Orthogonal nonnegative matrix t-factorizations for clustering

C Ding, T Li, W Peng, H Park - Proceedings of the 12th ACM SIGKDD …, 2006 - dl.acm.org
Currently, most research on nonnegative matrix factorization (NMF) focus on 2-factor
X=FG^T factorization. We provide a systematicanalysis of 3-factor X=FSG^T NMF. While it …

Automated IT system failure prediction: A deep learning approach

K Zhang, J Xu, MR Min, G Jiang… - … Conference on Big …, 2016 - ieeexplore.ieee.org
In mission critical IT services, system failure prediction becomes increasingly important; it
prevents unexpected system downtime, and assures service reliability for end users. While …

An overview of data-driven techniques for IT-service-management

P Kubiak, S Rass - IEEE Access, 2018 - ieeexplore.ieee.org
High availability of information technology (IT)-applications and-infrastructure components is
a significant factor for the success of organizations because more and more business …

Log-based predictive maintenance

R Sipos, D Fradkin, F Moerchen, Z Wang - Proceedings of the 20th ACM …, 2014 - dl.acm.org
Success of manufacturing companies largely depends on reliability of their products.
Scheduled maintenance is widely used to ensure that equipment is operating correctly so as …

Clustering event logs using iterative partitioning

AAO Makanju, AN Zincir-Heywood… - Proceedings of the 15th …, 2009 - dl.acm.org
The importance of event logs, as a source of information in systems and network
management cannot be overemphasized. With the ever increasing size and complexity of …

LogSig: Generating system events from raw textual logs

L Tang, T Li, CS Perng - Proceedings of the 20th ACM international …, 2011 - dl.acm.org
Modern computing systems generate large amounts of log data. System administrators or
domain experts utilize the log data to understand and optimize system behaviors. Most …

[HTML][HTML] System log clustering approaches for cyber security applications: A survey

M Landauer, F Skopik, M Wurzenberger, A Rauber - Computers & Security, 2020 - Elsevier
Log files give insight into the state of a computer system and enable the detection of
anomalous events relevant to cyber security. However, automatically analyzing log data is …

Anomaly detection using program control flow graph mining from execution logs

A Nandi, A Mandal, S Atreja, GB Dasgupta… - Proceedings of the …, 2016 - dl.acm.org
We focus on the problem of detecting anomalous run-time behavior of distributed
applications from their execution logs. Specifically we mine templates and template …

System log parsing: A survey

T Zhang, H Qiu, G Castellano, M Rifai… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …

A lightweight algorithm for message type extraction in system application logs

A Makanju, AN Zincir-Heywood… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Message type or message cluster extraction is an important task in the analysis of system
logs in computer networks. Defining these message types automatically facilitates the …