-
1
-
-
0030145369
-
"High speed and robust event correlation"
-
May
-
A. Yemini and S. Kliger, "High speed and robust event correlation," IEEE Commun. Mag., vol. 34, no. 5, pp. 82-90, May 1996.
-
(1996)
IEEE Commun. Mag.
, vol.34
, Issue.5
, pp. 82-90
-
-
Yemini, A.1
Kliger, S.2
-
2
-
-
0036930823
-
"Pinpoint: Problem determination in large, dynamic internet services"
-
in Washington, DC, Jun
-
M. Chen, E. Kiciman, E. Fratkin, A. Fox, and E. Brewer, "Pinpoint: Problem determination in large, dynamic internet services," in 2002 Int. Conf. Dependable Systems and Networks, Washington, DC, Jun. 2002, pp. 595-604.
-
(2002)
2002 Int. Conf. Dependable Systems and Networks
, pp. 595-604
-
-
Chen, M.1
Kiciman, E.2
Fratkin, E.3
Fox, A.4
Brewer, E.5
-
3
-
-
21644455102
-
"Performance debugging for distributed systems of black boxes"
-
in Bolton Landing, NY, Oct
-
M. K. Aguilera, J. C. Mogul, J. L. Wiener, P. Reynolds, and A. Muthitacharoen, "Performance debugging for distributed systems of black boxes," in Proc. 19th ACM Symp. Operating Systems Principles, Bolton Landing, NY, Oct. 2003, pp. 74-89.
-
(2003)
Proc. 19th ACM Symp. Operating Systems Principles
, pp. 74-89
-
-
Aguilera, M.K.1
Mogul, J.C.2
Wiener, J.L.3
Reynolds, P.4
Muthitacharoen, A.5
-
4
-
-
85030750455
-
"Using Magpie for request extraction and workload modeling"
-
in San Francisco, CA, Dec
-
P. Barham, A. Donnelly, R. Isaacs, and R. Mortier, "Using Magpie for request extraction and workload modeling," in 6th Symp. Operating Systems Design and Implementation, San Francisco, CA, Dec. 2004, pp. 259-272.
-
(2004)
6th Symp. Operating Systems Design and Implementation
, pp. 259-272
-
-
Barham, P.1
Donnelly, A.2
Isaacs, R.3
Mortier, R.4
-
5
-
-
33845751110
-
-
[Online]. Available
-
[Online]. Available: http://www.openview.hp.com/products/tran/
-
-
-
-
7
-
-
0002636321
-
"N-gram-based text categorization"
-
in Las Vegas, NV, Apr
-
W. B. Cavnar and J. M. Trenkle, "N-gram-based text categorization," in 3rd Annu. Symp. Document Analysis and Information Retrieval, Las Vegas, NV, Apr. 1994, pp. 161-175.
-
(1994)
3rd Annu. Symp. Document Analysis and Information Retrieval
, pp. 161-175
-
-
Cavnar, W.B.1
Trenkle, J.M.2
-
8
-
-
0029212693
-
"Mining sequential patterns"
-
in Taipei, Taiwan, R.O.C., Mar
-
R. Agrawal and R. Srikant, "Mining sequential patterns," in Proc. Int. Conf. Data Engineering (ICDE), Taipei, Taiwan, R.O.C., Mar. 1995, pp. 3-14.
-
(1995)
Proc. Int. Conf. Data Engineering (ICDE)
, pp. 3-14
-
-
Agrawal, R.1
Srikant, R.2
-
11
-
-
77954742135
-
"Counting and random generalization of strings in regular languages"
-
in San Francisco, CA, Jan
-
S. Kannan, Z. Sweedyk, and S. Mahaney, "Counting and random generalization of strings in regular languages," in Proc. SODA, San Francisco, CA, Jan. 1995, pp. 551-557.
-
(1995)
Proc. SODA
, pp. 551-557
-
-
Kannan, S.1
Sweedyk, Z.2
Mahaney, S.3
-
12
-
-
0005730544
-
"A quasipolynomial-time algorithm for sampling words from a context-free language"
-
Apr
-
V. Gore, M. Jerrum, S. Kannan, Z. S. amd, and S. Mahaney, "A quasipolynomial-time algorithm for sampling words from a context-free language," Inf. Comput., vol. 134, no. 1, pp. 59-74, Apr. 1997.
-
(1997)
Inf. Comput.
, vol.134
, Issue.1
, pp. 59-74
-
-
Gore, V.1
Jerrum, M.2
Kannan, S.3
Amd, Z.S.4
Mahaney, S.5
-
13
-
-
0024610919
-
"A tutorial on hidden markov models and selected applications in speech recognition"
-
in Feb
-
L. Rabiner, "A tutorial on hidden markov models and selected applications in speech recognition," in Proc. IEEE, no. 2, Feb. 1989, vol. 77, pp. 257-286.
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
14
-
-
10044287331
-
"Weak process model for robust process detection"
-
in Orlando, FL, Apr
-
G. Jiang, "Weak process model for robust process detection," in SPIE Symp. Defense and Security. Orlando, FL, Apr. 2004, vol. 5403, pp. 102-112.
-
(2004)
SPIE Symp. Defense and Security
, vol.5403
, pp. 102-112
-
-
Jiang, G.1
-
15
-
-
10044257793
-
"An overview of process query system"
-
in Orlando, FL, Apr
-
G. Cybenko et al., "An overview of process query system," in SPIE Symp. Defense and Security. Orlando, FL, Apr. 2004, vol. 5403, pp. 183-197.
-
(2004)
SPIE Symp. Defense and Security
, vol.5403
, pp. 183-197
-
-
Cybenko, G.1
-
16
-
-
33845746314
-
-
[Online]. Available
-
[Online]. Available: http://java.sun.com/developer/releases/petstore/
-
-
-
-
17
-
-
27544511534
-
"Detecting application-level failures in component-based internet services"
-
Computer Science Dept., Stanford Univ., Stanford, CA, Tech. Rep
-
E. Kiciman and A. Fox, "Detecting application-level failures in component-based internet services," Computer Science Dept., Stanford Univ., Stanford, CA, Tech. Rep., 2004.
-
(2004)
-
-
Kiciman, E.1
Fox, A.2
-
18
-
-
33845796157
-
-
[Online]. Available
-
[Online]. Available: http://rubis.objectweb.org/
-
-
-
-
19
-
-
1942526174
-
"An automated fault diagnosis system using hierarchical reasoning and alarm correlation"
-
Jun
-
C. Chao, D. Yang, and A. Liu, "An automated fault diagnosis system using hierarchical reasoning and alarm correlation," J. Network Syst. Manag., vol. 9, no. 2, pp. 183-202, Jun. 2001.
-
(2001)
J. Network Syst. Manag.
, vol.9
, Issue.2
, pp. 183-202
-
-
Chao, C.1
Yang, D.2
Liu, A.3
-
20
-
-
0038631985
-
"Diagnosis of asynchronous discrete event systems, a net unfolding approach"
-
May
-
A. Benveniste, E. Fabre, C. Jard, and S. Haar, "Diagnosis of asynchronous discrete event systems, a net unfolding approach," IEEE Trans. Autom. Control, vol. 48, no. 5, pp. 714-727, May 2003.
-
(2003)
IEEE Trans. Autom. Control
, vol.48
, Issue.5
, pp. 714-727
-
-
Benveniste, A.1
Fabre, E.2
Jard, C.3
Haar, S.4
-
21
-
-
0029716418
-
"A sense of self for Unix processes"
-
in Los Alamitos, CA
-
S. Forrest, S. Hofmeyr, A. Somayaji, and T. Longstaff, "A sense of self for Unix processes," in IEEE Symp. Research in Security and Privacy, Los Alamitos, CA, 1996, pp. 120-128.
-
(1996)
IEEE Symp. Research in Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
22
-
-
84882800335
-
"Simple, state-based approaches to program-based anomaly detection"
-
Aug
-
C. C. Michael and A. Ghosh, "Simple, state-based approaches to program-based anomaly detection," ACM Trans. Inf. Syst. Security, vol. 5, no. 3, pp. 203-237, Aug. 2002.
-
(2002)
ACM Trans. Inf. Syst. Security
, vol.5
, Issue.3
, pp. 203-237
-
-
Michael, C.C.1
Ghosh, A.2
-
23
-
-
0000909837
-
"Inferring statistical complexity"
-
Jul
-
J. Crutchfield and K. Young, "Inferring statistical complexity," Phys. Rev. Lett., vol. 63, no. 2, pp. 105-108, Jul. 1989.
-
(1989)
Phys. Rev. Lett.
, vol.63
, Issue.2
, pp. 105-108
-
-
Crutchfield, J.1
Young, K.2
-
24
-
-
33845762860
-
"Pattern discovery in time series, Part I: Theory, algorithm, analysis and coverage"
-
Santa Fe Insitute, Working Paper 02-10-060
-
C. Shalizi, K. Shalizi, and J. Crutchfield, "Pattern discovery in time series, Part I: Theory, algorithm, analysis and coverage," Santa Fe Insitute, Working Paper 02-10-060, 2002.
-
(2002)
-
-
Shalizi, C.1
Shalizi, K.2
Crutchfield, J.3
|