International audienceIn this paper we present a comprehensive log compression (CLC) method that uses frequent patterns and their condensed representations to identify repetitive information from large log files generated by communications networks. We also show how the identified information can be used to separate and filter out frequently occurring events that hide other, unique or only a few times occurring events. The identification can be done without any prior knowledge about the domain or the events. For example, no pre-defined patterns or value combinations are needed. This separation makes it easier for a human observer to perceive and analyse large amounts of log data. The applicability of the CLC method is demonstrated with real...
System logs contain messages from a wide range of applications. They are the natural starting point ...
Because of their contribution to the overall reliability assurance process, software logs have becom...
International audienceBecause of their contribution to the overall reliabil- ity assurance process, ...
International audienceIn this paper we present a comprehensive log compression (CLC) method that use...
Abstract. More and more ubiquitous and mobile computer networks are becom-ing available, which leads...
Due to the complexity of the network structure, log analysis is usually necessary for the maintenanc...
Understanding and troubleshooting wide area networks (such as military backbone networks and ISP net...
Abstract—Understanding and troubleshooting wide area net-works (such as military backbone networks a...
These days, event logs contain immense amounts of knowledge that may simply overwhelm a personality&...
This paper discusses the analysis of data from log files and presents novel methods and ideas of ana...
International audienceThere is an increasing need to quickly understand the contents log data. A wid...
International audienceSystem logs are a wealth of information that can be leveraged to control the b...
Most pattern mining methods yield a large number of frequent patterns, and isolating a small relevan...
Abstract. Large software systems comprise of different and tightly in-terconnected components. Such ...
We are surrounded by an increasing number of devices and applications that produce a huge quantity o...
System logs contain messages from a wide range of applications. They are the natural starting point ...
Because of their contribution to the overall reliability assurance process, software logs have becom...
International audienceBecause of their contribution to the overall reliabil- ity assurance process, ...
International audienceIn this paper we present a comprehensive log compression (CLC) method that use...
Abstract. More and more ubiquitous and mobile computer networks are becom-ing available, which leads...
Due to the complexity of the network structure, log analysis is usually necessary for the maintenanc...
Understanding and troubleshooting wide area networks (such as military backbone networks and ISP net...
Abstract—Understanding and troubleshooting wide area net-works (such as military backbone networks a...
These days, event logs contain immense amounts of knowledge that may simply overwhelm a personality&...
This paper discusses the analysis of data from log files and presents novel methods and ideas of ana...
International audienceThere is an increasing need to quickly understand the contents log data. A wid...
International audienceSystem logs are a wealth of information that can be leveraged to control the b...
Most pattern mining methods yield a large number of frequent patterns, and isolating a small relevan...
Abstract. Large software systems comprise of different and tightly in-terconnected components. Such ...
We are surrounded by an increasing number of devices and applications that produce a huge quantity o...
System logs contain messages from a wide range of applications. They are the natural starting point ...
Because of their contribution to the overall reliability assurance process, software logs have becom...
International audienceBecause of their contribution to the overall reliabil- ity assurance process, ...