J. L. Hellerstein, Engineering autonomic systems, Proceedings of the 6th international conference on Autonomic computing, ICAC '09, p.9
DOI : 10.1145/1555228.1555254

B. Schroeder, E. Pinheiro, and W. D. Weber, DRAM errors in the wild: a large-scale field study, p.9

J. Dean, Designs, Lessons and Advice from Building Large Distributed Systems Keynote talk: LADIS '09

I. Cohen, S. Zhang, M. Goldszmidt, J. Symons, T. Kelly et al., Capturing, indexing, clustering, and retrieving system history, p.5
DOI : 10.1145/1095810.1095821

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.93.967

A. Mavinakayanahalli, P. Panchamukhi, J. Keniston, A. Keshavamurthy, and M. Hiramatsu, Probing the guts of kprobes, Linux Symposium '06

S. Bhatia, A. Kumar, M. E. Fiuczynski, and L. Peterson, Lightweight, high-resolution monitoring for troubleshooting production systems, p.8

G. F. Cretu-ciocarlie, M. Budiu, and M. Goldszmidt, Hunting for problems with artemis, Proceedings of WASL, 2008.

M. L. Massie, B. N. Chun, and D. E. Culler, The ganglia distributed monitoring system: design, implementation, and experience, Proceedings of Parallel Computing, 2004.
DOI : 10.1016/j.parco.2004.04.001

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.2889

R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni, A fast automaton-based method for detecting anomalous program behaviors, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.144-155, 2001.
DOI : 10.1109/SECPRI.2001.924295

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.24.1005

G. Salton, A. Wong, and C. S. Yang, A vector space model for automatic indexing, Communications of the ACM, vol.18, issue.11, pp.613-620, 1975.
DOI : 10.1145/361219.361220

A. D. Booth, A ?Law? of occurrences for words of low frequency, Information and Control, vol.10, issue.4, pp.386-393, 1967.
DOI : 10.1016/S0019-9958(67)90201-X

. Grishchenko, http://wikipedia.org/wiki/File:Wikipedia-n-zipf

S. Boyd-wickizer, R. Morris, and M. F. Kaashoek, Reinventing scheduling for multicore systems, p.9

A. Srivastava and A. Eustace, ATOM -A System for Building Customized Program Analysis Tools, p.94

J. Edge, A lockless ring-buffer

J. Edge, One ring buffer to rule them all? http://lwn

B. B. Brandenburg and J. H. Anderson, Feather-trace: A light-weight event tracing toolkit, p.7

C. Staelin, lmbench: Portable Tools for Performance Analysis, USENIX ATC '96

T. Joachims, Svm light http://svmlight.joachims.org

T. Joachims, Learning to Classify Text Using Support Vector Machines. Dissertation, 2002.
DOI : 10.1007/978-1-4615-0907-3

V. N. Vapnik, The Nature of Statistical Learning Theory, 1995.

S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, A sense of self for Unix processes, Proceedings 1996 IEEE Symposium on Security and Privacy, 1996.
DOI : 10.1109/SECPRI.1996.502675

P. Li, D. Gao, and M. K. Reiter, Automatically Adapting a Trained Anomaly Detector to Software Patches, p.9
DOI : 10.1007/978-3-642-04342-0_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.1472

P. Bodik, M. Goldszmidt, A. Fox, D. B. Woodard, and H. Andersen, Fingerprinting the datacenter, Proceedings of the 5th European conference on Computer systems, EuroSys '10
DOI : 10.1145/1755913.1755926

J. Dean, J. E. Hicks, C. A. Waldspurger, W. E. Weihl, and G. Chrysos, ProfileMe: hardware support for instruction-level profiling on out-of-order processors, Proceedings of 30th Annual International Symposium on Microarchitecture, p.97
DOI : 10.1109/MICRO.1997.645821

P. F. Sweeney, M. Hauswirth, B. Cahoon, P. Cheng, A. Diwan et al., Using hardware performance monitors to understand the behavior of java applications, Proceedings of the 3rd Virtual Machine Research and Technology Symposium (VM), 2004.

C. Difatta, D. V. Klein, and M. P. , Carnegie mellon's cydat: Harnessing a wide array of telemetry data to enhance distributed system diagnostics, Proceedings of WASL, 2008.

K. Park and V. S. Pai, CoMon, ACM SIGOPS Operating Systems Review, vol.40, issue.1, pp.65-74, 2006.
DOI : 10.1145/1113361.1113374

F. Salfner and S. Tschirpke, Error log processing for accurate failure prediction, p.8

S. R. Sandeep, M. Swapna, T. Niranjan, S. Susarla, and S. Nandi, Cluebox: A performance log analyzer for automated troubleshooting, p.8

E. W. Fulp, G. A. Fink, and J. N. Haack, Predicting computer system failures using support vector machines, Proceedings of WASL, 2008.

M. Hauswirth, P. F. Sweeney, A. Diwan, and M. Hind, Vertical profiling: understanding the behavior of object-priented applications

J. Redstone, M. M. Swift, and B. N. Bershad, Using computers to diagnose computer problems, Proceedings of HotOS, pp.91-86, 2003.

M. Musuvathi, S. Qadeer, T. Ball, G. Basler, P. A. Nainar et al., Finding and reproducing heisenbugs in concurrent programs, p.8

M. Ronsse, M. Christiaens, and K. D. Bosschere, Cyclic Debugging Using Execution Replay, Proceedings of the International Conference on Computational Science-Part II '01
DOI : 10.1007/3-540-45718-6_90

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.7286

Z. Guo, X. Wang, J. Tang, X. Liu, Z. Xu et al., R2: An application-level kernel for record and replay, p.8

J. Tucek, S. Lu, C. Huang, S. Xanthos, and Y. Zhou, Triage: diagnosing production run failures at the user's site, p.7

F. Qin, J. Tucek, Y. Zhou, and J. Sundaresan, Rx: Treating bugs as allergies -a safe method to survive software failures, ACM Trans. Comput. Syst, pp.25-32, 2007.

I. Cohen, M. Goldszmidt, T. Kelly, J. Symons, and J. S. Chase, Correlating instrumentation data to system states: a building block for automated diagnosis and control

K. Sequeira and M. Zaki, ADMIT, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '02, p.2
DOI : 10.1145/775047.775103

A. K. Ghosh and A. Schwartzbard, A study in using neural networks for anomaly and misuse detection, Proceedings of the 8th conference on USENIX Security Symposium '99

G. Bonfante, M. Kaczmarek, and J. Y. Marion, Control flow graphs as malware signatures, Proceedings of the International Workshop on the Theory of Computer Viruses, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00176235

T. Lane and C. E. Brodley, Temporal sequence learning and data reduction for anomaly detection, ACM Transactions on Information and System Security, vol.2, issue.3, pp.295-331, 1999.
DOI : 10.1145/322510.322526

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.7469

W. Xu, L. Huang, A. Fox, D. Patterson, and M. I. Jordan, Detecting large-scale system problems by mining console logs, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, p.9
DOI : 10.1145/1629575.1629587

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.7257

J. G. Lou, Q. Fu, S. Yang, Y. Xu, and J. Li, Mining invariants from console logs for system problem detection