Due to the complexity of the network structure, log analysis is usually necessary for the maintenance of network-based distributed systems since logs record rich information about the system behaviors. In recent years, numerous works have been proposed for log analysis; however, they ignore temporal relationships between logs. In this paper, we target on the problem of mining informative patterns from temporal log data. We propose an approach to discover sequential patterns from event sequences with temporal regularities. Discovered patterns are useful for engineers to understand the behaviors of a network-based distributed system. To solve the well-known problem of pattern explosion, we resort to the minimum description length (MDL) princi...
Many systems and applications are continuously producing events. These events are used to record the...
International audienceSystem logs are a wealth of information that can be leveraged to control the b...
Many systems and applications are continuously producing events. These events are used to record the...
Abstract. More and more ubiquitous and mobile computer networks are becom-ing available, which leads...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
System logs contain messages from a wide range of applications. They are the natural starting point ...
Abstract: Part of network management is collecting information about the activities that go on aroun...
Book Series: IEEE International Conference on Cluster ComputingInternational audienceSystem logs are...
Part of network management is collecting information about the activities that go on around a distri...
Many systems and applications are continuously producing events. These events are used to record the...
International audienceSystem logs are a wealth of information that can be leveraged to control the b...
Many systems and applications are continuously producing events. These events are used to record the...
Abstract. More and more ubiquitous and mobile computer networks are becom-ing available, which leads...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
International audienceThe quantity of event logs available is increasing rapidly, be they produced b...
System logs contain messages from a wide range of applications. They are the natural starting point ...
Abstract: Part of network management is collecting information about the activities that go on aroun...
Book Series: IEEE International Conference on Cluster ComputingInternational audienceSystem logs are...
Part of network management is collecting information about the activities that go on around a distri...
Many systems and applications are continuously producing events. These events are used to record the...
International audienceSystem logs are a wealth of information that can be leveraged to control the b...
Many systems and applications are continuously producing events. These events are used to record the...