Author:
Kubacki Marcin,Sosnowski Janusz
Publisher
Springer International Publishing
Reference21 articles.
1. Berry, M.W., Kogan, J.: Text Mining Applications and Theory. Wiley, Chichester (2010)
2. Chen, C., Singh, N., Yajnik, D.: Log analytics for dependable enterprise telephony. In: Proceedings of 9th European Dependable Computing Conference, pp. 94–101 (2012)
3. Chuvakin, A., Schmid, K., Phillips, C., Moulder, P.: Logging and log management, the authoritative guide to understanding the concepts surrounding logging and log management. Elsevier (2013). http://dx.doi.org/10.1016/B978-1-59-749635-3.00024-5
4. Cinque, M., Cotroneo, D, Della, Corte, R., Pecchia, A.: Assessing direct monitoring techniques to analyze failures of critical industrial systems. In: Proceedings of IEEE 25th International Symposium on Software Reliability Engineering, pp. 212–222 (2014)
5. Di Martino, C., Kalbarczyk, Z., Kramer, W., Iyer, R.: Measuring and understanding extreme-scale application resilience: a field study of 5,000,000 HPC application runs. In: IEEEE/IFIP International Conference on Dependable Systems and Networks, pp. 25–36 (2015)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献