Reproducing and learning from failures in deployed software is costly and difficult. Those activities can be facilitated, however, if the circumstances leading to a failure are properly captured. In this work, we empirically investigate how various anomaly detection schemes can serve to identify the conditions that precede failures in deployed software. Our results expose the tradeoffs between different detection algorithms applied to several types of events under varying levels of in-house testing. 1
The quality of Web applications is everyday more important. Web applications are crucial vehicles fo...
The quality of Web applications is everyday more important. Web applications are crucial vehicles fo...
Distributed systems have become pervasive in current society. From laptops and mobile phones, to ser...
This paper presents a new machine-learning technique that performs anomaly detection as software is ...
Software that people use for everyday purposes is usually not mission critical—some failures can be ...
Software faults are recognized to be among the main responsible for system failures in many applicat...
Abstract—Analysis of anomalies that occur during operations is an important means of improving the q...
System integration testing in the defense and aerospace industry is becoming increasingly complex. T...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
Software defects, commonly known as bugs, present a serious challenge for system reliability and dep...
Revealing anomalies in data usually suggest significant - also critical - actionable information in ...
International audienceA mobile operator offers many mobile data communication services to its users,...
The next generation of critical systems, namely complex Critical Infrastructures (LCCIs), require ef...
Abstract—As confirmed by a recent survey among developers of the Apache, Eclipse, and Mozilla projec...
Fault injection campaigns have been used extensively to characterize the behavior of systems under e...
The quality of Web applications is everyday more important. Web applications are crucial vehicles fo...
The quality of Web applications is everyday more important. Web applications are crucial vehicles fo...
Distributed systems have become pervasive in current society. From laptops and mobile phones, to ser...
This paper presents a new machine-learning technique that performs anomaly detection as software is ...
Software that people use for everyday purposes is usually not mission critical—some failures can be ...
Software faults are recognized to be among the main responsible for system failures in many applicat...
Abstract—Analysis of anomalies that occur during operations is an important means of improving the q...
System integration testing in the defense and aerospace industry is becoming increasingly complex. T...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
Software defects, commonly known as bugs, present a serious challenge for system reliability and dep...
Revealing anomalies in data usually suggest significant - also critical - actionable information in ...
International audienceA mobile operator offers many mobile data communication services to its users,...
The next generation of critical systems, namely complex Critical Infrastructures (LCCIs), require ef...
Abstract—As confirmed by a recent survey among developers of the Apache, Eclipse, and Mozilla projec...
Fault injection campaigns have been used extensively to characterize the behavior of systems under e...
The quality of Web applications is everyday more important. Web applications are crucial vehicles fo...
The quality of Web applications is everyday more important. Web applications are crucial vehicles fo...
Distributed systems have become pervasive in current society. From laptops and mobile phones, to ser...