{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:12:12Z","timestamp":1773375132935,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/glocom.2011.6134532","type":"proceedings-article","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T21:45:17Z","timestamp":1327959917000},"page":"1-5","source":"Crossref","is-referenced-by-count":11,"title":["Performance Metric Selection for Autonomic Anomaly Detection on Cloud Computing Systems"],"prefix":"10.1109","author":[{"family":"Song Fu","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref32","article-title":"Failure diagnosis using decision trees","author":"zheng","year":"2004","journal-title":"Proc of IEEE International Conference on Automatic Computing (ICAC)"},{"key":"ref31","article-title":"A hierarchical failure management framework for dependability assurance in compute clusters","author":"zhang","year":"2010","journal-title":"International Journal of Computational Science"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2010.5470868"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1362622.1362678"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2010.5682334"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6006036"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.20"},{"key":"ref15","author":"han","year":"2005","journal-title":"Data Mining Concepts and Techniques"},{"key":"ref16","author":"jeffrey","year":"2001","journal-title":"Advanced Engineering Mathematics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.18"},{"key":"ref19","article-title":"Filtering failure logs for a BlueGene\/L prototype","author":"liang","year":"2005","journal-title":"Proc of Conf on Dependable Systems and Networks (DSN)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2007.01.012"},{"key":"ref4","article-title":"Correlating instrumentation data to system states: a building block for automated diagnosis and control","author":"cohen","year":"2004","journal-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'02)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.5"},{"key":"ref3","author":"breiman","year":"1984","journal-title":"Classification and Regression Trees"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2010.5546715"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081927"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2009.21"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.18"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1016\/j.jpdc.2010.01.002","article-title":"Failure-aware resource management for high-availability computing clusters with distributed virtual machines","volume":"70","author":"fu","year":"2010","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(97)00115-1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2010.06.010"},{"key":"ref1","year":"0"},{"key":"ref20","article-title":"A log mining approach to failure analysis of enterprise telephony systems","author":"lim","year":"2008","journal-title":"Conference on Dependable Systems and Networks (DSN)"},{"key":"ref22","article-title":"Exploiting availability prediction in distributed systems","author":"mickens","year":"2006","journal-title":"Proc of USENIX Symp on Networked Systems Design and Implementation (NSDI)"},{"key":"ref21","article-title":"Mining partially periodic event patterns with unknown periods","author":"ma","year":"2001","journal-title":"Proc IEEE Int Conf on Data Engineering (ICDE)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956799"},{"key":"ref23","article-title":"Mining logs files for computing system management","author":"peng","year":"2005","journal-title":"Proc of IEEE International Conference on Automatic Computing (ICAC)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1670679.1670680"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311948"}],"event":{"name":"2011 IEEE Global Communications Conference (GLOBECOM 2011)","location":"Houston, TX, USA","start":{"date-parts":[[2011,12,5]]},"end":{"date-parts":[[2011,12,9]]}},"container-title":["2011 IEEE Global Telecommunications Conference - GLOBECOM 2011"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6132211\/6133457\/06134532.pdf?arnumber=6134532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T13:31:46Z","timestamp":1497965506000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6134532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/glocom.2011.6134532","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}