Aiops solutions for incident management: Technical guidelines and a comprehensive literature review

Y Remil, A Bendimerad, R Mathonat… - arxiv preprint arxiv …, 2024 - arxiv.org
The management of modern IT systems poses unique challenges, necessitating scalability,
reliability, and efficiency in handling extensive data streams. Traditional methods, reliant on …

ISUM: Efficiently compressing large and complex workloads for scalable index tuning

T Siddiqui, S Jo, W Wu, C Wang, V Narasayya… - Proceedings of the …, 2022 - dl.acm.org
Today's database systems include index advisors that recommend an appropriate set of
indexes for an input workload. Since index tuning on large and complex workloads can be …

Similarity metrics for SQL query clustering

G Kul, DTA Luong, T **e, V Chandola… - … on Knowledge and …, 2018 - ieeexplore.ieee.org
Database access logs are the starting point for many forms of database administration, from
database performance tuning, to security auditing, to benchmark design, and many more …

Wred: Workload reduction for scalable index tuning

M Brucato, T Siddiqui, W Wu, V Narasayya… - Proceedings of the …, 2024 - dl.acm.org
Modern database systems offer index-tuning advisors that automatically identify a set of
indexes to improve workload performance. Advisors leverage the optimizer's what-if API to …

Comprehensive and efficient workload compression

S Deep, A Gruenheid, P Koutris, J Naughton… - arxiv preprint arxiv …, 2020 - arxiv.org
This work studies the problem of constructing a representative workload from a given input
analytical query workload where the former serves as an approximation with guarantees of …

Database intrusion detection systems (dids): Insider threat detection via behaviour-based anomaly detection systems-a brief survey of concepts and approaches

MI Khan, SN Foley, B O'Sullivan - International Symposium on Emerging …, 2021 - Springer
One of the data security and privacy concerns is of insider threats, where legitimate users of
the system abuse the access privileges they hold. The insider threat to data security means …

Adaptive context caching for IoT-based applications: A reinforcement learning approach

S Weerasinghe, A Zaslavsky, SW Loke, A Hassani… - Sensors, 2023 - mdpi.com
Making internet-of-things (IoT)-based applications context-aware demands large amounts of
raw data to be collected, interpreted, stored, and reused or repurposed if needed from many …

" What makes my queries slow?": Subgroup Discovery for SQL Workload Analysis

Y Remil, A Bendimerad, R Mathonat… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
Among daily tasks of database administrators (DBAs), the analysis of query workloads to
identify schema issues and improving performances is crucial. Although DBAs can easily …

Facilitating SQL query composition and analysis

Z Zolaktaf, M Milani, R Pottinger - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
Formulating efficient SQL queries requires several cycles of tuning and execution. We
examine methods that can accelerate and improve this interaction by providing insights …

Combating insider threats by user profiling from activity logging data

M Dahmane, S Foucher - 2018 1st international conference on …, 2018 - ieeexplore.ieee.org
In cybersecurity, malicious insider threats represent a huge issue for organizations and may
pose the greatest threat category. Combating the insider risks need an understanding of the …