1. Dean, J., & Ghemawat, S. (2008). MapReduce: Simplified data processing on large clusters. Communications of the ACM, 51(1), 107–113. doi:
10.1145/1327452.1327492
.
2. Fayyad, U. M., Piatetsky-Shapiro, G., & Smyth, P. (1996). Advances in knowledge discovery and data mining. From data mining to knowledge discovery: An overview (pp. 1–34). Menlo Park, CA: American Association for Artificial Intelligence.
http://dl.acm.org/citation.cfm?id=257938.257942
.
3. Frei, A., & Rennhard, M. (2008). Histogram matrix: Log file visualization for anomaly detection. In Third international conference on availability, reliability and security. ARES 08 (pp. 610–617). doi:
10.1109/ARES.2008.148
.
4. Fu, Q., Lou, J. G., Wang, Y., & Li, J. (2009). Execution anomaly detection in distributed systems through unstructured log analysis. In Proceedings of the 2009 ninth IEEE international conference on data mining, ICDM ’09, (pp. 149–158). Washington, DC: IEEE Computer Society. doi:
10.1109/ICDM.2009.60
.
5. Grace, L., Maheswari, V., & Nagamalai, D. (2011). Web log data analysis and mining. In N. Meghanathan, B. Kaushik, & D. Nagamalai (Eds.), Advanced computing, communications in computer and information science (Vol. 133, pp. 459–469). Berlin: Springer.