Log-based predictive maintenance
R Sipos, D Fradkin, F Moerchen, Z Wang - Proceedings of the 20th ACM …, 2014 - dl.acm.org
Success of manufacturing companies largely depends on reliability of their products.
Scheduled maintenance is widely used to ensure that equipment is operating correctly so as …
Scheduled maintenance is widely used to ensure that equipment is operating correctly so as …
An overview of data-driven techniques for IT-service-management
High availability of information technology (IT)-applications and-infrastructure components is
a significant factor for the success of organizations because more and more business …
a significant factor for the success of organizations because more and more business …
LogSig: Generating system events from raw textual logs
Modern computing systems generate large amounts of log data. System administrators or
domain experts utilize the log data to understand and optimize system behaviors. Most …
domain experts utilize the log data to understand and optimize system behaviors. Most …
[HTML][HTML] System log clustering approaches for cyber security applications: A survey
M Landauer, F Skopik, M Wurzenberger, A Rauber - Computers & Security, 2020 - Elsevier
Log files give insight into the state of a computer system and enable the detection of
anomalous events relevant to cyber security. However, automatically analyzing log data is …
anomalous events relevant to cyber security. However, automatically analyzing log data is …
A comprehensive survey of logging in software: From logging statements automation to log mining and analysis
S Gholamian, PAS Ward - arxiv preprint arxiv:2110.12489, 2021 - arxiv.org
Logs are widely used to record runtime information of software systems, such as the
timestamp and the importance of an event, the unique ID of the source of the log, and a part …
timestamp and the importance of an event, the unique ID of the source of the log, and a part …
System log parsing: A survey
T Zhang, H Qiu, G Castellano, M Rifai… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …
manage. The ubiquitous system logs contain plentiful information and are thus widely …
Logflash: Real-time streaming anomaly detection and diagnosis from system logs for large-scale software systems
Today, software systems are getting increasingly large and complex and a short failure time
may cause huge loss. Therefore, it is important to detect and diagnose anomalies accurately …
may cause huge loss. Therefore, it is important to detect and diagnose anomalies accurately …
System and method for visualisation of behaviour within computer infrastructure
S Dodson - US Patent 10,346,744, 2019 - Google Patents
The field of the disclosure relates generally to a method and system for analyzing behavior
of a computer infrastructure and the displaying the behavior of the computer infrastructure in …
of a computer infrastructure and the displaying the behavior of the computer infrastructure in …
[PDF][PDF] Chukwa: a system for reliable {Large-Scale} log collection
Large Internet services companies like Google, Yahoo, and Facebook use the MapReduce
programming model to process log data. MapReduce is designed to work on data stored in …
programming model to process log data. MapReduce is designed to work on data stored in …
Fault injection analytics: A novel approach to discover failure modes in cloud-computing systems
D Cotroneo, L De Simone, P Liguori… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Cloud computing systems fail in complex and unexpected ways due to unexpected
combinations of events and interactions between hardware and software components. Fault …
combinations of events and interactions between hardware and software components. Fault …