{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T17:48:10Z","timestamp":1773683290570,"version":"3.50.1"},"reference-count":46,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/glocom.2012.6503343","type":"proceedings-article","created":{"date-parts":[[2013,4,26]],"date-time":"2013-04-26T19:29:23Z","timestamp":1367004563000},"page":"1605-1610","source":"Crossref","is-referenced-by-count":20,"title":["A self-evolving anomaly detection framework for developing highly dependable utility clouds"],"prefix":"10.1109","author":[{"given":"Husanbir S.","family":"Pannu","sequence":"first","affiliation":[]},{"family":"Jianguo Liu","sequence":"additional","affiliation":[]},{"given":"Song","family":"Fu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Bayesian approaches to failure prediction for disk drives","author":"hamerly","year":"2001","journal-title":"Proc of International Conference on Machine Learning (ICML-05)"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1670679.1670680"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.20"},{"key":"36","article-title":"Support vector method for novelty detection","author":"scho?lkopf","year":"2000","journal-title":"Proceedings of Conference on Advances in Neural Information Processing Systems"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.7.1.52-61"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.176"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2010.5682334"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956799"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6006036"},{"key":"39","year":"0","journal-title":"SYSSTAT Performance Monitoring Tools"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2010.06.010"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1995.497656"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.4"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1362622.1362678"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2004.01.010"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.18"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00151-1"},{"key":"43","article-title":"Predicting rare events in temporal domains","author":"vilalta","year":"2002","journal-title":"Proceedings of IEEE International Conference on Data Mining (ICDM)"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3264-1"},{"key":"41","article-title":"Mset performance optimization for detection of software aging","author":"vaidyanathan","year":"2003","journal-title":"Proceedings of IEEE International Symposium on Software Reliability Engineering (ISSRE)"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"45","article-title":"Failure prediction for autonomic management of networked computer systems with availability assurance","author":"zhang","year":"2010","journal-title":"Proceedings of DPDNS IEEE International Parallel and Distributed Processing Symposium (IPDPS)"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807161"},{"key":"46","article-title":"Failure diagnosis using decision trees","author":"zheng","year":"2004","journal-title":"Proceedings of IEEE International Conference on Autonomic Computing (ICAC)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76778-7_15"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575134"},{"key":"24","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1016\/j.jpdc.2010.03.003","article-title":"A study of dynamic meta-learning for failure prediction in large-scale systems","volume":"70","author":"lan","year":"2010","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.18"},{"key":"26","article-title":"Filtering failure logs for a BlueGene\/L prototype","author":"liang","year":"2005","journal-title":"Proceedings of IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958247"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"29","article-title":"Why do Internet services fail, and what can be done about it","author":"oppenheimer","year":"2003","journal-title":"Proceedings of USENIX Symposium on Internet Technologies and Systems (USITS)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.70"},{"key":"2","first-page":"125","article-title":"Support vector clustering","volume":"2","author":"ben-hur","year":"2001","journal-title":"Journal of Machine Learning Research"},{"key":"10","article-title":"Performance metric selection for autonomic anomaly detection on cloud computing systems","author":"fu","year":"2011","journal-title":"Proceedings of IEEE Global Communications Conference (GLOBECOM)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2005.40"},{"key":"7","article-title":"Correlating instrumentation data to system states: A building block for automated diagnosis and control","author":"cohen","year":"2004","journal-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'02)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1029005"},{"key":"32","article-title":"Causes of failure in web applications","author":"pertet","year":"2005","journal-title":"Technical Report Technical Report CMU-PDL-05-109"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"31","year":"0","journal-title":"perf Linux Profling with Performance Counters"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/582442.582443"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1147\/rd.483.0519"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"}],"event":{"name":"GLOBECOM 2012 - 2012 IEEE Global Communications Conference","location":"Anaheim, CA, USA","start":{"date-parts":[[2012,12,3]]},"end":{"date-parts":[[2012,12,7]]}},"container-title":["2012 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6490098\/6503052\/06503343.pdf?arnumber=6503343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T08:04:18Z","timestamp":1498032258000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6503343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/glocom.2012.6503343","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}