{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T05:08:28Z","timestamp":1761196108517,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:00:00Z","timestamp":1656374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,28]]},"DOI":"10.1145\/3524059.3532374","type":"proceedings-article","created":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T16:13:11Z","timestamp":1655395991000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Clairvoyant"],"prefix":"10.1145","author":[{"given":"Khalid Ayedh","family":"Alharthi","sequence":"first","affiliation":[{"name":"University of Warwick, Coventry, UK and University of Bisha, Bisha, KSA"}]},{"given":"Arshad","family":"Jhumka","sequence":"additional","affiliation":[{"name":"University of Warwick, Coventry, UK"}]},{"given":"Sheng","family":"Di","sequence":"additional","affiliation":[{"name":"Argonne National Laboratory"}]},{"given":"Franck","family":"Cappello","sequence":"additional","affiliation":[{"name":"Argonne National Laboratory"}]}],"member":"320","published-online":{"date-parts":[[2022,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2018.8277153"},{"volume-title":"Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model","author":"Agrawal Bikash","key":"e_1_3_2_1_2_1","unstructured":"Bikash Agrawal , Tomasz Wiktorski , and Chunming Rong . 2015. Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model . In Cloud Computing and Big Data, Weizhong Qiang, Xianghan Zheng, and Ching-Hsien Hsu (Eds.). Springer International Publishing , Cham , 232--246. Bikash Agrawal, Tomasz Wiktorski, and Chunming Rong. 2015. Analyzing and Predicting Failure in Hadoop Clusters Using Distributed Hidden Markov Model. In Cloud Computing and Big Data, Weizhong Qiang, Xianghan Zheng, and Ching-Hsien Hsu (Eds.). Springer International Publishing, Cham, 232--246."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00037"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICAS.2019.8771527"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1552526.1552528"},{"key":"e_1_3_2_1_6_1","volume-title":"International Symposium on Formal Methods. Springer, 200--207","author":"Bursic Sathya","year":"2019","unstructured":"Sathya Bursic , Vittorio Cuculo , and Alessandro D'Amelio . 2019 . Anomaly Detection from Log Files Using Unsupervised Deep Learning . In International Symposium on Formal Methods. Springer, 200--207 . Sathya Bursic, Vittorio Cuculo, and Alessandro D'Amelio. 2019. Anomaly Detection from Log Files Using Unsupervised Deep Learning. In International Symposium on Formal Methods. Springer, 200--207."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.23919\/SPECTS.2017.8046776"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2012.129"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.05.013"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2015.19"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/HIPC.2010.5713159"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2014.63"},{"key":"e_1_3_2_1_14_1","volume-title":"Holistic root cause analysis of node failures in production HPC. SC Poster Session","author":"Das Anwesha","year":"2018","unstructured":"Anwesha Das and Frank Mueller . 2018. Holistic root cause analysis of node failures in production HPC. SC Poster Session ( 2018 ). Anwesha Das and Frank Mueller. 2018. Holistic root cause analysis of node failures in production HPC. SC Poster Session (2018)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2018.00012"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS47924.2020.00115"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS49936.2021.00035"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208040.3208051"},{"key":"e_1_3_2_1_19_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2018 . Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018). Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00055"},{"volume-title":"2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 473--484","author":"Di S.","key":"e_1_3_2_1_21_1","unstructured":"S. Di , H. Guo , E. Pershey , M. Snir , and F. Cappello . 2019. Characterizing and Understanding HPC Job Failures Over The 2K-Day Life of IBM BlueGene\/Q System . In 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 473--484 . S. Di, H. Guo, E. Pershey, M. Snir, and F. Cappello. 2019. Characterizing and Understanding HPC Job Failures Over The 2K-Day Life of IBM BlueGene\/Q System. In 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 473--484."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.18"},{"key":"e_1_3_2_1_23_1","volume-title":"Inter-Agency Workshop on HPC Resilience at Extreme Scale. http:\/\/www.rdadolf.com\/papers\/daly2012report.pdf.","author":"Bill Harrod John Daly DOD","year":"2012","unstructured":"John Daly DOD , Bill Harrod , Thuc Hoang , Lucy Nowell , Bob Adolf , Shekhar Borkar , Nathan DeBardeleben , Mike Heroux , David Rogers , Vivek Sarkar , 2012 . Inter-Agency Workshop on HPC Resilience at Extreme Scale. http:\/\/www.rdadolf.com\/papers\/daly2012report.pdf. John Daly DOD, Bill Harrod, Thuc Hoang, Lucy Nowell, Bob Adolf, Shekhar Borkar, Nathan DeBardeleben, Mike Heroux, David Rogers, Vivek Sarkar, et al. 2012. Inter-Agency Workshop on HPC Resilience at Extreme Scale. http:\/\/www.rdadolf.com\/papers\/daly2012report.pdf."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20943-2_1"},{"key":"e_1_3_2_1_25_1","volume-title":"Log-Based Anomaly Detection with Multi-Head Scaled Dot-Product Attention Mechanism. In International Conference on Database and Expert Systems Applications. Springer, 335--347","author":"Du Qingfeng","year":"2021","unstructured":"Qingfeng Du , Liang Zhao , Jincheng Xu , Yongqi Han , and Shuangli Zhang . 2021 . Log-Based Anomaly Detection with Multi-Head Scaled Dot-Product Attention Mechanism. In International Conference on Database and Expert Systems Applications. Springer, 335--347 . Qingfeng Du, Liang Zhao, Jincheng Xu, Yongqi Han, and Shuangli Zhang. 2021. Log-Based Anomaly Detection with Multi-Head Scaled Dot-Product Attention Mechanism. In International Conference on Database and Expert Systems Applications. Springer, 335--347."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.317"},{"key":"e_1_3_2_1_27_1","unstructured":"Oracle\/Sun Grid Engine. [n. d.]. https:\/\/www.oracle.com\/it-infrastructure\/. Online.  Oracle\/Sun Grid Engine. [n. d.]. https:\/\/www.oracle.com\/it-infrastructure\/. Online."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2014.6968768"},{"key":"e_1_3_2_1_29_1","first-page":"5","article-title":"Predicting Computer System Failures Using Support Vector Machines","volume":"8","author":"Fulp Errin W","year":"2008","unstructured":"Errin W Fulp , Glenn A Fink , and Jereme N Haack . 2008 . Predicting Computer System Failures Using Support Vector Machines . WASL 8 (2008), 5 -- 5 . Errin W Fulp, Glenn A Fink, and Jereme N Haack. 2008. Predicting Computer System Failures Using Support Vector Machines. WASL 8 (2008), 5--5.","journal-title":"WASL"},{"key":"e_1_3_2_1_30_1","volume-title":"Kramer","author":"Gainaru Ana","year":"2013","unstructured":"Ana Gainaru , Mohamed-Slim Bouguerra , Franck Cappello , Marc Snir , and William T. C . Kramer . 2013 . Navigating the Blue Waters : Online Failure Prediction in the Petascale Era . https:\/\/www.mcs.anl.gov\/papers\/P5219-1014.pdf. Ana Gainaru, Mohamed-Slim Bouguerra, Franck Cappello, Marc Snir, and William T. C. Kramer. 2013. Navigating the Blue Waters : Online Failure Prediction in the Petascale Era. https:\/\/www.mcs.anl.gov\/papers\/P5219-1014.pdf."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2012.107"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2012.57"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/1094342013488258"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2016.10"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2993728"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2008.17"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.20"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2018.00011"},{"key":"e_1_3_2_1_39_1","volume-title":"Detecting Log Anomalies with Multi-Head Attention (LAMA). arXiv preprint arXiv:2101.02392","author":"Guo Yicheng","year":"2021","unstructured":"Yicheng Guo , Yujin Wen , Congwei Jiang , Yixin Lian , and Yi Wan . 2021. Detecting Log Anomalies with Multi-Head Attention (LAMA). arXiv preprint arXiv:2101.02392 ( 2021 ). Yicheng Guo, Yujin Wen, Congwei Jiang, Yixin Lian, and Yi Wan. 2021. Detecting Log Anomalies with Multi-Head Attention (LAMA). arXiv preprint arXiv:2101.02392 (2021)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.52"},{"key":"e_1_3_2_1_41_1","first-page":"87","article-title":"Identifying Recovery Patterns from Resource Usage Data of Cluster Systems","volume":"13","author":"Gurumdimma Nentawe","year":"2018","unstructured":"Nentawe Gurumdimma , Gideon Dadik Bibu , Desmond Bala Bisandu , and Mammuan Titus Alams . 2018 . Identifying Recovery Patterns from Resource Usage Data of Cluster Systems . Science World Journal 13 , 4 (2018), 87 -- 94 . Nentawe Gurumdimma, Gideon Dadik Bibu, Desmond Bala Bisandu, and Mammuan Titus Alams. 2018. Identifying Recovery Patterns from Resource Usage Data of Cluster Systems. Science World Journal 13, 4 (2018), 87--94.","journal-title":"Science World Journal"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2016.017"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.ICCC.2017.11"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3295500.3356185"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2017.23"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.52"},{"key":"e_1_3_2_1_48_1","volume-title":"Log-based anomaly detection without logparsing. arXiv preprint arXiv:2108.01955","author":"Le Van-Hoang","year":"2021","unstructured":"Van-Hoang Le and Hongyu Zhang . 2021. Log-based anomaly detection without logparsing. arXiv preprint arXiv:2108.01955 ( 2021 ). Van-Hoang Le and Hongyu Zhang. 2021. Log-based anomaly detection without logparsing. arXiv preprint arXiv:2108.01955 (2021)."},{"key":"e_1_3_2_1_49_1","volume-title":"LAnoBERT: System Log Anomaly Detection based on BERT Masked Language Model. arXiv preprint arXiv:2111.09564","author":"Lee Yukyung","year":"2021","unstructured":"Yukyung Lee , Jina Kim , and Pilsung Kang . 2021. LAnoBERT: System Log Anomaly Detection based on BERT Masked Language Model. arXiv preprint arXiv:2111.09564 ( 2021 ). Yukyung Lee, Jina Kim, and Pilsung Kang. 2021. LAnoBERT: System Log Anomaly Detection based on BERT Masked Language Model. arXiv preprint arXiv:2111.09564 (2021)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.18"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.46"},{"key":"e_1_3_2_1_52_1","volume-title":"Rouge: A package for automatic evaluation of summaries. In Text summarization branches out. 74--81.","author":"Lin Chin-Yew","year":"2004","unstructured":"Chin-Yew Lin . 2004 . Rouge: A package for automatic evaluation of summaries. In Text summarization branches out. 74--81. Chin-Yew Lin. 2004. Rouge: A package for automatic evaluation of summaries. In Text summarization branches out. 74--81."},{"key":"e_1_3_2_1_53_1","volume-title":"Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692","author":"Liu Yinhan","year":"2019","unstructured":"Yinhan Liu , Myle Ott , Naman Goyal , Jingfei Du , Mandar Joshi , Danqi Chen , Omer Levy , Mike Lewis , Luke Zettlemoyer , and Veselin Stoyanov . 2019 . Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019). Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019)."},{"volume-title":"18th {USENIX} Conference on File and Storage Technologies ({FAST} 20). 151--167.","author":"Lu Sidi","key":"e_1_3_2_1_54_1","unstructured":"Sidi Lu , Bing Luo , Tirthak Patel , Yongtao Yao , Devesh Tiwari , and Weisong Shi . 2020. Making disk failure predictions smarter! . In 18th {USENIX} Conference on File and Storage Technologies ({FAST} 20). 151--167. Sidi Lu, Bing Luo, Tirthak Patel, Yongtao Yao, Devesh Tiwari, and Weisong Shi. 2020. Making disk failure predictions smarter!. In 18th {USENIX} Conference on File and Storage Technologies ({FAST} 20). 151--167."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(09)60497-0"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2820615"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Weibin Meng Ying Liu Shenglin Zhang Federico Zaiter Yuzhe Zhang Yuheng Huang Zhaoyang Yu Yuzhi Zhang Lei Song Ming Zhang etal 2021. Log-Class: Anomalous Log Identification and Classification with Partial Labels. IEEE Transactions on Network and Service Management (2021).  Weibin Meng Ying Liu Shenglin Zhang Federico Zaiter Yuzhe Zhang Yuheng Huang Zhaoyang Yu Yuzhi Zhang Lei Song Ming Zhang et al. 2021. Log-Class: Anomalous Log Identification and Classification with Partial Labels. IEEE Transactions on Network and Service Management (2021).","DOI":"10.1109\/TNSM.2021.3055425"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.310"},{"key":"e_1_3_2_1_59_1","volume-title":"Self-supervised log parsing. arXiv preprint arXiv:2003.07905","author":"Nedelkoski Sasho","year":"2020","unstructured":"Sasho Nedelkoski , Jasmin Bogatinovski , Alexander Acker , Jorge Cardoso , and Odej Kao . 2020. Self-supervised log parsing. arXiv preprint arXiv:2003.07905 ( 2020 ). Sasho Nedelkoski, Jasmin Bogatinovski, Alexander Acker, Jorge Cardoso, and Odej Kao. 2020. Self-supervised log parsing. arXiv preprint arXiv:2003.07905 (2020)."},{"key":"e_1_3_2_1_60_1","volume-title":"Proceedings of the 40th annual meeting of the Association for Computational Linguistics. 311--318","author":"Papineni Kishore","year":"2002","unstructured":"Kishore Papineni , Salim Roukos , Todd Ward , and Wei-Jing Zhu . 2002 . Bleu: a method for automatic evaluation of machine translation . In Proceedings of the 40th annual meeting of the Association for Computational Linguistics. 311--318 . Kishore Papineni, Salim Roukos, Todd Ward, and Wei-Jing Zhu. 2002. Bleu: a method for automatic evaluation of machine translation. In Proceedings of the 40th annual meeting of the Association for Computational Linguistics. 311--318."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/HiPC.2014.7116903"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.02.041"},{"key":"e_1_3_2_1_63_1","unstructured":"Alec Radford Jeffrey Wu Rewon Child David Luan Dario Amodei Ilya Sutskever etal 2019. Language models are unsupervised multitask learners. OpenAI blog 1 8 (2019) 9.  Alec Radford Jeffrey Wu Rewon Child David Luan Dario Amodei Ilya Sutskever et al. 2019. Language models are unsupervised multitask learners. OpenAI blog 1 8 (2019) 9."},{"key":"e_1_3_2_1_64_1","volume-title":"Exploring the limits of transfer learning with a unified text-to-text transformer. arXiv preprint arXiv:1910.10683","author":"Raffel Colin","year":"2019","unstructured":"Colin Raffel , Noam Shazeer , Adam Roberts , Katherine Lee , Sharan Narang , Michael Matena , Yanqi Zhou , Wei Li , and Peter J Liu . 2019. Exploring the limits of transfer learning with a unified text-to-text transformer. arXiv preprint arXiv:1910.10683 ( 2019 ). Colin Raffel, Noam Shazeer, Adam Roberts, Katherine Lee, Sharan Narang, Michael Matena, Yanqi Zhou, Wei Li, and Peter J Liu. 2019. Exploring the limits of transfer learning with a unified text-to-text transformer. arXiv preprint arXiv:1910.10683 (2019)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2012.139"},{"key":"e_1_3_2_1_66_1","volume-title":"Raja Nassar, and Stephen Scott.","author":"Raju Narasimha","year":"2007","unstructured":"Narasimha Raju , Yudan Liu , Chokchai Box Leangsuksun , Raja Nassar, and Stephen Scott. 2007 . Reliability Analysis in HPC clusters. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.88.1149&rep=rep1&type=pdf. Narasimha Raju, Yudan Liu, Chokchai Box Leangsuksun, Raja Nassar, and Stephen Scott. 2007. Reliability Analysis in HPC clusters. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.88.1149&rep=rep1&type=pdf."},{"key":"e_1_3_2_1_67_1","volume-title":"Akash Kumar Mohankumar, and Mitesh M Khapra","author":"Sai Ananya B","year":"2020","unstructured":"Ananya B Sai , Akash Kumar Mohankumar, and Mitesh M Khapra . 2020 . A survey of evaluation metrics used for NLG systems. arXiv preprint arXiv:2008.12009 (2020). Ananya B Sai, Akash Kumar Mohankumar, and Mitesh M Khapra. 2020. A survey of evaluation metrics used for NLG systems. arXiv preprint arXiv:2008.12009 (2020)."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.35"},{"key":"e_1_3_2_1_69_1","volume-title":"GPT-2C: A GPT-2 parser for Cowrie honeypot logs. arXiv preprint arXiv:2109.06595","author":"Setianto Febrian","year":"2021","unstructured":"Febrian Setianto , Erion Tsani , Fatima Sadiq , Georgios Domalis , Dimitris Tsakalidis , and Panos Kostakos . 2021. GPT-2C: A GPT-2 parser for Cowrie honeypot logs. arXiv preprint arXiv:2109.06595 ( 2021 ). Febrian Setianto, Erion Tsani, Fatima Sadiq, Georgios Domalis, Dimitris Tsakalidis, and Panos Kostakos. 2021. GPT-2C: A GPT-2 parser for Cowrie honeypot logs. arXiv preprint arXiv:2109.06595 (2021)."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508245"},{"key":"e_1_3_2_1_71_1","volume-title":"Furlani","author":"Simakov Nikolay A.","year":"2018","unstructured":"Nikolay A. Simakov , Joseph P. White , Robert L. DeLeon , Steven M. Gallo , Matthew D. Jones , Jeffrey T. Palmer , Benjamin Plessinger , and Thomas R . Furlani . 2018 . A Workload Analysis of NSF's Innovative HPC Resources Using XDMoD. arXiv:cs.DC\/1801.04306 Nikolay A. Simakov, Joseph P. White, Robert L. DeLeon, Steven M. Gallo, Matthew D. Jones, Jeffrey T. Palmer, Benjamin Plessinger, and Thomas R. Furlani. 2018. A Workload Analysis of NSF's Innovative HPC Resources Using XDMoD. arXiv:cs.DC\/1801.04306"},{"key":"e_1_3_2_1_72_1","volume-title":"Predictive, Proactive Autonomics. CoRR abs\/1606.04456","author":"S\u00eerbu Alina","year":"2016","unstructured":"Alina S\u00eerbu and \u00d6zalp Babaoglu . 2016. Towards Operator-less Data Centers Through Data-Driven , Predictive, Proactive Autonomics. CoRR abs\/1606.04456 ( 2016 ). arXiv:1606.04456 http:\/\/arxiv.org\/abs\/1606.04456 Alina S\u00eerbu and \u00d6zalp Babaoglu. 2016. Towards Operator-less Data Centers Through Data-Driven, Predictive, Proactive Autonomics. CoRR abs\/1606.04456 (2016). arXiv:1606.04456 http:\/\/arxiv.org\/abs\/1606.04456"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.170"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2010.5542626"},{"key":"e_1_3_2_1_75_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998--6008.  Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998--6008."},{"key":"e_1_3_2_1_76_1","volume-title":"Online failure prediction in cloud datacenters. Fujitsu scientific & technical journal 50, 1","author":"Watanabe Yukihiro","year":"2014","unstructured":"Yukihiro Watanabe and Yasuhide Matsumoto . 2014. Online failure prediction in cloud datacenters. Fujitsu scientific & technical journal 50, 1 ( 2014 ), 67--71. Yukihiro Watanabe and Yasuhide Matsumoto. 2014. Online failure prediction in cloud datacenters. Fujitsu scientific & technical journal 50, 1 (2014), 67--71."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Thorsten Wittkopp Alexander Acker Sasho Nedelkoski Jasmin Bogatinovski Dominik Scheinert Wu Fan and Odej Kao. 2021. A2Log: Attentive Augmented Log Anomaly Detection. arXiv:cs.LG\/2109.09537  Thorsten Wittkopp Alexander Acker Sasho Nedelkoski Jasmin Bogatinovski Dominik Scheinert Wu Fan and Odej Kao. 2021. A2Log: Attentive Augmented Log Anomaly Detection. arXiv:cs.LG\/2109.09537","DOI":"10.24251\/HICSS.2022.234"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958823"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.07.040"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972691"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"e_1_3_2_1_82_1","volume-title":"Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network. Applied Intelligence","author":"Zhao Zhenfei","year":"2021","unstructured":"Zhenfei Zhao , Weina Niu , Xiaosong Zhang , Runzi Zhang , Zhenqi Yu , and Cheng Huang . 2021 . Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network. Applied Intelligence (2021), 1--10. Zhenfei Zhao, Weina Niu, Xiaosong Zhang, Runzi Zhang, Zhenqi Yu, and Cheng Huang. 2021. Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network. Applied Intelligence (2021), 1--10."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2010.5542627"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2013.6558427"}],"event":{"name":"ICS '22: 2022 International Conference on Supercomputing","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Virtual Event","acronym":"ICS '22"},"container-title":["Proceedings of the 36th ACM International Conference on Supercomputing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524059.3532374","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3524059.3532374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:37Z","timestamp":1750188637000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524059.3532374"}},"subtitle":["a log-based transformer-decoder for failure prediction in large-scale systems"],"short-title":[],"issued":{"date-parts":[[2022,6,28]]},"references-count":83,"alternative-id":["10.1145\/3524059.3532374","10.1145\/3524059"],"URL":"https:\/\/doi.org\/10.1145\/3524059.3532374","relation":{},"subject":[],"published":{"date-parts":[[2022,6,28]]},"assertion":[{"value":"2022-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}