Large-Scale System Problems Detection by Mining Console Logs
暂无分享,去创建一个
Ling Huang | David A. Patterson | Wei Xu | Armando Fox | Michael I. Jordan | A. Fox | D. Patterson | Wei Xu | Ling Huang | Michael I. Jordan
[1] Walter L. Smith. Probability and Statistics , 1959, Nature.
[2] J. E. Jackson,et al. Control Procedures for Residuals Associated With Principal Component Analysis , 1979 .
[3] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[4] Stephen E. Hansen,et al. Automated System Monitoring and Notification with Swatch , 1993, LISA.
[5] Andrew W. Appel,et al. Modern Compiler Implementation in Java , 1997 .
[6] S. J. QinDepartment. Multi-dimensional Fault Diagnosis Using a Subspace Approach , 1997 .
[7] Ian Witten,et al. Data Mining , 2000 .
[8] Kishore Papineni,et al. Why Inverse Document Frequency? , 2001, NAACL.
[9] Joseph L. Hellerstein,et al. Mining partially periodic event patterns with unknown periods , 2001, Proceedings 17th International Conference on Data Engineering.
[10] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.
[11] Joseph L. Hellerstein,et al. Discovering actionable patterns in event data , 2002, IBM Syst. J..
[12] Risto Vaarandi,et al. A data clustering algorithm for mining patterns from event logs , 2003, Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764).
[13] James E. Prewett. Analyzing cluster log files using Logsurfer , 2003 .
[14] Otis Gospodnetic,et al. Lucene in Action , 2004 .
[15] Mark Crovella,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM '04.
[16] John Stearley,et al. Towards informatic analysis of syslogs , 2004, 2004 IEEE International Conference on Cluster Computing (IEEE Cat. No.04EX935).
[17] Risto Vaarandi,et al. A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs , 2004, INTELLCOMM.
[18] David A. Patterson,et al. Path-Based Failure and Evolution Management , 2004, NSDI.
[19] Kenji Yamanishi,et al. Dynamic syslog mining for network failure monitoring , 2005, KDD '05.
[20] Ronen Feldman,et al. Book Reviews: The Text Mining Handbook: Advanced Approaches to Analyzing Unstructured Data by Ronen Feldman and James Sanger , 2008, CL.
[21] Ingo Mierswa,et al. YALE: rapid prototyping for complex data mining tasks , 2006, KDD '06.
[22] Abraham Bernstein,et al. Detecting similar Java classes using tree algorithms , 2006, MSR '06.
[23] Jon Stearley,et al. What Supercomputers Say: A Study of Five System Logs , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[24] Randy H. Katz,et al. X-Trace: A Pervasive Network Tracing Framework , 2007, NSDI.
[25] Yuanyuan Zhou,et al. /*icomment: bugs or bad comments?*/ , 2007, SOSP.
[26] Rajeev Gandhi,et al. SALSA: Analyzing Logs as StAte Machines , 2008, WASL.
[27] Navjot Singh,et al. A log mining approach to failure analysis of enterprise telephony systems , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[28] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[29] Yuanyuan Zhou,et al. Understanding Customer Problem Troubleshooting from Storage System Logs , 2009, FAST.
[30] Christopher D. Manning,et al. Introduction to Information Retrieval , 2010, J. Assoc. Inf. Sci. Technol..