{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:05:06Z","timestamp":1725797106258},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/cnsm.2015.7367332","type":"proceedings-article","created":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T21:34:58Z","timestamp":1451943298000},"page":"8-14","source":"Crossref","is-referenced-by-count":49,"title":["Proactive failure detection learning generation patterns of large-scale network logs"],"prefix":"10.1109","author":[{"given":"Tatsuaki","family":"Kimura","sequence":"first","affiliation":[]},{"given":"Akio","family":"Watanabe","sequence":"additional","affiliation":[]},{"given":"Tsuyoshi","family":"Toyono","sequence":"additional","affiliation":[]},{"given":"Keisuke","family":"Ishibashi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"ref11","article-title":"Spatio-temporal Factorization of Log Data for Understanding Large-scale Network Events","author":"kimura","year":"2014","journal-title":"Proc INFOCOM"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775061"},{"key":"ref13","article-title":"A Log Mining Approach to Failure Analysis of Enterprise Telephony Systems","author":"lim","year":"2008","journal-title":"Proc DSN"},{"key":"ref14","article-title":"What Happened in my Network? Mining Network Events from Router Syslogs","author":"qiu","year":"2010","journal-title":"Proc IMC"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2307\/2284239"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990536"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623340"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2010.5691262"},{"journal-title":"Logentries","year":"0","key":"ref4"},{"journal-title":"IBM Tivoli","year":"0","key":"ref3"},{"journal-title":"The Computer Failure Data Repository (CFDR) - USENIX","year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"key":"ref8","article-title":"Online Passive-Aggressive Algorithms","author":"crammer","year":"2003","journal-title":"Proc NIPS"},{"journal-title":"Cisco 7200 Series Routers Processor Memory Parity Errors Support Page","year":"0","key":"ref7"},{"journal-title":"HP Software","year":"0","key":"ref2"},{"journal-title":"CA Spectrum","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270289"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081927"}],"event":{"name":"2015 11th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2015,11,9]]},"location":"Barcelona, Spain","end":{"date-parts":[[2015,11,13]]}},"container-title":["2015 11th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360263\/7367318\/07367332.pdf?arnumber=7367332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T04:24:04Z","timestamp":1490415844000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7367332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cnsm.2015.7367332","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}