2018 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW) 2018
DOI: 10.1109/ipdpsw.2018.00087
|View full text |Cite
|
Sign up to set email alerts
|

Improvement of the Log Pattern Extracting Algorithm Using Text Similarity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Log files are analyzed for different purposes, such as troubleshooting [16], usage statistics [17], security monitoring [18] and performance profiling [19]. Quite a few methodologies have been applied to deduce what the corresponding person is interested in, by analyzing user log file records [20].…”
Section: Related Workmentioning
confidence: 99%
“…Log files are analyzed for different purposes, such as troubleshooting [16], usage statistics [17], security monitoring [18] and performance profiling [19]. Quite a few methodologies have been applied to deduce what the corresponding person is interested in, by analyzing user log file records [20].…”
Section: Related Workmentioning
confidence: 99%
“…extraction algorithm [22] to generate log types. For SCE traces which only contains variables, we construct a data cube that stores information of all traces and can produce log types for any variable types.…”
Section: Pos(isgc2019)033mentioning
confidence: 99%
“…First, we pick up system logs and middleware logs from CNGrid as the target to be analyzed, according to our demands of responding to system failures, defending on malicious attacks and providing user services. Second, log pattern extraction algorithms [22] are used to classify types for system logs and middleware logs. We organize these log types as the log library and implement interfaces to access it.…”
mentioning
confidence: 99%