{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:15Z","timestamp":1773655755258,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/infocom.2015.7218516","type":"proceedings-article","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T17:33:36Z","timestamp":1440437616000},"page":"1391-1399","source":"Crossref","is-referenced-by-count":16,"title":["Real-time failure prediction in online services"],"prefix":"10.1109","author":[{"given":"Mohammed","family":"Shatnawi","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Hefeeda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Error log processing for accurate failure prediction","author":"salfner","year":"2008","journal-title":"Proc of USENIX Workshop on Analysis of System Logs (WASL &#x2018;08) in conjunction with 8th USENIX Symp on Operating Systems Design and Implementation (OSDI &#x2018;08)"},{"key":"ref11","first-page":"115","article-title":"Pip: Detecting the unexpected in distributed systems","author":"reynolds","year":"2006","journal-title":"3rd Symp Networked Systems Design & Implementation (NSDI)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095821"},{"key":"ref13","first-page":"427","article-title":"Improving availability in distributed systems with failure informers","author":"leners","year":"2013","journal-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation"},{"key":"ref14","first-page":"43","article-title":"Diagnosing performance changes by comparing request flows","author":"sambasivan","year":"2011","journal-title":"Proc of the 8th USENIX Symposium on Networked Systems Design and Implementation"},{"key":"ref15","article-title":"Real-time monitoring","year":"0"},{"key":"ref16","first-page":"243","article-title":"Life, death, and the critical transition: Detecting liveness bugs in systems code","author":"killian","year":"2007","journal-title":"Proc of 4th USENIX Symposium on Networked System Design and Implementation (NSDI'07)"},{"key":"ref17","first-page":"143","article-title":"Webprophet: Automating performance prediction for web services","author":"li","year":"2010","journal-title":"Proc USENIX Symp Networked System Design and Implementation (NSDI)"},{"key":"ref18","first-page":"127","article-title":"A semantic framework for data analysis in networked systems","author":"viswanathan","year":"2011","journal-title":"Proc of the 8th USENIX Symposium on Networked Systems Design and Implementation"},{"key":"ref19","author":"riungu-kalliosaari","year":"2012","journal-title":"Testing in the Cloud Exploring the Practice IEEE Software"},{"key":"ref4","author":"kimball","year":"2013","journal-title":"The Data Warehouse Toolkit The Definitive Guide to Dimensional Modeling"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/9781118029145"},{"key":"ref6","first-page":"353","article-title":"Structured comparative analysis of systems logs to diagnose performance problems","author":"nagaraj","year":"2012","journal-title":"Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270289"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199359"},{"key":"ref2","author":"han","year":"2011","journal-title":"Data Mining Concepts and Techniques"},{"key":"ref1","article-title":"It channel","year":"0"},{"key":"ref9","first-page":"309","article-title":"Path-based failure and evolution management","author":"chen","year":"2004","journal-title":"Proc Symp Networked Systems Design and Implementation (NSDI)"},{"key":"ref20","author":"elliot","year":"2012","journal-title":"Testing in Production A to Z - TiP Methodologies Techniques and Examples IEEE Software"},{"key":"ref22","author":"provost","year":"2013","journal-title":"Data Science for Business What you need to know about data mining"},{"key":"ref21","article-title":"Testing in production","year":"0"}],"event":{"name":"IEEE INFOCOM 2015 - IEEE Conference on Computer Communications","location":"Kowloon, Hong Kong","start":{"date-parts":[[2015,4,26]]},"end":{"date-parts":[[2015,5,1]]}},"container-title":["2015 IEEE Conference on Computer Communications (INFOCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7172813\/7218353\/07218516.pdf?arnumber=7218516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T16:42:01Z","timestamp":1490373721000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7218516\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/infocom.2015.7218516","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}