2017
DOI: 10.1145/3092697
|View full text |Cite
|
Sign up to set email alerts
|

Data-Driven Techniques in Computing System Management

Abstract: Modern forms of computing systems are becoming progressively more complex, with an increasing number of heterogeneous hardware and software components. As a result, it is quite challenging to manage these complex systems and meet the requirements in manageability, dependability, and performance that are demanded by enterprise customers. This survey presents a variety of data-driven techniques and applications with a focus on computing system management. In particular, the survey introduces intelligent methods … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(21 citation statements)
references
References 93 publications
0
20
0
Order By: Relevance
“…The primary goal of this "knowledge" extraction is to assist in diagnosing the underlying problems responsible for log-messages and events. Two excellent resources for the large body of work done in the area are [1], [2]. Next, we outline some of the key challenges in this knowledge extraction, associated research in the area, and our problem in the context of existing work.…”
Section: B Context and Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…The primary goal of this "knowledge" extraction is to assist in diagnosing the underlying problems responsible for log-messages and events. Two excellent resources for the large body of work done in the area are [1], [2]. Next, we outline some of the key challenges in this knowledge extraction, associated research in the area, and our problem in the context of existing work.…”
Section: B Context and Related Workmentioning
confidence: 99%
“…Thus it is very useful to have a global summarized snapshot of messages based on logs. Most works in this area exploit the inter-arrival distribution and cooccurrence of events [16], [17], [18], [19], [2] to produce summarized correlation between events. These methods are useful when the event-stream is available and possible eventtypes are known in advance.…”
Section: B Context and Related Workmentioning
confidence: 99%
See 3 more Smart Citations