{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T08:13:41Z","timestamp":1769069621481,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T00:00:00Z","timestamp":1621468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,20]]},"DOI":"10.1145\/3468691.3468716","type":"proceedings-article","created":{"date-parts":[[2021,8,7]],"date-time":"2021-08-07T12:01:52Z","timestamp":1628337712000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["Server-Language Processing: A Semi-Supervised approach to Server Failure Detection"],"prefix":"10.1145","author":[{"given":"Sonali","family":"Syngal","sequence":"first","affiliation":[{"name":"Mastercard AI Garage, India"}]},{"given":"Sangam","family":"Verma","sequence":"additional","affiliation":[{"name":"Mastercard AI Garage, India"}]},{"given":"Kandukuri","family":"Karthik","sequence":"additional","affiliation":[{"name":"Mastercard AI Garage, India"}]},{"given":"Yatin","family":"Katyal","sequence":"additional","affiliation":[{"name":"Mastercard AI Garage, India"}]},{"given":"Soumyadeep","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Mastercard AI Garage, India"}]}],"member":"320","published-online":{"date-parts":[[2021,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","DOI":"10.1145\/375663.375668","volume-title":"Outlier Detection for High Dimensional Data","author":"Aggarwal C.","year":"2001"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence, Vol.\u00a033","author":"Borghesi Andrea","year":"2019"},{"key":"e_1_3_2_1_3_1","volume-title":"ACM Conference on Computer and Communications Security. 1285\u20131298","author":"Du Min","year":"2017"},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE International Conference on Data Mining. 149\u2013158","author":"Fu Qiang","year":"2009"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE International Symposium on Software Reliability Engineering. 207\u2013218","author":"He Shilin","year":"2016"},{"key":"e_1_3_2_1_7_1","unstructured":"Anders Krogh and John\u00a0A. Hertz. 1992. A Simple Weight Decay Can Improve Generalization. In Advances in Neural Information Processing Systems 4. 950\u2013957.  Anders Krogh and John\u00a0A. Hertz. 1992. A Simple Weight Decay Can Improve Generalization. In Advances in Neural Information Processing Systems 4. 950\u2013957."},{"key":"e_1_3_2_1_8_1","volume-title":"IEEE International Conference on Dependable Systems and Networks (DSN). 398\u2013403","author":"Lim Chinghway","year":"2008"},{"key":"e_1_3_2_1_9_1","volume-title":"ACM International conference on Knowledge discovery and data mining. 1255\u20131264","author":"Makanju AO","year":"2009"},{"key":"e_1_3_2_1_10_1","volume-title":"Conference on Neural Information Processing Systems. 3111\u20133119","author":"Mikolov Tomas","year":"2013"},{"key":"e_1_3_2_1_11_1","volume-title":"Computer network intrusion detection using sequential LSTM neural networks autoencoders. In 2018 26th signal processing and communications applications conference (SIU)","author":"Mirza H"},{"key":"e_1_3_2_1_12_1","volume-title":"Dropout: a simple way to prevent neural networks from overfitting.Journal of Machine Learning Research 15, 1","author":"Srivastava Nitish","year":"2014"},{"key":"e_1_3_2_1_13_1","unstructured":"Ilya Sutskever Oriol Vinyals and Quoc\u00a0V Le. 2014. Sequence to sequence learning with neural networks. In Advances in Neural Information Processing Systems. 3104\u20133112.  Ilya Sutskever Oriol Vinyals and Quoc\u00a0V Le. 2014. Sequence to sequence learning with neural networks. In Advances in Neural Information Processing Systems. 3104\u20133112."},{"key":"e_1_3_2_1_14_1","volume-title":"ACM International conference on Information and knowledge management. 785\u2013794","author":"Tang Liang","year":"2011"},{"key":"e_1_3_2_1_15_1","volume-title":"IEEE Workshop on IP Operations and Management. 119\u2013126","author":"Vaarandi Risto","year":"2003"},{"key":"e_1_3_2_1_16_1","volume-title":"International Conference on Machine Learning proceedings.","author":"Vincent P.","year":"2008"},{"key":"e_1_3_2_1_17_1","unstructured":"Yonghui Wu Mike Schuster Zhifeng Chen Quoc\u00a0V Le Mohammad Norouzi Wolfgang Macherey Maxim Krikun Yuan Cao Qin Gao Klaus Macherey 2016. Google\u2019s neural machine translation system: Bridging the gap between human and machine translation. arXiv preprint arXiv:1609.08144(2016).  Yonghui Wu Mike Schuster Zhifeng Chen Quoc\u00a0V Le Mohammad Norouzi Wolfgang Macherey Maxim Krikun Yuan Cao Qin Gao Klaus Macherey 2016. Google\u2019s neural machine translation system: Bridging the gap between human and machine translation. arXiv preprint arXiv:1609.08144(2016)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","volume-title":"Detecting large-scale system problems by mining console logs","author":"Xu Wei","DOI":"10.1145\/1629575.1629587"},{"key":"e_1_3_2_1_19_1","volume-title":"ACM International Conference on Knowledge discovery in Data Mining. 499\u2013508","author":"Yamanishi Kenji","year":"2005"},{"key":"e_1_3_2_1_20_1","volume-title":"IEEE International Conference on Big Data. 1291\u20131300","author":"Zhang Ke","year":"2016"}],"event":{"name":"CNIOT2021: 2021 2nd International Conference on Computing, Networks and Internet of Things","location":"Beijing China","acronym":"CNIOT2021"},"container-title":["2021 2nd International Conference on Computing, Networks and Internet of Things (CNIOT 2021)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468691.3468716","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468691.3468716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:35Z","timestamp":1750268975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468691.3468716"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,20]]},"references-count":20,"alternative-id":["10.1145\/3468691.3468716","10.1145\/3468691"],"URL":"https:\/\/doi.org\/10.1145\/3468691.3468716","relation":{},"subject":[],"published":{"date-parts":[[2021,5,20]]}}}