Modern IT infrastructures are constructed by large scale computing systems and administered by IT service providers. Manually maintaining such large computing systems is costly and inefficient. Service providers often seek automatic or semi-automatic methodologies of detecting and resolving system issues to improve their service quality and efficiency. This dissertation investigates several data-driven approaches for assisting service providers in achieving this goal. The detailed problems studied by these approaches can be categorized into the three aspects in the service workflow: 1) preprocessing raw textual system logs to structural events; 2) refining monitoring configurations for eliminating false positives and false negatives; 3) imp...
Event mining is becoming a challenging area of research. Events in system analysis is not a new conc...
Recent years have witnessed the ability to gather an enormous amount of data in a large number of do...
Log data, produced from every computer system and program, are widely used as source of valuable inf...
Modern IT infrastructures are constructed by large scale computing systems and administered by IT se...
Modern IT infrastructures are constructed by large scale computing systems and administered by IT se...
Modern IT infrastructures are constructed by large scale computing systems and administered by IT se...
More than ever, businesses heavily rely on IT service delivery to meet their current and frequently ...
More than ever, businesses heavily rely on IT service delivery to meet their current and frequently ...
Many systems and applications are continuously producing events. These events are used to record the...
Many systems and applications are continuously producing events. These events are used to record the...
Many systems and applications are continuously producing events. These events are used to record the...
Many systems and applications are continuously producing events. These events are used to record the...
Service-Oriented Architectures (SOAs), and traditional enterprise systems in general, record a varie...
Service-Oriented Architectures (SOAs), and traditional enterprise systems in general, record a varie...
Service-Oriented Architectures (SOAs), and traditional enterprise systems in general, record a varie...
Event mining is becoming a challenging area of research. Events in system analysis is not a new conc...
Recent years have witnessed the ability to gather an enormous amount of data in a large number of do...
Log data, produced from every computer system and program, are widely used as source of valuable inf...
Modern IT infrastructures are constructed by large scale computing systems and administered by IT se...
Modern IT infrastructures are constructed by large scale computing systems and administered by IT se...
Modern IT infrastructures are constructed by large scale computing systems and administered by IT se...
More than ever, businesses heavily rely on IT service delivery to meet their current and frequently ...
More than ever, businesses heavily rely on IT service delivery to meet their current and frequently ...
Many systems and applications are continuously producing events. These events are used to record the...
Many systems and applications are continuously producing events. These events are used to record the...
Many systems and applications are continuously producing events. These events are used to record the...
Many systems and applications are continuously producing events. These events are used to record the...
Service-Oriented Architectures (SOAs), and traditional enterprise systems in general, record a varie...
Service-Oriented Architectures (SOAs), and traditional enterprise systems in general, record a varie...
Service-Oriented Architectures (SOAs), and traditional enterprise systems in general, record a varie...
Event mining is becoming a challenging area of research. Events in system analysis is not a new conc...
Recent years have witnessed the ability to gather an enormous amount of data in a large number of do...
Log data, produced from every computer system and program, are widely used as source of valuable inf...