Proceedings of the Twelfth International Conference on Data Engineering
DOI: 10.1109/icde.1996.492095
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge discovery from telecommunication network alarm databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0
1

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 76 publications
(36 citation statements)
references
References 4 publications
0
34
0
1
Order By: Relevance
“…A KDD process, adapted from [11], consists of: We follow the general framework, but there are two important characteristics that separate the methodology from the others [1,12] 1. In the rule discovery phase, it aims to find all potentially interesting patterns according to rather loose criteria for frequency and confidence.…”
Section: Tasa Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…A KDD process, adapted from [11], consists of: We follow the general framework, but there are two important characteristics that separate the methodology from the others [1,12] 1. In the rule discovery phase, it aims to find all potentially interesting patterns according to rather loose criteria for frequency and confidence.…”
Section: Tasa Methodologymentioning
confidence: 99%
“…We describe the final version of a knowledge discovery system, Telecommunication Network Alarm Sequence Analyzer (TASA) [1], that supports the methodology. TASA was built at the University of Helsinki, in cooperation with four telecommunication companies, and it has recently been successfully fielded.…”
Section: Introductionmentioning
confidence: 99%
“…Hatonen et al [5] have used frequently occurring episodes for discovering patterns in alarm databases to predict faults. Their subsequent work TASA (Telecommunication Alarm Sequence Analyzer) [6] was a system for mining knowledge from telecommunications networks in terms of 'episode rules'.…”
Section: Related Workmentioning
confidence: 99%
“…This kind of information can be used to restructure the web-site, or to dynamically insert relevant links in web pages based on user access patterns. Other domains where sequence mining has been applied include identifying plan failures , selecting good features of classification (Lesh et al, 2000), finding network alarm patterns (Hatonen et al, 1996), and so on.…”
Section: Introductionmentioning
confidence: 99%