Sciweavers

12 search results - page 1 / 3
» Execution Anomaly Detection in Distributed Systems through U...
Sort
View
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
13 years 11 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
SIGOPS
2010
80views more  SIGOPS 2010»
13 years 2 months ago
Mining dependency in distributed systems through unstructured logs analysis
Dependencies among system components are crucial to locating root errors in a distributed system. In this paper, we propose an approach to mine intercomponent dependencies from un...
Jian-Guang Lou, Qiang Fu, Yi Wang, Jiang Li
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
13 years 11 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
PERCOM
2007
ACM
14 years 4 months ago
Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection
Macro programming a distributed system, such as a sensor network, is the ability to specify application tasks at a global level while relying on compiler-like software to translat...
Marco Mamei, Radhika Nagpal
ACMSE
2006
ACM
13 years 10 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.