Automated known problem diagnosis with event traces
暂无分享,去创建一个
Wei-Ying Ma | Ji-Rong Wen | Ni Lao | Yi-Min Wang | Jiwei Li | Chun Yuan | Zheng Zhang | Wei-Ying Ma | Yi-Min Wang | N. Lao | Zheng Zhang | Ji-Rong Wen | Chun Yuan | Jiwei Li
[1] Armando Fox,et al. Capturing, indexing, clustering, and retrieving system history , 2005, SOSP '05.
[2] Steven D. Gribble,et al. Configuration Debugging as Search: Finding the Needle in the Haystack , 2004, OSDI.
[3] Richard Mortier,et al. Magpie: Online Modelling and Performance-aware Systems , 2003, HotOS.
[4] David A. Patterson,et al. Path-Based Failure and Evolution Management , 2004, NSDI.
[5] D. Ohsie,et al. High speed and robust event correlation , 1996, IEEE Commun. Mag..
[6] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[7] Steven P. Reiss,et al. Fault localization with nearest neighbor queries , 2003, 18th IEEE International Conference on Automated Software Engineering, 2003. Proceedings..
[8] Eric A. Brewer,et al. Pinpoint: problem determination in large, dynamic Internet services , 2002, Proceedings International Conference on Dependable Systems and Networks.
[9] Gaurav Banga. Auto-Diagnosis of Field Problems in an Appliance Operating System , 2000, USENIX Annual Technical Conference, General Track.
[10] Salvatore J. Stolfo,et al. Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses , 2002, RAID.
[11] Armando Fox,et al. Pinpoint: problem determination in large , 2002 .
[12] Mark Russinovich,et al. Inside Microsoft Windows 2000 , 2000 .
[13] Helen J. Wang,et al. Strider: a black-box, state-based approach to change and configuration management and support , 2003, Sci. Comput. Program..
[14] Thomas G. Dietterich,et al. Error-Correcting Output Codes: A General Method for Improving Multiclass Inductive Learning Programs , 1991, AAAI.
[15] Malgorzata Steinder,et al. A survey of fault localization techniques in computer networks , 2004, Sci. Comput. Program..
[16] Ching Y. Suen,et al. n-Gram Statistics for Natural Language Understanding and Text Processing , 1979, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[17] Brian N. Bershad,et al. Using Computers to Diagnose Computer Problems , 2003, HotOS.
[18] Marcos K. Aguilera,et al. Performance debugging for distributed systems of black boxes , 2003, SOSP '03.
[19] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[20] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[21] Richard Mortier,et al. Using Magpie for Request Extraction and Workload Modelling , 2004, OSDI.
[22] Alan Jay Smith,et al. The VTrace tool: building a system tracer for Windows NT and Windows 2000 , 2000 .
[23] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[24] Vladimir Vapnik,et al. Principles of Risk Minimization for Learning Theory , 1991, NIPS.
[25] Jeffrey S. Chase,et al. Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control , 2004, OSDI.
[26] W. B. Cavnar,et al. N-gram-based text categorization , 1994 .
[27] Mayur Naik,et al. From symptom to cause: localizing errors in counterexample traces , 2003, POPL '03.
[28] Dan Gusfield. Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .