{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T10:50:12Z","timestamp":1761562212386,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-0952960"],"award-info":[{"award-number":["CCF-0952960"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010701","name":"Norwegian Centre for International Cooperation in Education","doi-asserted-by":"crossref","award":["SIU: NNA-2012\/10049"],"award-info":[{"award-number":["SIU: NNA-2012\/10049"]}],"id":[{"id":"10.13039\/501100010701","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100006377","name":"Purdue University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006377","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014513","name":"University of Stavanger","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100014513","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2019,7,1]]},"DOI":"10.1109\/tcc.2017.2678473","type":"journal-article","created":{"date-parts":[[2017,3,6]],"date-time":"2017-03-06T19:27:01Z","timestamp":1488828421000},"page":"611-624","source":"Crossref","is-referenced-by-count":5,"title":["A Markov Random Field Based Approach for Analyzing Supercomputer System Logs"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7751-8217","authenticated-orcid":false,"given":"Thomas","family":"Hacker","sequence":"first","affiliation":[]},{"given":"Rui","family":"Pais","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8347-0539","authenticated-orcid":false,"given":"Chunming","family":"Rong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921803"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/0005-2795(75)90109-9"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3679.001.0001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31865-1_25"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1089815.1089822"},{"year":"2015","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.21"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"ref11","first-page":"4","article-title":"Mining console logs for large-scale system problem detection","author":"xu","year":"2008","journal-title":"Proc 3rd Workshop Tracking Comput Syst Problems Mach Learning Technol"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"year":"2016","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1076034.1076115"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2012.107"},{"key":"ref16","first-page":"309","article-title":"Mining logs files for computing system management","author":"peng","year":"2005","journal-title":"Proc 2nd Int Conf Autonomic Comput"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2012.57"},{"journal-title":"Ending Spam Bayesian Content Filtering and the Art of Statistical Language Classification","year":"2005","author":"zdziarski","key":"ref18"},{"article-title":"Model based image processing","year":"2013","author":"bouman","key":"ref19"},{"journal-title":"Handbook of Parametric and Nonparametric Statistical Procedures","year":"2011","author":"sheskin","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2004.10031"},{"journal-title":"Nonparametric Statistics for the Social Sciences","year":"1988","author":"seigel","key":"ref27"},{"key":"ref3","article-title":"Analyzing cluster log files using logsurfer","author":"prewett","year":"2003","journal-title":"Proc 4th Annu Conf Linux Clusters"},{"key":"ref6","first-page":"173","article-title":"A framework for system event classification and prediction by means of machine learning","author":"pitakrat","year":"2014","journal-title":"Proc 8th Int Conf Performance Eval Methodologies Tools"},{"journal-title":"Machine Learning A Probabilistic Perspective","year":"2012","author":"murphy","key":"ref29"},{"journal-title":"Exploring Splunk","year":"2012","author":"carasso","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081927"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2004.1392628"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2076450.2076466"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-3121.1992.tb00605.x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1974.tb00999.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/8579.001.0001"},{"key":"ref24","first-page":"3","article-title":"A statistical approach to the spam problem","volume":"2003","author":"robinson","year":"2003","journal-title":"Linux J"},{"journal-title":"Probability An Introduction","year":"2014","author":"grimmett","key":"ref23"},{"article-title":"Concepts and applications of inferential statistics","year":"2014","author":"lowry","key":"ref26"},{"key":"ref25","article-title":"The spam-filtering accuracy plateau at 99.9 percent accuracy and how to get past it","author":"yerazunis","year":"2004","journal-title":"Proc MIT Spam Conference"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6245519\/8824148\/7872428-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/8824148\/07872428.pdf?arnumber=7872428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:07:27Z","timestamp":1657746447000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7872428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,1]]},"references-count":36,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2017.2678473","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"type":"electronic","value":"2168-7161"},{"type":"electronic","value":"2372-0018"}],"subject":[],"published":{"date-parts":[[2019,7,1]]}}}