{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T04:07:23Z","timestamp":1750133243608,"version":"3.41.0"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2017]]},"DOI":"10.1587\/transcom.2016ebp3430","type":"journal-article","created":{"date-parts":[[2017,3,12]],"date-time":"2017-03-12T22:09:44Z","timestamp":1489356584000},"page":"1865-1878","source":"Crossref","is-referenced-by-count":2,"title":["Network Event Extraction from Log Data with Nonnegative Tensor Factorization"],"prefix":"10.23919","volume":"E100.B","author":[{"given":"Tatsuaki","family":"KIMURA","sequence":"first","affiliation":[{"name":"NTT Network Technology Laboratories, NTT Corporation"}]},{"given":"Keisuke","family":"ISHIBASHI","sequence":"additional","affiliation":[{"name":"NTT Network Technology Laboratories, NTT Corporation"}]},{"given":"Tatsuya","family":"MORI","sequence":"additional","affiliation":[{"name":"School of Fundamental Science and Engineering, Waseda University"}]},{"given":"Hiroshi","family":"SAWADA","sequence":"additional","affiliation":[{"name":"NTT Communication Science Laboratories, NTT Corporation"}]},{"given":"Tsuyoshi","family":"TOYONO","sequence":"additional","affiliation":[{"name":"NTT Network Technology Laboratories, NTT Corporation"}]},{"given":"Ken","family":"NISHIMATSU","sequence":"additional","affiliation":[{"name":"NTT Network Technology Laboratories, NTT Corporation"}]},{"given":"Akio","family":"WATANABE","sequence":"additional","affiliation":[{"name":"NTT Network Technology Laboratories, NTT Corporation"}]},{"given":"Akihiro","family":"SHIMODA","sequence":"additional","affiliation":[{"name":"NTT Network Technology Laboratories, NTT Corporation"}]},{"given":"Kohei","family":"SHIOMOTO","sequence":"additional","affiliation":[{"name":"Tokyo City University"}]}],"member":"263","reference":[{"key":"1","unstructured":"[1] CA Spectrum. http:\/\/www.ca.com\/us\/root-cause-analysis.aspx"},{"key":"2","unstructured":"[2] HP Software. http:\/\/www8.hp.com\/us\/en\/software\/enterprise-software.html"},{"key":"3","unstructured":"[3] IBM Tivoli. http:\/\/www-01.ibm.com\/software\/tivoli\/"},{"key":"4","unstructured":"[4] Splunk. http:\/\/www.splunk.com\/"},{"key":"5","unstructured":"[5] USENIX The computer failure data repository (CFDR). http:\/\/www.usenix.org\/cfdr-data"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] P. Bahl, R. Chandra, A. Greenberg, S. Kandula, D.A. Maltz, and M. Zhang, \u201cTowards highly reliable enterprise network services via inference of multi-level dependencies,\u201d Proc. SIGCOMM&apos;07, pp.13-24, New York, USA, Oct. 2007. 10.1145\/1282427.1282383","DOI":"10.1145\/1282427.1282383"},{"key":"7","unstructured":"[7] X. Chen, M. Zhang, Z.M. Mao, and P. Bahl, \u201cAutomating network application dependency discovery: experiences, limitations, and new solutions,\u201d Proc. OSDI&apos;08, pp.117-130, San Diego, USA, Dec. 2008."},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] A. Cichocki, R. Zdunek, A.H. Phan, and S.I. Amari, Nonnegative Matrix and Tensor Factorizations: Applications to Exploratory Multi-way Data Analysis and Blind Source Separation, 1st ed., Wiley, New York, 2009. 10.1002\/9780470747278","DOI":"10.1002\/9780470747278"},{"key":"9","unstructured":"[9] M. Ester, H.P. Kriegel, J. Sander, and X. Xu, \u201cA density-based algorithm for discovering clusters in large spatial databases with noise,\u201d Proc. KDD&apos;96, pp.226-231, Portland, USA, Aug. 1996."},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] J.Z. Huang, M.K. Ng, H. Rong, and Z. Li, \u201cAutomated variable weighting in <i>k<\/i>-means type clustering,\u201d IEEE Trans. Pattern Anal. Mach. Intell., vol.27, no.5, pp.657-668, 2005. 10.1109\/tpami.2005.95","DOI":"10.1109\/TPAMI.2005.95"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] S. Kandula, D. Katabi, and J.P. Vasseur, \u201cShrink: A tool for failure diagnosis in IP networks,\u201d Proc. MineNet&apos;05, pp.173-178, Philadelphia, USA, Aug. 2005. 10.1145\/1080173.1080178","DOI":"10.1145\/1080173.1080178"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] S. Kandula, R. Chandra, and D. Katabi, \u201cWhat&apos;s going on? Learning communication rules in edge networks,\u201d Proc. SIGCOMM&apos;08, pp.87-98, Seattle, USA, 2008. 10.1145\/1402958.1402970","DOI":"10.1145\/1402958.1402970"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] S. Kandura, R. Mahajan, P. Verkaik, S. Agarwal, J. Padhye, and P. Bahl, \u201cDetailed diagnosis in enterprise networks,\u201d Proc. SIGCOMM&apos;09, pp.243-254, Barcelona, Spain, 2009. 10.1145\/1592568.1592597","DOI":"10.1145\/1592568.1592597"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] T. Kimura, K. Ishibashi, T. Mori, H. Sawada, T. Toyono, K. Nishimatsu, A. Watanabe, A. Shimoda, and K. Shiomoto, \u201cSpatio-temporal factorization of log data for understanding network events,\u201d Proc. INFOCOM&apos;14, pp.610-618, Toronto, Canada, 2014. 10.1109\/infocom.2014.6847986","DOI":"10.1109\/INFOCOM.2014.6847986"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] T. Kimura, A. Watanabe, T. Toyono, and K. Ishibashi, \u201cProactive failure detection learning generation patterns of large-scale network logs,\u201d Proc. CNSM&apos;15, pp.8-14, Barcelona, Spain, Nov. 2015. 10.1109\/cnsm.2015.7367332","DOI":"10.1109\/CNSM.2015.7367332"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] R.R. Kompella, J. Yates, A. Greenberg, and A.C. Snoeren, \u201cIP fault localization via risk modeling,\u201d Proc. NSDI&apos;05, pp.57-70, Boston, USA, 2005. 10.1109\/tdsc.2009.37","DOI":"10.1109\/TDSC.2009.37"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] D.D. Lee and H.S. Seung, \u201cLearning the parts of objects by non-negative matrix factorization,\u201d Nature, vol.401, no.6755, pp.788-791, 1999. 10.1038\/44565","DOI":"10.1038\/44565"},{"key":"18","unstructured":"[18] D.D. Lee and H.S. Seung, \u201cAlgorithms for non-negative matrix factorization,\u201d Proc. NIPS, pp.556-562, Vancouver, Canada, Dec. 2001."},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] A. Mahimkar, J. Yates, Y. Zhang, A. Shaikh, J. Wang, Z. Ge, and C.T. Ee, \u201cTroubleshooting chronic conditions in large IP networks,\u201d Proc. CoNEXT&apos;08, pp.2:1-2:12, Madrid, Spain, Dec. 2008. 10.1145\/1544012.1544014","DOI":"10.1145\/1544012.1544014"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] A. Mahimkar, H.H. Song, Z. Ge, A. Shaikh, J. Wang, J. Yates, Y. Zhang, and J. Emmons \u201cDetecting the performance impact of upgrades in large operational networks,\u201d Proc. SIGCOMM&apos;10, pp.303-314, New Delhi, India, Aug. 2010. 10.1145\/1851182.1851219","DOI":"10.1145\/1851182.1851219"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] A. Mahimkar, Z. Ge, J. Wang, J. Yates, Y. Zhang, J. Emmons, B. Huntley, and M. Stockert, \u201cRapid detection of maintenance induced changes in service performance,\u201d Proc. CoNEXT&apos;11, pp.13:1-13:12, Tokyo, Japan, Dec. 2011. 10.1145\/2079296.2079309","DOI":"10.1145\/2079296.2079309"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] T. Qiu, Z. Ge, D. Pei, J. Wang, and J. Xu, \u201cWhat happened in my network? Mining network events from router syslogs,\u201d Proc. IMC&apos;10, pp.472-484, Melbourne, Australia, Nov. 2010. 10.1145\/1879141.1879202","DOI":"10.1145\/1879141.1879202"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] W.M. Rand, \u201cObjective criteria for the evaluation of clustering methods,\u201d J. Am. Stat. Assoc., vol.66, no.336, pp.846-850, 1971. 10.2307\/2284239","DOI":"10.2307\/2284239"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] P. Smaragdis and J.C. Brown, \u201cNon-negative matrix factorization for polyphonic music transcription,\u201d Proc. WASPAA&apos;03, pp.177-180, New Paltz, USA, Oct. 2003. 10.1109\/aspaa.2003.1285860","DOI":"10.1109\/ASPAA.2003.1285860"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] T. Wang, M. Srivatsa, D. Agrawal, and L. Liu, \u201cLearning, indexing, and diagnosing network faults,\u201d Proc. KDD&apos;09, pp.857-866, Paris, France, June 2009. 10.1145\/1557019.1557113","DOI":"10.1145\/1557019.1557113"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] T. Wang, M. Srivatsa, D. Agrawal, and L. Liu, \u201cSpatio-temporal patterns in network events,\u201d Proc. CoNEXT&apos;10, pp.3:1-3:12, Philadelphia, USA, Dec. 2010. 10.1145\/1921168.1921172","DOI":"10.1145\/1921168.1921172"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] W. Xu, X. Liu, and Y. Gong, \u201cDocument clustering based on non-negative matrix factorization,\u201d Proc. SIGIR&apos;03, pp.267-273, Toronto, Canada, July 2003. 10.1145\/860484.860485","DOI":"10.1145\/860435.860485"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] X. Xu, N. Yuruk, Z. Feng, and T.A.J. Schweiger, \u201cSCAN: A structural clustering algorithm for networks,\u201d Proc. KDD&apos;07, pp.824-833, San Jose, USA, Aug. 2007. 10.1145\/1281192.1281280","DOI":"10.1145\/1281192.1281280"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] W. Xu, L. Huang, A. Fox, D. Patterson, and M.I. Jordan, \u201cDetecting large-scale system problems by mining console logs,\u201d Proc. SOSP&apos;09, pp.117-132, Big Sky, USA, Oct. 2009. 10.1145\/1629575.1629587","DOI":"10.1145\/1629575.1629587"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] K. Yamanishi and M. Maruyama. \u201cDynamic syslog mining for network failure monitoring,\u201d Proc. KDD&apos;05, pp.499-508, Chicago, USA, Aug. 2005. 10.1145\/1081870.1081927","DOI":"10.1145\/1081870.1081927"},{"key":"31","doi-asserted-by":"publisher","unstructured":"[31] H. Yan, L. Breslau, Z. Ge, D. Massey, D. Pei, and J. Yates, \u201cG-RCA: A generic root cause analysis platform for service quality management in large IP networks,\u201d IEEE\/ACM Trans. Nets., vol.20, no.6, pp.1734-1747, 2012. 10.1109\/tnet.2012.2188837","DOI":"10.1109\/TNET.2012.2188837"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E100.B\/10\/E100.B_2016EBP3430\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T18:37:34Z","timestamp":1750099054000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E100.B\/10\/E100.B_2016EBP3430\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":31,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2017]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2016ebp3430","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"type":"print","value":"0916-8516"},{"type":"electronic","value":"1745-1345"}],"subject":[],"published":{"date-parts":[[2017]]}}}