Orthogonal nonnegative matrix t-factorizations for clustering
Currently, most research on nonnegative matrix factorization (NMF) focus on 2-factor
X=FG^T factorization. We provide a systematicanalysis of 3-factor X=FSG^T NMF. While it …
X=FG^T factorization. We provide a systematicanalysis of 3-factor X=FSG^T NMF. While it …
Automated IT system failure prediction: A deep learning approach
In mission critical IT services, system failure prediction becomes increasingly important; it
prevents unexpected system downtime, and assures service reliability for end users. While …
prevents unexpected system downtime, and assures service reliability for end users. While …
An overview of data-driven techniques for IT-service-management
High availability of information technology (IT)-applications and-infrastructure components is
a significant factor for the success of organizations because more and more business …
a significant factor for the success of organizations because more and more business …
Log-based predictive maintenance
R Sipos, D Fradkin, F Moerchen, Z Wang - Proceedings of the 20th ACM …, 2014 - dl.acm.org
Success of manufacturing companies largely depends on reliability of their products.
Scheduled maintenance is widely used to ensure that equipment is operating correctly so as …
Scheduled maintenance is widely used to ensure that equipment is operating correctly so as …
Clustering event logs using iterative partitioning
AAO Makanju, AN Zincir-Heywood… - Proceedings of the 15th …, 2009 - dl.acm.org
The importance of event logs, as a source of information in systems and network
management cannot be overemphasized. With the ever increasing size and complexity of …
management cannot be overemphasized. With the ever increasing size and complexity of …
LogSig: Generating system events from raw textual logs
Modern computing systems generate large amounts of log data. System administrators or
domain experts utilize the log data to understand and optimize system behaviors. Most …
domain experts utilize the log data to understand and optimize system behaviors. Most …
[HTML][HTML] System log clustering approaches for cyber security applications: A survey
Log files give insight into the state of a computer system and enable the detection of
anomalous events relevant to cyber security. However, automatically analyzing log data is …
anomalous events relevant to cyber security. However, automatically analyzing log data is …
Anomaly detection using program control flow graph mining from execution logs
We focus on the problem of detecting anomalous run-time behavior of distributed
applications from their execution logs. Specifically we mine templates and template …
applications from their execution logs. Specifically we mine templates and template …
System log parsing: A survey
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …
manage. The ubiquitous system logs contain plentiful information and are thus widely …
A lightweight algorithm for message type extraction in system application logs
A Makanju, AN Zincir-Heywood… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Message type or message cluster extraction is an important task in the analysis of system
logs in computer networks. Defining these message types automatically facilitates the …
logs in computer networks. Defining these message types automatically facilitates the …