Data-Driven Techniques in Computing System Management
暂无分享,去创建一个
Liang Tang | Zheng Liu | Wubai Zhou | Tao Li | Yue Huang | Chunqiu Zeng | Yexi Jiang | L. Tang | Chunqiu Zeng | Tao Li | Yexi Jiang | Wubai Zhou | Yue Huang | Zheng Liu
[1] Yehuda Koren,et al. Scalable Collaborative Filtering with Jointly Derived Neighborhood Interpolation Weights , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).
[2] Philip S. Yu,et al. Mining asynchronous periodic patterns in time series data , 2000, KDD '00.
[3] Wei Peng,et al. An Integrated Data-Driven Framework for Computing System Management , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[4] Larisa Shwartz,et al. Hierarchical multi-label classification over ticket data using contextual loss , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).
[5] Daniela Rosu,et al. Multi-dimensional Knowledge Integration for Efficient Incident Management in a Services Cloud , 2009, 2009 IEEE International Conference on Services Computing.
[6] Yuriy Brun,et al. Synoptic: Summarizing System Logs with Refinement , 2010, SLAML.
[7] Joseph L. Hellerstein,et al. Discovering Fully Dependent Patterns , 2002, SDM.
[8] Qing Wang,et al. Online Context-Aware Recommendation with Time Varying Multi-Armed Bandit , 2016, KDD.
[9] Loren Terveen,et al. Beyond Recommender Systems: Helping People Help Each Other , 2001 .
[10] K. P. Unnikrishnan,et al. Fast algorithms for frequent episode discovery in event sequences , 2004 .
[11] Philippe O. A. Navaux,et al. A Survey of the State-of-the-art in Event Processing , 2013 .
[12] Cuntai Guan,et al. Mutual information-based selection of optimal spatial-temporal patterns for single-trial EEG-based BCIs , 2012, Pattern Recognit..
[13] Ramakrishnan Srikant,et al. Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[14] Wei Peng,et al. An integrated framework on mining logs files for computing system management , 2005, KDD '05.
[15] Yixin Diao,et al. A framework for predicting service delivery efforts using IT infrastructure-to-incident correlation , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).
[16] Dirk Husemann,et al. Automatic Classification of Change Requests for Improved IT Service Quality , 2011, 2011 Annual SRII Global Conference.
[17] Mark A. Pitt,et al. Advances in Minimum Description Length: Theory and Applications , 2005 .
[18] Johannes Gehrke,et al. Sequential PAttern mining using a bitmap representation , 2002, KDD.
[19] Thomas J Owens. Survey of Event Processing , 2007 .
[20] John Stearley,et al. Towards informatic analysis of syslogs , 2004, 2004 IEEE International Conference on Cluster Computing (IEEE Cat. No.04EX935).
[21] Larisa Shwartz,et al. An Integrated Framework for Mining Temporal Logs from Fluctuating Events , 2019, IEEE Transactions on Services Computing.
[22] John F. Roddick,et al. Sequential pattern mining -- approaches and algorithms , 2013, CSUR.
[23] Navendu Jain,et al. Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets , 2013, NSDI.
[24] Michal Aharon,et al. One Graph Is Worth a Thousand Logs: Uncovering Hidden Structures in Massive System Event Logs , 2009, ECML/PKDD.
[25] Ricard Gavaldà,et al. Mining frequent closed trees in evolving data streams , 2011, Intell. Data Anal..
[26] Yehuda Koren,et al. Collaborative filtering with temporal dynamics , 2009, KDD.
[27] Heikki Mannila,et al. Rule Discovery from Time Series , 1998, KDD.
[28] P. S. Sastry,et al. A fast algorithm for finding frequent episodes in event streams , 2007, KDD '07.
[29] Joseph L. Hellerstein,et al. Discovering actionable patterns in event data , 2002, IBM Syst. J..
[30] Wei Peng,et al. Mining logs files for data-driven system management , 2005, SKDD.
[31] Jiawei Han,et al. Mining top-k frequent closed patterns without minimum support , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[32] Common Event Expression , 2008 .
[33] Ramakrishnan Srikant,et al. Mining quantitative association rules in large relational tables , 1996, SIGMOD '96.
[34] Umeshwar Dayal,et al. FreeSpan: frequent pattern-projected sequential pattern mining , 2000, KDD '00.
[35] Juan Carlos Niebles,et al. Unsupervised Learning of Human Action Categories Using Spatial-Temporal Words , 2006, BMVC.
[36] Kyuseok Shim,et al. SPIRIT: Sequential Pattern Mining with Regular Expression Constraints , 1999, VLDB.
[37] Zheng Liu,et al. FLAP: An End-to-End Event Log Analysis Platform for System Management , 2017, KDD.
[38] Ling Huang,et al. Mining Console Logs for Large-Scale System Problem Detection , 2008, SysML.
[39] Tao Li,et al. Intelligent cloud capacity management , 2012, 2012 IEEE Network Operations and Management Symposium.
[40] Jilles Vreeken,et al. The long and the short of it: summarising event sequences with serial episodes , 2012, KDD.
[41] P. Sammulal,et al. Survey on Sequential Pattern Mining Algorithms , 2013 .
[42] Sheldon M. Ross,et al. Stochastic Processes , 2018, Gauge Integral Structures for Stochastic Calculus and Quantum Electrodynamics.
[43] Joseph L. Hellerstein,et al. Event relationship networks: a framework for action oriented analysis in event management , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).
[44] Jorma Rissanen,et al. The Minimum Description Length Principle in Coding and Modeling , 1998, IEEE Trans. Inf. Theory.
[45] Evimaria Terzi,et al. Constructing comprehensive summaries of large event sequences , 2009, TKDD.
[46] R. Durrett. Probability: Theory and Examples , 1993 .
[47] Qing Wang,et al. Constructing the Knowledge Base for Cognitive IT Service Management , 2017, 2017 IEEE International Conference on Services Computing (SCC).
[48] Junjie Yao,et al. Temporal and Social Context Based Burst Detection from Folksonomies , 2010, AAAI.
[49] Mariëlle Stoelinga,et al. Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools , 2014, Comput. Sci. Rev..
[50] Liang Tang,et al. An integrated framework for optimizing automatic monitoring systems in large IT infrastructures , 2013, KDD.
[51] Tao Li,et al. Natural event summarization , 2011, CIKM '11.
[52] Tao Li,et al. LogSig: generating system events from raw textual logs , 2011, CIKM '11.
[53] Evangelos E. Milios,et al. Clustering event logs using iterative partitioning , 2009, KDD.
[54] Aomar Osmani,et al. Mining Association Rules in Temporal Sequences , 2007, 2007 IEEE Symposium on Computational Intelligence and Data Mining.
[55] Tao Li,et al. META: Multi-resolution Framework for Event Summarization , 2014, SDM.
[56] Sheng Ma,et al. Generic adapter logging toolkit , 2004, International Conference on Autonomic Computing, 2004. Proceedings..
[57] Jian Pei,et al. On computing condensed frequent pattern bases , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[58] Daniel T. Larose,et al. Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .
[59] Luc De Raedt,et al. k-Pattern Set Mining under Constraints , 2013, IEEE Transactions on Knowledge and Data Engineering.
[60] Frank Höppner. Discovery of Temporal Patterns. Learning Rules about the Qualitative Behaviour of Time Series , 2001, PKDD.
[61] Liang Tang,et al. Discovering lag intervals for temporal dependencies , 2012, KDD.
[62] David Lanyi,et al. Classifying server behavior and predicting impact of modernization actions , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).
[63] Huaiyu Zhu. On Information and Sufficiency , 1997 .
[64] Alessandro Margara,et al. Processing flows of information: From data stream to complex event processing , 2012, CSUR.
[65] Jon M. Kleinberg,et al. Bursty and Hierarchical Structure in Streams , 2002, Data Mining and Knowledge Discovery.
[66] George Karypis,et al. Evaluation of Item-Based Top-N Recommendation Algorithms , 2001, CIKM '01.
[67] Anoop Jain,et al. A Comprehensive Survey on Sequential Pattern Mining , 2012 .
[68] David Lanyi,et al. Impact of HW and OS type and currency on server availability derived from problem ticket analysis , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).
[69] Jaideep Srivastava,et al. Event detection from time series data , 1999, KDD '99.
[70] Avinash Achar,et al. Pattern-growth based frequent serial episode discovery , 2013, Data Knowl. Eng..
[71] Jorma Rissanen,et al. Minimum Description Length Principle , 2010, Encyclopedia of Machine Learning.
[72] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[73] Wei Peng,et al. A Clustering Model Based on Matrix Approximation with Applications to Cluster System Log Files , 2005, ECML.
[74] Joseph L. Hellerstein,et al. Mining mutually dependent patterns , 2001, Proceedings 2001 IEEE International Conference on Data Mining.
[75] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[76] Brian Randell,et al. Fundamental Concepts of Dependability , 2000 .
[77] Jasmina Bogojeska,et al. Analysis of Labor Efforts and their Impact Factors to Solve Server Incidents in Datacenters , 2014, 2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
[78] Tao Li,et al. Mining temporal patterns without predefined time windows , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[79] Shashi Shekhar,et al. Mixed-Drove Spatio-Temporal Co-occurrence Pattern Mining : A Summary of Results , 2006 .
[80] Brian Randell,et al. Fundamental Concepts of Computer System Dependability , 2001 .
[81] Naren Ramakrishnan,et al. Efficient Episode Mining of Dynamic Event Streams , 2012, 2012 IEEE 12th International Conference on Data Mining.
[82] Heikki Mannila,et al. Discovery of Frequent Episodes in Event Sequences , 1997, Data Mining and Knowledge Discovery.
[83] Larisa Shwartz,et al. Knowledge Guided Hierarchical Multi-Label Classification Over Ticket Data , 2017, IEEE Transactions on Network and Service Management.
[84] Navendu Jain,et al. ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection , 2015, Proc. VLDB Endow..
[85] Takeaki Uno,et al. Frequent Pattern Mining , 2016, Encyclopedia of Algorithms.
[86] Tao,et al. A Survey on Event Mining for ICT Network Infrastructure Management , 2016 .
[87] Seraphin B. Calo,et al. Towards a practical alarm correlation system , 1995, Integrated Network Management.
[88] Liang Tang,et al. Recommending resolutions for problems identified by monitoring , 2013, 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013).
[89] Liang Tang,et al. LogTree: A Framework for Generating System Events from Raw Textual Logs , 2010, 2010 IEEE International Conference on Data Mining.
[90] Wei Peng,et al. Event summarization for system management , 2007, KDD '07.
[91] Joong Hyuk Chang,et al. Mining weighted sequential patterns in a sequence database with a time-interval weight , 2011, Knowl. Based Syst..
[92] Tao Li,et al. Event Mining: Algorithms and Applications , 2015 .
[93] Qiming Chen,et al. PrefixSpan,: mining sequential patterns efficiently by prefix-projected pattern growth , 2001, Proceedings 17th International Conference on Data Engineering.
[94] Nikolay Mehandjiev,et al. Multi-criteria service recommendation based on user criteria preferences , 2011, RecSys '11.
[95] Massimiliano Di Penta,et al. An approach to classify software maintenance requests , 2002, International Conference on Software Maintenance, 2002. Proceedings..
[96] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[97] Detlef Nauck,et al. Data stream mining of event and complex event streams: a survey of existing and future technologies and applications in big data , 2016 .
[98] Jiawei Han,et al. Summarizing itemset patterns: a profile-based approach , 2005, KDD '05.
[99] Petr Jan Horn,et al. Autonomic Computing: IBM's Perspective on the State of Information Technology , 2001 .
[100] Noureddine Mouaddib,et al. Time sequence summarization to scale up chronology-dependent applications , 2009, CIKM.
[101] George Karypis,et al. SLIM: Sparse Linear Methods for Top-N Recommender Systems , 2011, 2011 IEEE 11th International Conference on Data Mining.
[102] Jean S. Bozman,et al. Server Refresh: Meeting the Changing Needs of Enterprise IT with Hardware/Software Optimization , 2010 .
[103] Lajos Jeno Fülöp,et al. Survey on Complex Event Processing and Predictive Analytics , 2010 .
[104] Antonio Hernández-Barrera,et al. Finding an o(n2 log n) Algorithm Is Sometimes Hard , 1996, Canadian Conference on Computational Geometry.
[105] Juan Carlos Niebles,et al. Unsupervised Learning of Human Action Categories Using Spatial-Temporal Words , 2008, International Journal of Computer Vision.
[106] Srinivasan Parthasarathy,et al. Summarizing itemset patterns using probabilistic models , 2006, KDD '06.
[107] Lisandro Zambenedetti Granville,et al. A solution for identifying the root cause of problems in IT change management , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.
[108] Maitreya Natu,et al. Problem Identification by Mining Trouble Tickets , 2014, COMAD.
[109] Svetha Venkatesh,et al. Event extraction using behaviors of sentiment signals and burst structure in social media , 2013, Knowledge and Information Systems.
[110] John Riedl,et al. Application of Dimensionality Reduction in Recommender System - A Case Study , 2000 .
[111] Yixin Diao,et al. Rule-Based Problem Classification in IT Service Management , 2009, 2009 IEEE International Conference on Cloud Computing.
[112] Xue Li,et al. Time weight collaborative filtering , 2005, CIKM '05.
[113] Sedigheh Abbasghorbani,et al. Survey on sequential pattern mining algorithms , 2015, 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI).
[114] Hinrich Schütze,et al. Book Reviews: Foundations of Statistical Natural Language Processing , 1999, CL.
[115] Jiawei Han,et al. Modeling Probabilistic Measurement Correlations for Problem Determination in Large-Scale Distributed Systems , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems.
[116] Liang Tang,et al. Mining temporal lag from fluctuating events for correlation and root cause analysis , 2014, 10th International Conference on Network and Service Management (CNSM) and Workshop.
[117] Joseph L. Hellerstein,et al. Mining partially periodic event patterns with unknown periods , 2001, Proceedings 17th International Conference on Data Engineering.
[118] Qiang Fu,et al. Correlating events with time series for incident diagnosis , 2014, KDD.
[119] Ren Jiadong,et al. An algorithm based on temporary table for mining top-k closed frequent patterns in data streams , 2012 .
[120] Mohammed J. Zaki,et al. SPADE: An Efficient Algorithm for Mining Frequent Sequences , 2004, Machine Learning.
[121] Avinash Achar,et al. A unified view of the apriori-based algorithms for frequent episode discovery , 2011, Knowledge and Information Systems.
[122] Ricardo Vilalta,et al. Predicting rare events in temporal domains , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[123] Abdus Salam,et al. Mining top−k frequent patterns without minimum support threshold , 2010, Knowledge and Information Systems.
[124] Mudasser Iqbal,et al. Wavelet-based Burst Event Detection and Localization in Water Distribution Systems , 2013, J. Signal Process. Syst..
[125] Michael McGill,et al. Introduction to Modern Information Retrieval , 1983 .
[126] Alexander Aiken,et al. Alert Detection in System Logs , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[127] Jian Pei,et al. Mining Access Patterns Efficiently from Web Logs , 2000, PAKDD.
[128] Heikki Mannila,et al. Discovering frequent episodes in sequences extended abstract , 1995, KDD 1995.
[129] Haixun Wang,et al. An algorithmic approach to event summarization , 2010, SIGMOD Conference.
[130] Yixin Diao,et al. Predicting service delivery cost for non-standard service level agreements , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).