{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T17:42:56Z","timestamp":1751996576658,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030227333"},{"type":"electronic","value":"9783030227340"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22734-0_12","type":"book-chapter","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T15:02:45Z","timestamp":1559919765000},"page":"153-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Exploratory Visual Analysis of Anomalous Runtime Behavior in Streaming High Performance Computing Applications"],"prefix":"10.1007","author":[{"given":"Cong","family":"Xie","sequence":"first","affiliation":[]},{"given":"Wonyong","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Gyorgy","family":"Matyasfalvi","sequence":"additional","affiliation":[]},{"given":"Hubertus","family":"Van Dam","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Mueller","sequence":"additional","affiliation":[]},{"given":"Shinjae","family":"Yoo","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"issue":"6","key":"12_CR1","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1002\/cpe.1553","volume":"22","author":"L Adhianto","year":"2010","unstructured":"Adhianto, L., et al.: HPCTOOLKIT: tools for performance analysis of optimized parallel programs. Concurr. Comput. Pract. Exp. 22(6), 685\u2013701 (2010)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Arnold, D.C., Ahn, D.H., De Supinski, B.R., Lee, G.L., Miller, B.P., Schulz, M.: Stack trace analysis for large scale debugging. In: IPDPS, pp. 1\u201310. IEEE (2007)","DOI":"10.1109\/IPDPS.2007.370254"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"MM Breunig","year":"2000","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. ACM SIGMOD 29, 93\u2013104 (2000)","journal-title":"ACM SIGMOD"},{"issue":"10","key":"12_CR4","doi-asserted-by":"publisher","first-page":"e4068","DOI":"10.1002\/cpe.4068","volume":"29","author":"Naser Ezzati-Jivan","year":"2017","unstructured":"Ezzati-Jivan, N., Dagenais, M.R.: Multi-scale navigation of large trace data: a survey. Concurr. Comput. Pract. Exp. 29(10) (2017)","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"6","key":"12_CR5","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1002\/cpe.1556","volume":"22","author":"M Geimer","year":"2010","unstructured":"Geimer, M., Wolf, F., et al.: The scalasca performance toolset architecture. Concurr. Comput. Pract. Exp. 22(6), 702\u2013719 (2010)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-319-69953-0_4","volume-title":"Supercomputing Frontiers","author":"J Gu","year":"2018","unstructured":"Gu, J., Klasky, S., Podhorszki, N., Qiang, J., Wu, K.: Querying large scientific data sets with adaptable IO system ADIOS. In: Yokota, R., Wu, W. (eds.) SCFA 2018. LNCS, vol. 10776, pp. 51\u201369. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-69953-0_4"},{"key":"12_CR7","unstructured":"Isaacs, K.E., et al.: State of the art of performance visualization. In: EuroVis 2014 (2014)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Karran, B., Trumper, J., Dollner, J.: SYNCTRACE: visual thread-interplay analysis. In: VISSOFT 2013, vol. 00, pp. 1\u201310 (2013)","DOI":"10.1109\/VISSOFT.2013.6650534"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-540-68564-7_9","volume-title":"Tools for High Performance Computing","author":"A Kn\u00fcpfer","year":"2008","unstructured":"Kn\u00fcpfer, A., et al.: The Vampir performance analysis tool-set. In: Resch, M., Keller, R., Himmler, V., Krammer, B., Schulz, A. (eds.) Tools for High Performance Computing, pp. 139\u2013155. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68564-7_9"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-31476-6_7","volume-title":"Tools for High Performance Computing 2011","author":"A Kn\u00fcpfer","year":"2011","unstructured":"Kn\u00fcpfer, A., et al.: Score-P: a joint performance measurement run-time infrastructure for periscope, scalasca, TAU, and Vampir. In: Brunst, H., M\u00fcller, M., Nagel, W., Resch, M. (eds.) Tools for High Performance Computing 2011, pp. 79\u201391. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-31476-6_7"},{"key":"12_CR11","unstructured":"Kobourov, S.G.: Spring embedders and force directed graph drawing algorithms. arXiv preprint arXiv:1201.3011 (2012)"},{"issue":"1","key":"12_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF02289565","volume":"29","author":"JB Kruskal","year":"1964","unstructured":"Kruskal, J.B.: Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis. Psychometrika 29(1), 1\u201327 (1964)","journal-title":"Psychometrika"},{"key":"12_CR13","first-page":"2579","volume":"9","author":"L van der Maaten","year":"2008","unstructured":"van der Maaten, L., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9, 2579\u20132605 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"12_CR14","unstructured":"Salonen, J.: (2013). http:\/\/jonisalonen.com\/2013\/deriving-welfords-method-for-computing-variance\/"},{"key":"12_CR15","unstructured":"Sch\u00f6lkopf, B., Williamson, R., Smola, A., Shawe-Taylor, J., Platt, J.: Support vector method for novelty detection. In: NIPS, pp. 582\u2013588 (2000)"},{"issue":"2","key":"12_CR16","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1177\/1094342006064482","volume":"20","author":"Sameer S. Shende","year":"2006","unstructured":"Shende, S.S., Malony, A.D.: The TAU parallel performance system. Int. J. High Perform. Comput. Appl. 20(2), 287\u2013311 (2006). https:\/\/doi.org\/10.1177\/1094342006064482","journal-title":"The International Journal of High Performance Computing Applications"},{"key":"12_CR17","unstructured":"Shervashidze, N., Schweitzer, P., van Leeuwen, E.J., Mehlhorn, K., Borgwardt, K.M.: Weisfeiler-lehman graph kernels. J. Mach. Learn. Res. 12, 2539\u20132561 (2011)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Sigovan, C., et al.: A visual network analysis method for large-scale parallel I\/O systems. In: IEEE IPDPS, pp. 308\u2013319 (2013)","DOI":"10.1109\/IPDPS.2013.96"},{"issue":"9","key":"12_CR19","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1016\/j.cpc.2010.04.018","volume":"181","author":"M Valiev","year":"2010","unstructured":"Valiev, M., et al.: NWChem: a comprehensive and scalable open-source solution for large scale molecular simulations. Comput. Phys. Commun. 181(9), 1477\u20131489 (2010)","journal-title":"Comput. Phys. Commun."},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Wood, C., et al.: A scalable observation system for introspection and in situ analytics. In: Proceedings of the 5th Workshop on Extreme-Scale Programming Tools, ESPT 2016, Piscataway, NJ, USA, pp. 42\u201349. IEEE Press (2016)","DOI":"10.1109\/ESPT.2016.010"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Xie, C., Xu, W., Ha, S., et al.: Performance visualization for TAU instrumented scientific workflows. In: VISIGRAPP (3: IVAPP), pp. 333\u2013340. SciTePress (2018)","DOI":"10.5220\/0006646803330340"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Xie, C., Xu, W., Mueller, K.: A visual analytics framework for the detection of anomalous call stack trees in high performance computing applications. IEEE Trans. Vis. Comput. Graph. (2018)","DOI":"10.1109\/TVCG.2018.2865026"},{"issue":"3","key":"12_CR23","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1177\/109434209901300310","volume":"13","author":"Omer Zaki","year":"1999","unstructured":"Zaki, O., Lusk, E., Gropp, W., Swider, D.: Toward scalable performance visualization with Jumpshot. Int. J. High Perform. Comput. Appl. 13(3), 277\u2013288 (1999). https:\/\/doi.org\/10.1177\/109434209901300310","journal-title":"The International Journal of High Performance Computing Applications"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22734-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,17]],"date-time":"2023-09-17T08:25:47Z","timestamp":1694939147000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22734-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030227333","9783030227340"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22734-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}