect the specific notions of incident severity 1 for each of the customers C i and at P:…”
Section: Scenario 1: Large Outsourced It Service Management Providermentioning
confidence: 99%
See 1 more Smart Citation