Engineering autonomic systems, Proceedings of the 6th international conference on Autonomic computing, ICAC '09, p.9 ,
DOI : 10.1145/1555228.1555254
DRAM errors in the wild: a large-scale field study, p.9 ,
Designs, Lessons and Advice from Building Large Distributed Systems Keynote talk: LADIS '09 ,
Capturing, indexing, clustering, and retrieving system history, p.5 ,
DOI : 10.1145/1095810.1095821
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.967
Probing the guts of kprobes, Linux Symposium '06 ,
Lightweight, high-resolution monitoring for troubleshooting production systems, p.8 ,
Hunting for problems with artemis, Proceedings of WASL, 2008. ,
The ganglia distributed monitoring system: design, implementation, and experience, Proceedings of Parallel Computing, 2004. ,
DOI : 10.1016/j.parco.2004.04.001
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.2889
A fast automaton-based method for detecting anomalous program behaviors, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.144-155, 2001. ,
DOI : 10.1109/SECPRI.2001.924295
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.24.1005
A vector space model for automatic indexing, Communications of the ACM, vol.18, issue.11, pp.613-620, 1975. ,
DOI : 10.1145/361219.361220
A ?Law? of occurrences for words of low frequency, Information and Control, vol.10, issue.4, pp.386-393, 1967. ,
DOI : 10.1016/S0019-9958(67)90201-X
http://wikipedia.org/wiki/File:Wikipedia-n-zipf ,
Reinventing scheduling for multicore systems, p.9 ,
ATOM -A System for Building Customized Program Analysis Tools, p.94 ,
A lockless ring-buffer ,
One ring buffer to rule them all? http://lwn ,
Feather-trace: A light-weight event tracing toolkit, p.7 ,
lmbench: Portable Tools for Performance Analysis, USENIX ATC '96 ,
Svm light http://svmlight.joachims.org ,
Learning to Classify Text Using Support Vector Machines. Dissertation, 2002. ,
DOI : 10.1007/978-1-4615-0907-3
The Nature of Statistical Learning Theory, 1995. ,
A sense of self for Unix processes, Proceedings 1996 IEEE Symposium on Security and Privacy, 1996. ,
DOI : 10.1109/SECPRI.1996.502675
Automatically Adapting a Trained Anomaly Detector to Software Patches, p.9 ,
DOI : 10.1007/978-3-642-04342-0_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.1472
Fingerprinting the datacenter, Proceedings of the 5th European conference on Computer systems, EuroSys '10 ,
DOI : 10.1145/1755913.1755926
ProfileMe: hardware support for instruction-level profiling on out-of-order processors, Proceedings of 30th Annual International Symposium on Microarchitecture, p.97 ,
DOI : 10.1109/MICRO.1997.645821
Using hardware performance monitors to understand the behavior of java applications, Proceedings of the 3rd Virtual Machine Research and Technology Symposium (VM), 2004. ,
Carnegie mellon's cydat: Harnessing a wide array of telemetry data to enhance distributed system diagnostics, Proceedings of WASL, 2008. ,
CoMon, ACM SIGOPS Operating Systems Review, vol.40, issue.1, pp.65-74, 2006. ,
DOI : 10.1145/1113361.1113374
Error log processing for accurate failure prediction, p.8 ,
Cluebox: A performance log analyzer for automated troubleshooting, p.8 ,
Predicting computer system failures using support vector machines, Proceedings of WASL, 2008. ,
Vertical profiling: understanding the behavior of object-priented applications ,
Using computers to diagnose computer problems, Proceedings of HotOS, pp.91-86, 2003. ,
Finding and reproducing heisenbugs in concurrent programs, p.8 ,
Cyclic Debugging Using Execution Replay, Proceedings of the International Conference on Computational Science-Part II '01 ,
DOI : 10.1007/3-540-45718-6_90
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.7286
R2: An application-level kernel for record and replay, p.8 ,
Triage: diagnosing production run failures at the user's site, p.7 ,
Rx: Treating bugs as allergies -a safe method to survive software failures, ACM Trans. Comput. Syst, pp.25-32, 2007. ,
Correlating instrumentation data to system states: a building block for automated diagnosis and control ,
ADMIT, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '02, p.2 ,
DOI : 10.1145/775047.775103
A study in using neural networks for anomaly and misuse detection, Proceedings of the 8th conference on USENIX Security Symposium '99 ,
Control flow graphs as malware signatures, Proceedings of the International Workshop on the Theory of Computer Viruses, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00176235
Temporal sequence learning and data reduction for anomaly detection, ACM Transactions on Information and System Security, vol.2, issue.3, pp.295-331, 1999. ,
DOI : 10.1145/322510.322526
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.7469
Detecting large-scale system problems by mining console logs, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, p.9 ,
DOI : 10.1145/1629575.1629587
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.7257
Mining invariants from console logs for system problem detection ,