EHMM-CT: An Online Method for Failure Prediction in Cloud Computing Systems |
Zheng, Weiwei
(State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications)
Wang, Zhili (State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications) Huang, Haoqiu (State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications) Meng, Luoming (State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications) Qiu, Xuesong (State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications) |
1 |
R. Jhawar and V. Piuri, |
2 |
Y. Liang, Y. Zhang, A. Sivasubramaniam, M. Jette, and R. Sahoo, “BlueGene/L failure analysis and prediction models,” in |
3 |
X. Wang, H. Sun, T. Deng, and J. Huai, “On the tradeoff of availability and consistency for quorum systems in data center networks,” |
4 |
C. Liu, D. Li, Y. Du, and X. Han, “Some statistical analysis of the normal cloud model,” |
5 |
S. Fu and C.-Z. Xu, “Quantifying temporal and spatial correlation of failure events for proactive management,” in |
6 |
G. A. Hoffmann, F. Salfner, and M. Malek, “Advanced failure prediction in complex software systems,” |
7 |
R. Chaparadza, N. Tcholtchev, and V. Kaldanis, “How Autonomic Fault-Management Can Address Current Challenges in Fault-Management Faced in IT and Telecommunication Networks,” |
8 |
F. Salfner and M. Malek, “Using hidden semi-markov models for effective online failure prediction,” in |
9 |
A. K. Marnerides, A. Schaeffer-Filho, and A. Mauthe, “Traffic anomaly diagnosis in Internet backbone networks: A survey,” |
10 |
F. Salfner, “Modeling event-driven time series with generalized hidden semi-Markov models,” |
11 |
D. Li and C. Liu, “Study on the universality of the normal cloud model,” |
12 |
R. Baldoni, L. Montanari, and M. Rizzuto, “On-line failure prediction in safety-critical systems,” |
13 |
H. S. Huang and R. C. Wang, “Subjective trust evaluation model based on membership cloud theory,” |
14 |
P. Casas, J. Mazel, and P. Owezarski, “UNADA: Unsupervised network anomaly detection using sub-space outliers ranking,” |
15 |
H. J. Abed, A. Al-Fuqaha, B. Khan, and A. Rayes, “Efficient failure prediction in autonomic networks based on trend and frequency analysis of anomalous patterns,” |
16 |
F. Salfner, M. Schieschke, and M. Malek, “Predicting failures of computer systems: A case study for a telecommunication system,” in |
17 |
H. L. Li, C. H. Guo, and W. R. Qiu,. “Similarity measurement between normal cloud models,” |
18 |
S. B. Zhang, C. X. Xu, and Y. J. An, “Study on the Risk Evaluation Approach Based on Cloud Model,” |
![]() |