Author:
Dalal Renu,Goel Nidhi,Darbari Roudraksh,Chauhan Ojasvi,Samal Shruti,Khari Manju
Publisher
Springer Nature Singapore
Reference26 articles.
1. W. Xu, L. Huang, A. Fox, D. Patterson, and M. I. Jordan: “Detecting large-scale system problems by mining console logs,” in Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, 2009, pp. 117–132. 26. J.-G. Lou, Q. Fu, S. Yang, Y. Xu, and J. Li, “Mining invariants from console logs for system problem detection.” in USENIX Annual Technical Conference, 2010, pp. 1–14. Author, F.: Article title. Journal 2(5), 99–110 (2016).
2. Bodik P., M. Goldszmidt, A. Fox, D. B. Woodard, and H. Andersen: “Fingerprinting the datacenter: automated classification of performance crises,” in Proceedings of the 5th European conference on Computer systems, 2010, pp. 111–124.
3. Huang S, Liu Y, Fung C, He R, Zhao Y, Yang H, Luan Z (2020) Hitanomaly: Hierarchical transformers for anomaly detection in system log. IEEE Trans Netw Serv Manage 17(4):2064–2076
4. Dalal R, Khari M, Anzola JP, García-Díaz V (2021) Proliferation of opportunistic routing: A systematic review. IEEE Access 10:5855–5883
5. Dalal R., Khari M., “Efficacious implementation of deep Q-routing in opportunistic network”, Soft Computing, 1–19, 2023.