Author:
Sosnowski Janusz,Gawkowski Piotr,Cabaj Krzysztof,Kubacki Marcin
Publisher
Springer International Publishing
Reference18 articles.
1. Chandola, V., Baerjee, A., Kumar, V.: Anomaly detection, a survey. ACM Comput. Surv. 41(3), 1–58 (2009)
2. Chen, C., Singh, N., Yajnik, M.: Log analytics for dependable enterprise telephony. In: Proceedings of 9th European Dependable Computing Conference, IEEE Computer Society, pp. 94–101 (2012)
3. Cinque, M., et al.: A logging approach for effective dependability evaluation of computer systems. In: Proceedings of 2nd IEEE International Conference on Dependability, pp. 105–110 (2009)
4. Naggapan, M., Vouk, M.A.: Abstracting log lines to log event types for mining software system logs. In: Proceedings of Mining Software Repositories, pp. 114–117 (2010)
5. Oliner, A., Stearley, J.: What supercomputers say: A study of five system logs. In: Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (2007)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Performance Issues in Creating Cloud Environment;Advances in Intelligent Systems and Computing;2015