{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T21:40:02Z","timestamp":1741470002603,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642233999"},{"type":"electronic","value":"9783642234002"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23400-2_6","type":"book-chapter","created":{"date-parts":[[2011,8,17]],"date-time":"2011-08-17T11:34:15Z","timestamp":1313580855000},"page":"52-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Event Log Mining Tool for Large Scale HPC Systems"],"prefix":"10.1007","author":[{"given":"Ana","family":"Gainaru","sequence":"first","affiliation":[]},{"given":"Franck","family":"Cappello","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Trausan-Matu","sequence":"additional","affiliation":[]},{"given":"Bill","family":"Kramer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Archive, F.T., http:\/\/fta.inria.fr (accessed on 2010)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Schroeder, G.G.B.: A large-scale study of failures in high-performance computing systems. In: IEEE DSN 2006, pp. 249\u2013258 (June 2006)","DOI":"10.1109\/DSN.2006.5"},{"issue":"4","key":"6_CR3","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1023\/A:1020499411651","volume":"5","author":"A. Bookstein","year":"2002","unstructured":"Bookstein, A., all: Generalized hamming distance. Information Retrieval Journal\u00a05(4), 353\u2013375 (2002)","journal-title":"Information Retrieval Journal"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Chuah, E., et al.: Diagnosing the root-cause of failures from cluster log files (2010)","DOI":"10.1109\/HIPC.2010.5713159"},{"key":"6_CR5","unstructured":"T. computer failure data repository, http:\/\/cfdr.usenix.org (accessed on 2010)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Fu, Q.: all. Execution anomaly detection in distributed systems through unstructured log analysis. In: ICDM, pp. 149\u2013158 (December 2009)","DOI":"10.1109\/ICDM.2009.60"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Fu, S., Xu, C.-Z.: Exploring event correlation for failure prediction in coalitions of clusters. In: Proceedings of the ACM\/IEEE Conference on Supercomputing (November 2007)","DOI":"10.1145\/1362622.1362678"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Han, J., et al.: Mining frequent patterns without candidate generation. In: ACM SIGMOD, pp. 1\u201312 (May 2000)","DOI":"10.1145\/335191.335372"},{"issue":"2","key":"6_CR9","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/TPDS.2009.52","volume":"21","author":"Z. Lan","year":"2010","unstructured":"Lan, Z., all: Toward automated anomaly identification in large-scale systems. IEEE Trans. on Parallel and Distributed Systems\u00a021(2), 174\u2013187 (2010)","journal-title":"IEEE Trans. on Parallel and Distributed Systems"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Makanju, A., et al: Clustering event logs using iterative partitioning. In: 15th ACM SIGKDD, pp. 1255\u20131264 (2009)","DOI":"10.1145\/1557019.1557154"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"McCallum, A., all: Efficient clustering of high-dimensional data sets with application to reference matching. In: ACM SIGKDD, pp. 169\u2013178 (August 2000)","DOI":"10.1145\/347090.347123"},{"issue":"2-3","key":"6_CR12","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1023\/A:1009950525500","volume":"2","author":"M. Mitra","year":"2000","unstructured":"Mitra, M., Chaudhuri, B.: Information retrieval from documents: A survey. Information Retrieval Journal\u00a02(2-3), 141\u2013163 (2000)","journal-title":"Information Retrieval Journal"},{"key":"6_CR13","unstructured":"NCSA, http:\/\/www.ncsa.illinois.edu (accessed on 2010)"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/1089815.1089822","volume":"7","author":"W. Pang","year":"2005","unstructured":"Pang, W., et al.: Mining logs files for data-driven system management. ACM SIGKDD\u00a07, 44\u201351 (2005)","journal-title":"ACM SIGKDD"},{"key":"6_CR15","unstructured":"Park, Geist, A.: System log pre-processing to improve failure prediction. In: DSN 2009, pp. 572\u2013577 (2009)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Salfner, F., et al.: A survey of online failure prediction methods. ACM Computing Surveys\u00a042(3) (March 2010)","DOI":"10.1145\/1670679.1670680"},{"key":"6_CR17","unstructured":"Stearley, J.: Towards informatic analysis of syslogs. In: IEEE Conference on Cluster Computing (September 2004)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Stearley, J.: Towards informatic analysis of syslogs. In: IEEE International Conference on Cluster Computing, vol.\u00a05, pp. 309\u2013318 (2004)","DOI":"10.1109\/CLUSTR.2004.1392628"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Vaarandi, R.: Mining event logs with slct and loghound. In: IEEE NOMS 2008, pp. 1071\u20131074 (April 2008)","DOI":"10.1109\/NOMS.2008.4575281"},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/1089815.1089822","volume":"7","author":"S.M. Wei Peng","year":"2005","unstructured":"Wei Peng, S.M., Li, T.: Mining logs files for data driven system management. ACM SIGKDD\u00a07, 44\u201351 (2005)","journal-title":"ACM SIGKDD"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Xue, Z., et al.: A survey on failure prediction of large-scale server clusters. In: ACIS SNPD 2007, pp. 733\u2013738 (June 2007)","DOI":"10.1109\/SNPD.2007.284"},{"key":"6_CR22","unstructured":"Zarza, G., et al.: Fault-tolerant routing for multiple permanent and non-permanent faults in hpc systems. In: PDPTA 2010 (July 2010)"},{"key":"6_CR23","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1007\/978-3-540-87481-2_41","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"X. Zhang","year":"2008","unstructured":"Zhang, X., Furtlehner, C., Sebag, M.: Data streaming with affinity propagation. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008, Part II. LNCS (LNAI), vol.\u00a05212, pp. 628\u2013643. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2011 Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23400-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T21:00:54Z","timestamp":1741467654000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23400-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642233999","9783642234002"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23400-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}