{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T05:02:15Z","timestamp":1761195735791,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T00:00:00Z","timestamp":1280707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["622780"],"award-info":[{"award-number":["622780"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,8,2]]},"DOI":"10.1145\/1838574.1838583","type":"proceedings-article","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:15:36Z","timestamp":1280754936000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["End-to-end framework for fault management for open source clusters"],"prefix":"10.1145","author":[{"given":"John L.","family":"Hammond","sequence":"first","affiliation":[{"name":"ICES, University of Texas, Austin, Texas"}]},{"given":"Tommy","family":"Minyard","sequence":"additional","affiliation":[{"name":"TACC, University of Texas, Austin, Texas"}]},{"given":"Jim","family":"Browne","sequence":"additional","affiliation":[{"name":"University of Texas, Austin, Texas"}]}],"member":"320","published-online":{"date-parts":[[2010,8,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"BalaBit IT Security. syslog-ng logging system. http:\/\/www.balabit.com\/network-security\/syslog-ng\/.  BalaBit IT Security. syslog-ng logging system. http:\/\/www.balabit.com\/network-security\/syslog-ng\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Hilighter: Automatically building robust signatures of performance behavior for small- and large-scale systems","author":"Bod\u00edk P.","year":"2008","unstructured":"P. Bod\u00edk , M. Goldszmidt , and A. Fox . Hilighter: Automatically building robust signatures of performance behavior for small- and large-scale systems . In A. Fox and S. Basu, editors, SysML. USENIX Association , 2008 . P. Bod\u00edk, M. Goldszmidt, and A. Fox. Hilighter: Automatically building robust signatures of performance behavior for small- and large-scale systems. In A. Fox and S. Basu, editors, SysML. USENIX Association, 2008."},{"key":"e_1_3_2_1_3_1","volume-title":"First USENIX Workshop on the Analysis of System Logs, WASL 2008, December 7, 2008, San Diego, CA, USA, Proceedings. USENIX Association","author":"Bronevetsky G.","year":"2008","unstructured":"G. Bronevetsky , editor. First USENIX Workshop on the Analysis of System Logs, WASL 2008, December 7, 2008, San Diego, CA, USA, Proceedings. USENIX Association , 2008 . G. Bronevetsky, editor. First USENIX Workshop on the Analysis of System Logs, WASL 2008, December 7, 2008, San Diego, CA, USA, Proceedings. USENIX Association, 2008."},{"key":"e_1_3_2_1_4_1","volume-title":"Automation of anomaly diagnosis from cluster log files. (submitted for publication)","author":"Chuah E.","year":"2010","unstructured":"E. Chuah , S. Hao Kuo , P. Hiew , W. Chandra Tjhi , G. L. K. Khoon , J. Hammond , M. T. Michalewicz , T. Hung , and J. C. Browne . Automation of anomaly diagnosis from cluster log files. (submitted for publication) , 2010 . E. Chuah, S. Hao Kuo, P. Hiew, W. Chandra Tjhi, G. L. K. Khoon, J. Hammond, M. T. Michalewicz, T. Hung, and J. C. Browne. Automation of anomaly diagnosis from cluster log files. (submitted for publication), 2010."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.91"},{"key":"e_1_3_2_1_6_1","unstructured":"DFN-CERT. Logsurfer. http:\/\/www.syslog.org\/wiki\/Main\/LogSurfer.  DFN-CERT. Logsurfer. http:\/\/www.syslog.org\/wiki\/Main\/LogSurfer."},{"key":"e_1_3_2_1_7_1","unstructured":"E. W. Fulp G. A. Fink and J. N. Haack. Predicting computer system failures using support vector machines. In Bronevetsky {3}.   E. W. Fulp G. A. Fink and J. N. Haack. Predicting computer system failures using support vector machines. In Bronevetsky {3}."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2009.03.007"},{"key":"e_1_3_2_1_9_1","first-page":"2001","volume-title":"In The 6th International Symposium on Artificial Intelligence, Robotics and Automation in Space: A New Space Odyssey","author":"Havelund K.","year":"2001","unstructured":"K. Havelund and G. Rosu . Java PathExplorer - a runtime verification tool . In In The 6th International Symposium on Artificial Intelligence, Robotics and Automation in Space: A New Space Odyssey , page 2001 , 2001 . K. Havelund and G. Rosu. Java PathExplorer - a runtime verification tool. In In The 6th International Symposium on Artificial Intelligence, Robotics and Automation in Space: A New Space Odyssey, page 2001, 2001."},{"key":"e_1_3_2_1_10_1","volume-title":"RIACS","author":"Havelund K.","year":"2001","unstructured":"K. Havelund and G. Rosu . Testing linear temporal logic formulae on finite execution traces. Technical report , RIACS , 2001 . K. Havelund and G. Rosu. Testing linear temporal logic formulae on finite execution traces. Technical report, RIACS, 2001."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:FORM.0000017721.39909.4b"},{"key":"e_1_3_2_1_12_1","unstructured":"IBM Corporation. Autonomic computing toolkit. http:\/\/www.ibm.com\/developerworks\/autonomic\/overview.html.  IBM Corporation. Autonomic computing toolkit. http:\/\/www.ibm.com\/developerworks\/autonomic\/overview.html."},{"key":"e_1_3_2_1_13_1","unstructured":"Lawrence Berkeley National Laboratory. NetLogger toolkit. http:\/\/dsd.lbl.gov\/NetLogger\/.  Lawrence Berkeley National Laboratory. NetLogger toolkit. http:\/\/dsd.lbl.gov\/NetLogger\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Lawrence Livermore National Laboratory. Cerebro. https:\/\/computing.llnl.gov\/linux\/cerebro.html.  Lawrence Livermore National Laboratory. Cerebro. https:\/\/computing.llnl.gov\/linux\/cerebro.html."},{"key":"e_1_3_2_1_15_1","unstructured":"Lawrence Livermore National Laboratory. Lustre monitoring tool. http:\/\/code.google.com\/p\/lmt\/.  Lawrence Livermore National Laboratory. Lustre monitoring tool. http:\/\/code.google.com\/p\/lmt\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11564096_62"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.18"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.50"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.46"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"L.\n      Liu Q.\n      Wu and \n      B.\n      Zhou\n  . \n  A fault-tolerant architecture for grid system\n  . In H. Jin Y. Pan N. Xiao and J. Sun editors GCC volume \n  3251\n   of \n  Lecture Notes in Computer Science pages \n  58\n  --\n  64\n  . \n  Springer 2004\n  .  L. Liu Q. Wu and B. Zhou. A fault-tolerant architecture for grid system. In H. Jin Y. Pan N. Xiao and J. Sun editors GCC volume 3251 of Lecture Notes in Computer Science pages 58--64. Springer 2004.","DOI":"10.1007\/978-3-540-30208-7_14"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094342004038958"},{"key":"e_1_3_2_1_22_1","unstructured":"Nagios Enterprises. Nagios - the industry standard in it infrastructure monitoring. http:\/\/www.nagios.org\/.  Nagios Enterprises. Nagios - the industry standard in it infrastructure monitoring. http:\/\/www.nagios.org\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.132"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"e_1_3_2_1_26_1","series-title":"Lecture Notes in Computer Science, 2917","doi-asserted-by":"crossref","DOI":"10.1007\/b94902","volume-title":"An Application to Semistructured and Temporal Data","author":"Quintarelli E.","year":"2004","unstructured":"E. Quintarelli . Model-Checking Based Data Retrieval : An Application to Semistructured and Temporal Data ( Lecture Notes in Computer Science, 2917 ) . SpringerVerlag , 2004 . E. Quintarelli. Model-Checking Based Data Retrieval: An Application to Semistructured and Temporal Data (Lecture Notes in Computer Science, 2917). SpringerVerlag, 2004."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956799"},{"key":"e_1_3_2_1_28_1","unstructured":"Sandia National Laboratories. Sisyphus - a log data-mining toolkit. http:\/\/www.cs.sandia.gov\/~jrstear\/sisyphus\/.  Sandia National Laboratories. Sisyphus - a log data-mining toolkit. http:\/\/www.cs.sandia.gov\/~jrstear\/sisyphus\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2008.4554349"},{"key":"e_1_3_2_1_30_1","unstructured":"Splunk Inc. Splunk - it search for log management operations security and compliance. http:\/\/www.splunk.com\/.  Splunk Inc. Splunk - it search for log management operations security and compliance. http:\/\/www.splunk.com\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2008.107"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.01.029"},{"key":"e_1_3_2_1_33_1","unstructured":"The Ganglia Project. Ganglia Monitoring System. http:\/\/ganglia.sourceforge.net\/.  The Ganglia Project. Ganglia Monitoring System. http:\/\/ganglia.sourceforge.net\/."},{"key":"e_1_3_2_1_34_1","first-page":"1071","volume-title":"NOMS","author":"Vaarandi R.","year":"2008","unstructured":"R. Vaarandi . Mining event logs with SLCT and LogHound . In NOMS , pages 1071 -- 1074 . IEEE, 2008 . R. Vaarandi. Mining event logs with SLCT and LogHound. In NOMS, pages 1071--1074. IEEE, 2008."},{"key":"e_1_3_2_1_35_1","volume-title":"Tools and techniques for event log analysis","author":"Vaarandi R.","year":"2005","unstructured":"R. Vaarandi and D. J. Vilo . Tools and techniques for event log analysis , 2005 . R. Vaarandi and D. J. Vilo. Tools and techniques for event log analysis, 2005."},{"volume-title":"The Free Encyclopedia","key":"e_1_3_2_1_36_1","unstructured":"Wikipedia. Temporal logic --- Wikipedia , The Free Encyclopedia . http:\/\/en.wikipedia.org\/w\/index.php?title=Temporal_logic&oldid=356754375, 2010. Wikipedia. Temporal logic --- Wikipedia, The Free Encyclopedia. http:\/\/en.wikipedia.org\/w\/index.php?title=Temporal_logic&oldid=356754375, 2010."},{"key":"e_1_3_2_1_37_1","unstructured":"Zenos Inc. Zenoss open source server network monitoring. http:\/\/www.zenoss.com\/.  Zenos Inc. Zenoss open source server network monitoring. http:\/\/www.zenoss.com\/."}],"event":{"name":"TG '10: TeraGrid 2010","sponsor":["Carnegie Mellon University Carnegie Mellon University","SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Pittsburgh Pennsylvania","acronym":"TG '10"},"container-title":["Proceedings of the 2010 TeraGrid Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1838574.1838583","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1838574.1838583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:11Z","timestamp":1750250471000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1838574.1838583"}},"subtitle":["Ranger"],"short-title":[],"issued":{"date-parts":[[2010,8,2]]},"references-count":37,"alternative-id":["10.1145\/1838574.1838583","10.1145\/1838574"],"URL":"https:\/\/doi.org\/10.1145\/1838574.1838583","relation":{},"subject":[],"published":{"date-parts":[[2010,8,2]]},"assertion":[{"value":"2010-08-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}