Presently, almost every computer software produces many log messages based on events and activities during the usage of the software. These files contain valuable runtime information that can be used in a variety of applications such as anomaly detection, error prediction, template mining, and so on. Usually, the generated log messages are raw, which means they have an unstructured format. This indicates that these messages have to be parsed before data mining models can be applied. After parsing, template miners can be applied on the data to retrieve the events occurring in the log file. These events are made from two parts, the template, which is the fixed part and is the same for all instances of the same event type, and the parameter pa...
Abstract: The growing computational and storage needs of several scientific applications mandate the...
Because of their contribution to the overall reliability assurance process, software logs have becom...
International audienceBecause of their contribution to the overall reliabil- ity assurance process, ...
With the move towards global and multi-national companies, information technology infrastructure req...
Many software engineering activities process the events contained in log files. However, before perf...
Modern IT systems rely heavily on log analytics for critical operational tasks. Since the volume of ...
We are surrounded by an increasing number of devices and applications that produce a huge quantity o...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
Abstract—In this paper we present the results on extracting message types from the BlueGene/L superc...
International audienceSystem logs are a wealth of information that can be leveraged to control the b...
Log message template identification aims to convert raw logs containing free-formed log messages int...
Log PM is a log parser benchmark emphasizing precise in-message parameter detection rather than temp...
International audienceIn this paper we present a comprehensive log compression (CLC) method that use...
The idea of using data compression algorithms for machine learning has been reinvented many times. I...
Pattern mining is one of the best-known concepts in Data Mining. A big problem in pattern mining is ...
Abstract: The growing computational and storage needs of several scientific applications mandate the...
Because of their contribution to the overall reliability assurance process, software logs have becom...
International audienceBecause of their contribution to the overall reliabil- ity assurance process, ...
With the move towards global and multi-national companies, information technology infrastructure req...
Many software engineering activities process the events contained in log files. However, before perf...
Modern IT systems rely heavily on log analytics for critical operational tasks. Since the volume of ...
We are surrounded by an increasing number of devices and applications that produce a huge quantity o...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
Abstract—In this paper we present the results on extracting message types from the BlueGene/L superc...
International audienceSystem logs are a wealth of information that can be leveraged to control the b...
Log message template identification aims to convert raw logs containing free-formed log messages int...
Log PM is a log parser benchmark emphasizing precise in-message parameter detection rather than temp...
International audienceIn this paper we present a comprehensive log compression (CLC) method that use...
The idea of using data compression algorithms for machine learning has been reinvented many times. I...
Pattern mining is one of the best-known concepts in Data Mining. A big problem in pattern mining is ...
Abstract: The growing computational and storage needs of several scientific applications mandate the...
Because of their contribution to the overall reliability assurance process, software logs have becom...
International audienceBecause of their contribution to the overall reliabil- ity assurance process, ...