Detecting large-scale system problems by mining console logs
暂无分享,去创建一个
Michael I. Jordan | David A. Patterson | Wei Xu | Ling Huang | Armando Fox | A. Fox | D. Patterson | Ling Huang | W. Xu
[1] Walter L. Smith. Probability and Statistics , 1959, Nature.
[2] J. E. Jackson,et al. Control Procedures for Residuals Associated With Principal Component Analysis , 1979 .
[3] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[4] Stephen E. Hansen,et al. Automated System Monitoring and Notification with Swatch , 1993, LISA.
[5] Andrew W. Appel,et al. Modern Compiler Implementation in Java , 1997 .
[6] S. J. QinDepartment. Multi-dimensional Fault Diagnosis Using a Subspace Approach , 1997 .
[7] Ian Witten,et al. Data Mining , 2000 .
[8] Kishore Papineni,et al. Why Inverse Document Frequency? , 2001, NAACL.
[9] Joseph L. Hellerstein,et al. Mining partially periodic event patterns with unknown periods , 2001, Proceedings 17th International Conference on Data Engineering.
[10] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.
[11] Joseph L. Hellerstein,et al. Discovering actionable patterns in event data , 2002, IBM Syst. J..
[12] Eric A. Brewer,et al. Pinpoint: problem determination in large, dynamic Internet services , 2002, Proceedings International Conference on Dependable Systems and Networks.
[13] Risto Vaarandi,et al. A data clustering algorithm for mining patterns from event logs , 2003, Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764).
[14] James E. Prewett. Analyzing cluster log files using Logsurfer , 2003 .
[15] Yuanyuan Zhou,et al. CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code , 2004, OSDI.
[16] Otis Gospodnetic,et al. Lucene in Action , 2004 .
[17] Helen J. Wang,et al. Automatic Misconfiguration Troubleshooting with PeerPressure , 2004, OSDI.
[18] Mark Crovella,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM '04.
[19] John Stearley,et al. Towards informatic analysis of syslogs , 2004, 2004 IEEE International Conference on Cluster Computing (IEEE Cat. No.04EX935).
[20] Risto Vaarandi,et al. A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs , 2004, INTELLCOMM.
[21] David A. Patterson,et al. Path-Based Failure and Evolution Management , 2004, NSDI.
[22] Kuai Xu,et al. Profiling Internet BackboneTraffic : Behavior Models and Applications , 2005 .
[23] Armando Fox,et al. Capturing, indexing, clustering, and retrieving system history , 2005, SOSP '05.
[24] Zhi-Li Zhang,et al. Profiling internet backbone traffic: behavior models and applications , 2005, SIGCOMM '05.
[25] Kenji Yamanishi,et al. Dynamic syslog mining for network failure monitoring , 2005, KDD '05.
[26] Ronen Feldman,et al. Book Reviews: The Text Mining Handbook: Advanced Approaches to Analyzing Unstructured Data by Ronen Feldman and James Sanger , 2008, CL.
[27] Ingo Mierswa,et al. YALE: rapid prototyping for complex data mining tasks , 2006, KDD '06.
[28] Abraham Bernstein,et al. Detecting similar Java classes using tree algorithms , 2006, MSR '06.
[29] Michael I. Jordan,et al. Statistical debugging: simultaneous identification of multiple bugs , 2006, ICML.
[30] Jon Stearley,et al. What Supercomputers Say: A Study of Five System Logs , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[31] Randy H. Katz,et al. X-Trace: A Pervasive Network Tracing Framework , 2007, NSDI.
[32] Michalis Faloutsos,et al. Profiling the End Host , 2007, PAM.
[33] Yanfang Ye,et al. IMDS: intelligent malware detection system , 2007, KDD '07.
[34] Yuanyuan Zhou,et al. /*icomment: bugs or bad comments?*/ , 2007, SOSP.
[35] David Walker,et al. From dirt to shovels: fully automatic tool generation from ad hoc data , 2008, POPL '08.
[36] Rajeev Gandhi,et al. SALSA: Analyzing Logs as StAte Machines , 2008, WASL.
[37] Navjot Singh,et al. A log mining approach to failure analysis of enterprise telephony systems , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[38] Ling Huang,et al. Large-Scale System Problems Detection by Mining Console Logs , 2009 .
[39] Evangelos E. Milios,et al. Clustering event logs using iterative partitioning , 2009, KDD.
[40] Archana Ganapathi,et al. Predicting Multiple Metrics for Queries: Better Decisions Enabled by Machine Learning , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[41] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[42] Yuanyuan Zhou,et al. Understanding Customer Problem Troubleshooting from Storage System Logs , 2009, FAST.
[43] Ling Huang,et al. Online System Problem Detection by Mining Patterns of Console Logs , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[44] Christopher D. Manning,et al. Introduction to Information Retrieval , 2010, J. Assoc. Inf. Sci. Technol..
[45] Armando Fox,et al. Fingerprinting the datacenter: automated classification of performance crises , 2010, EuroSys '10.