Performance anomaly detection and bottleneck identification
O Ibidunmoye, F Hernández-Rodriguez… - ACM Computing Surveys …, 2015 - dl.acm.org
In order to meet stringent performance requirements, system administrators must effectively
detect undesirable performance behaviours, identify potential root causes, and take …
detect undesirable performance behaviours, identify potential root causes, and take …
Predicting application failure in cloud: A machine learning approach
T Islam, D Manivannan - 2017 IEEE International Conference …, 2017 - ieeexplore.ieee.org
Despite employing the architectures designed for high service reliability and availability,
cloud computing systems do experience service outages and performance slowdown. In …
cloud computing systems do experience service outages and performance slowdown. In …
Face authentification or recognition by profile extraction from range images
JY Cartoux, JT LaPresté, M Richetin - Proceedings. Workshop on …, 1989 - computer.org
Cloud computing has become increasingly popular by obviating the need for users to own
and maintain complex computing infrastructures. However, due to their inherent complexity …
and maintain complex computing infrastructures. However, due to their inherent complexity …
MADneSs: A multi-layer anomaly detection framework for complex dynamic systems
T Zoppi, A Ceccarelli… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Anomaly detection can infer the presence of errors without observing the target services, but
detecting variations in the observable parts of the system on which the services reside. This …
detecting variations in the observable parts of the system on which the services reside. This …
Detecting performance anomalies in scientific workflows using hierarchical temporal memory
MA Rodriguez, R Kotagiri, R Buyya - Future Generation Computer Systems, 2018 - Elsevier
Technological advances and the emergence of the Internet of Things have lead to the
collection of vast amounts of scientific data from increasingly powerful scientific instruments …
collection of vast amounts of scientific data from increasingly powerful scientific instruments …
Evaluation of Anomaly Detection algorithms made easy with RELOAD
T Zoppi, A Ceccarelli… - 2019 IEEE 30th …, 2019 - ieeexplore.ieee.org
Anomaly detection aims at identifying patterns in data that do not conform to the expected
behavior. Despite anomaly detection has been arising as one of the most powerful …
behavior. Despite anomaly detection has been arising as one of the most powerful …
Cda: A cloud dependability analysis framework for characterizing system dependability in cloud computing infrastructures
Cloud computing has become increasingly popular by obviating the need for users to own
and maintain complex computing infrastructure. However, due to their inherent complexity …
and maintain complex computing infrastructure. However, due to their inherent complexity …
Ramp: Real-time anomaly detection in scientific workflows
Research integrity is crucial to ensuring the trustworthiness of scientific discoveries. This
work is aimed at detecting misbehaviors targeting scientific workflows, which are computing …
work is aimed at detecting misbehaviors targeting scientific workflows, which are computing …
Taxonomy for trust models in cloud computing
Establishment of trust between Cloud consumers and service providers is a challenging
issue, which is a major reason why organizations are reluctant to adopt the Cloud paradigm …
issue, which is a major reason why organizations are reluctant to adopt the Cloud paradigm …
Relevance feedback based online learning model for resource bottleneck prediction in cloud servers
Cloud servers are highly prone to resource bottleneck failures. In this work, we propose an
ensemble learning model to build LSTM-based multiclass classifier for resource bottleneck …
ensemble learning model to build LSTM-based multiclass classifier for resource bottleneck …