{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:19:50Z","timestamp":1740097190546,"version":"3.37.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319284293"},{"type":"electronic","value":"9783319284309"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28430-9_20","type":"book-chapter","created":{"date-parts":[[2016,1,9]],"date-time":"2016-01-09T04:32:28Z","timestamp":1452313948000},"page":"263-282","source":"Crossref","is-referenced-by-count":1,"title":["Cross-Correlation as Tool to Determine the Similarity of Series of Measurements for Big-Data Analysis Tasks"],"prefix":"10.1007","author":[{"given":"Marcus","family":"Hilbrich","sequence":"first","affiliation":[]},{"given":"Ralph","family":"M\u00fcller-Pfefferkorn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,10]]},"reference":[{"issue":"7","key":"20_CR1","doi-asserted-by":"publisher","first-page":"072007","DOI":"10.1088\/1742-6596\/219\/7\/072007","volume":"219","author":"J Andreeva","year":"2010","unstructured":"Andreeva, J., Calloni, M., Colling, D., Fanzago, F., D\u2019Hondt, J., Klem, J., Maier, G., Letts, J., Maes, J., Padhi, S., Sarkar, S., Spiga, D., Mulders, P.V., Villella, I.: CMS analysis operations. J. Phys. Conf. Ser. 219(7), 072007 (2010). http:\/\/stacks.iop.org\/1742-6596\/219\/i=7\/a=072007","journal-title":"J. Phys. Conf. Ser."},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s10723-009-9134-3","volume":"7","author":"T Baur","year":"2009","unstructured":"Baur, T., Breu, R., Klmn, T., Lindinger, T., Milbert, A., Poghosyan, G., Reiser, H., Romberg, M.: An interoperable grid information system for integrated resource monitoring based on virtual organizations. J. Grid Comput. 7, 319\u2013333 (2009). doi: 10.1007\/s10723-009-9134-3 . http:\/\/dx.doi.org\/10.1007\/s10723-009-9134-3","journal-title":"J. Grid Comput."},{"key":"20_CR3","first-page":"58","volume":"15","author":"D Beasley","year":"1993","unstructured":"Beasley, D., Bull, D.R., Martin, R.R.: An overview of genetic algorithms: Part 1, fundamentals. Univ. Comput. 15, 58\u201369 (1993)","journal-title":"Univ. Comput."},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-11261-4_2","volume-title":"Tools for High Performance Computing 2009","author":"H Brunst","year":"2010","unstructured":"Brunst, H., Hackenberg, D., Juckeland, G., Rohling, H.: Comprehensive performance tracking with vampir 7. In: M\u00fcller, M.S., Resch, M.M., Schulz, A., Nagel, W.E. (eds.) Tools for High Performance Computing 2009, pp. 17\u201329. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-11261-4_2"},{"key":"20_CR5","unstructured":"Chan, P., Stolfo, S.J.: Toward parallel and distributed learning by meta-learning. In: AAAI Workshop in Knowledge Discovery in Databases, pp. 227\u2013240 (1993)"},{"issue":"2","key":"20_CR6","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"DE Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13(2), 222\u2013232 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Dickerson, J.E., Dickerson, J.A.: Fuzzy network profiling for intrusion detection. In: Proceedings of NAFIPS 19th International Conference of the North American Fuzzy Information Processing Society, Atlanta, pp. 301\u2013306 (2000)","DOI":"10.1109\/NAFIPS.2000.877441"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Eichenhardt, H., M\u00fcller-Pfefferkorn, R., Neumann, R., William, T.: User- and job-centric monitoring: analysing and presenting large amounts of monitoring data. In: Proceedings of the 2008 9th IEEE\/ACM International Conference on Grid Computing. GRID 2008, pp. 225\u2013232. IEEE Computer Society, Washington (2008). http:\/\/dx.doi.org\/10.1109\/GRID.2008.4662803","DOI":"10.1109\/GRID.2008.4662803"},{"key":"20_CR9","unstructured":"Elmroth, E., Gardfjll, P., Mulmo, O., ke Sandgren, Sandholm, T. : A Coordinated Accounting Solution for SweGrid Version: Draft 0.1.3, 7 October 2003"},{"key":"20_CR10","unstructured":"Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD 1996, pp. 226\u2013231 (1996)"},{"key":"20_CR11","unstructured":"Faloutsos, C., Ranganathan, M., Manolopoulos, Y.: Fast subsequence matching in time-series databases. In: Proceedings of the 1994 ACM SIGMOD International Conference on Management of Data, SIGMOD 1994, pp. 419\u2013429. ACM, New York (1994). http:\/\/doi.acm.org\/10.1145\/191839.191925"},{"issue":"1","key":"20_CR12","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TSMC.1986.289288","volume":"16","author":"J Grefenstette","year":"1986","unstructured":"Grefenstette, J.: Optimization of control parameters for genetic algorithms. IEEE Trans. Syst. Man Cybern. 16(1), 122\u2013128 (1986)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"von Gr\u00fcnigen, D.: Digitale Signalverarbeitung: Mit einer Einf\u00fchrung in die kontinuierlichen Signale und Systeme. Fachbuchverlag Leipzig (2008)","DOI":"10.3139\/9783446418189"},{"key":"20_CR14","series-title":"Computer Science and Computational Biology","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511574931","volume-title":"Algorithms on Stings, Trees, and Sequences","author":"D Gusfield","year":"1997","unstructured":"Gusfield, D.: Algorithms on Stings, Trees, and Sequences. Computer Science and Computational Biology. Cambridge University Press, New York (1997)"},{"issue":"1","key":"20_CR15","first-page":"100","volume":"28","author":"JA Hartigan","year":"1979","unstructured":"Hartigan, J.A., Wong, M.A.: Algorithm AS 136: a K-means clustering algorithm. J. Roy. Stat. Soc. Ser. C (Appl. Stat.) 28(1), 100\u2013108 (1979)","journal-title":"J. Roy. Stat. Soc. Ser. C (Appl. Stat.)"},{"key":"20_CR16","unstructured":"Hilbrich, M., M\u00fcller-Pfefferkorn, R.: A scalable infrastructure for job-centric monitoring data from distributed systems. In: Bubak, M., Turala, M., Wiatr, K. (eds.) Proceedings Cracow Grid Workshop 2009, pp. 120\u2013125. ACC CYFRONET AGH, ul. Nawojki 11, 30\u2013950 Krakow 61, P.O. Box 386, Poland, February 2010"},{"key":"20_CR17","unstructured":"Hilbrich, M., M\u00fcller-Pfefferkorn, R.: Achieving scalability for job centric monitoring in a distributed infrastructure. In: M\u00fchl, G., Richling, J., Herkersdorf, A. (eds.) ARCS Workshops. LNI, vol. 200, pp. 481\u2013492. GI (2012)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Hilbrich, M., Weber, M., Tsch\u00fcter, R.: Automatic analysis of large data sets: a walk-through on methods from different perspectives. In: 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia), pp. 373\u2013380, December 2013","DOI":"10.1109\/CLOUDCOM-ASIA.2013.47"},{"issue":"6","key":"20_CR19","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1145\/360825.360861","volume":"18","author":"DS Hirschberg","year":"1975","unstructured":"Hirschberg, D.S.: A linear space algorithm for computing maximal common subsequences. Commun. ACM 18(6), 341\u2013343 (1975)","journal-title":"Commun. ACM"},{"issue":"1","key":"20_CR20","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"J Holland","year":"1992","unstructured":"Holland, J.: Genetic algorithms. Sci. Am. 267(1), 44\u201350 (1992)","journal-title":"Sci. Am."},{"key":"20_CR21","unstructured":"Huffmire, T., Sherwood, T.: Wavelet-based phase classification. In: Proceedings of the 15th International Conference on Parallel Architectures and Compilation Techniques, PACT 2006, pp. 95\u2013104. ACM, New York (2006). http:\/\/doi.acm.org\/10.1145\/1152154.1152172"},{"issue":"8","key":"20_CR22","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1016\/j.patrec.2009.09.011","volume":"31","author":"AK Jain","year":"2010","unstructured":"Jain, A.K.: Data clustering: 50 years beyond K-means. Pattern Recogn. Lett. 31(8), 651\u2013666 (2010)","journal-title":"Pattern Recogn. Lett."},{"key":"20_CR23","series-title":"Wiley Series in Probability and Statistics","volume-title":"Finding Groups in Data: An Introduction to Cluster Analysis","author":"L Kaufman","year":"2005","unstructured":"Kaufman, L., Rousseeuw, P.J.: Finding Groups in Data: An Introduction to Cluster Analysis. Wiley Series in Probability and Statistics. Wiley, New York (2005). http:\/\/books.google.de\/books?id=yS0nAQAAIAAJ"},{"key":"20_CR24","unstructured":"Keogh, E.J., Pazzani, M.J.: An enhanced representation of time series which allows fast and accurate classification, clustering and relevance feedback (1998)"},{"key":"20_CR25","unstructured":"Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: Proceedings of the 7th Conference on USENIX Security Symposium, SSYM 1998, vol. 7, p. 6. USENIX Association, Berkeley (1998). http:\/\/dl.acm.org\/citation.cfm?id=1267549.1267555"},{"key":"20_CR26","unstructured":"Lee, W., Stolfo, S., Mok, K.: A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 120\u2013132 (1999)"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Lunt, T., Jagannathan, R., Lee, R., Whitehurst, A., Listgarten, S.: Knowledge-based intrusion detection. In: 1989 Proceedings of the Annual AI Systems in Government Conference, pp. 102\u2013107 (1989)","DOI":"10.1109\/AISIG.1989.47311"},{"key":"20_CR28","unstructured":"MacQueen, J.B.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 281\u2013297. University of California Press (1967)"},{"key":"20_CR29","unstructured":"M\u00fcller-Pfefferkorn, R., Neumann, R., Borovac, S., Hammad, A., Harenberg, T., H\u00fcsken, M., M\u00e4ttig, P., Mechtel, M., Meder-Marouelli, D., Ueberholz, P.: Monitoring of jobs and their execution for the LHC computing grid. In: Bubak, M., Turala, M., Wiatr, K. (eds.) Proceedings Cracow Grid Workshop 2006, pp. 224\u2013231. ACC CYFRONET AGH, ul. Nawojki 11, 30\u2013950 Krakow 61, P.O. Box 386, Poland (October 2006)"},{"key":"20_CR30","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/BF01840446","volume":"1","author":"EW Myers","year":"1986","unstructured":"Myers, E.W.: An O(ND) difference algorithm and its variations. Algorithmica 1, 251\u2013266 (1986)","journal-title":"Algorithmica"},{"issue":"3","key":"20_CR31","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/0022-2836(70)90057-4","volume":"48","author":"SB Needleman","year":"1970","unstructured":"Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. J. Mol. Biol. 48(3), 443\u2013453 (1970)","journal-title":"J. Mol. Biol."},{"issue":"2324","key":"20_CR32","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31(2324), 2435\u20132463 (1999). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128699001127","journal-title":"Comput. Netw."},{"issue":"5","key":"20_CR33","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.future.2008.11.003","volume":"25","author":"M Piro Rosario","year":"2009","unstructured":"Piro Rosario, M., Andrea, G., Giuseppe, P., Albert, W.: Using historical accounting information to predict the resource usage of grid jobs. Future Gener. Comput. Syst. 25(5), 499\u2013510 (2009)","journal-title":"Future Gener. Comput. Syst."},{"key":"20_CR34","unstructured":"Roesch, M., Telecommunications, S.: Snort - lightweight intrusion detection for networks, pp. 229\u2013238 (1999)"},{"key":"20_CR35","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","volume":"20","author":"PJ Rousseeuw","year":"1987","unstructured":"Rousseeuw, P.J.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 20, 53\u201365 (1987)","journal-title":"J. Comput. Appl. Math."},{"key":"20_CR36","volume-title":"Introduction to Data Mining","author":"PN Tan","year":"2005","unstructured":"Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining. Addison-Wesley, Boston (2005)"},{"issue":"6","key":"20_CR37","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/79.543973","volume":"13","author":"K Tang","year":"1996","unstructured":"Tang, K., Man, K., Kwong, S., He, Q.: Genetic algorithms and their applications. IEEE Signal Process. Mag. 13(6), 22\u201337 (1996)","journal-title":"IEEE Signal Process. Mag."},{"issue":"7","key":"20_CR38","doi-asserted-by":"publisher","first-page":"072022","DOI":"10.1088\/1742-6596\/219\/7\/072022","volume":"219","author":"DC Vanderster","year":"2010","unstructured":"Vanderster, D.C., Brochu, F., Cowan, G., Egede, U., Elmsheuser, J., Gaidoz, B., Harrison, K., Lee, H.C., Liko, D., Maier, A., Mocicki, J.T., Muraru, A., Pajchel, K., Reece, W., Samset, B., Slater, M., Soroko, A., Tan, C.L., Williams, M.: Ganga: user-friendly grid job submission and management tool for LHC and beyond. J. Phys. Conf. Ser. 219(7), 072022 (2010). http:\/\/stacks.iop.org\/1742-6596\/219\/i=7\/a=072022","journal-title":"J. Phys. Conf. Ser."},{"key":"20_CR39","unstructured":"Vlachos, M., Lin, J., Keogh, E., Gunopulos, D.: A wavelet-based anytime algorithm for K-means clustering of time series. In: Proceedings of the Workshop on Clustering High Dimensionality Data and Its Applications (2003)"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Big Data"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28430-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T05:49:51Z","timestamp":1567489791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28430-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319284293","9783319284309"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28430-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}