Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 535-538.
• Interdiscipline & Application • Previous Articles Next Articles
ZHANG Guang-lan, YANG Qiu-hui, CHENG Xue-mei, JIANG Ke, WANG Shuai, TAN Wu-kun
CLC Number:
[1]GAO Z,CHEN Z,FENG Y,et al.Mining Sequential Patterns of Predicates for Fault Localization and Understanding[C]∥2013 IEEE 7th International Conference on Software Security and Reliability (SERE).IEEE,2013:109-118. [2]WU P H,PENG W C,CHEN M S.Mining sequential alarm patterns in a telecommunication database [C]∥International Workshop on Databases in Telecommunications.Springer,2001:37-51. [3]NUNEZ M,MORALES R,TRIGUERO F.Automatic discovery of rules for predicting network management events [J].IEEE Journal on Selected Areas in Communications,2002,20(4):736-745. [4]KLEMETTINEN M,MANNILA H,TOIVONEN H.Rule discovery in telecommunication alarm data [J].Journal of Network and Systems Management,1999,7(4):395-423. [5]HATONEN K,KLEMETTINEN M,MANNILA H,et al.Know-ledge discovery from telecommunication network alarm databa-ses [C]∥Proceedings of the Twelfth International Conference on Data Engineering,1996.IEEE,1996:115-122. [6]MANNILA H,TOIVONEN H,VERKAMO A I.Discovery of frequent episodes in event sequences [J].Data Mining and Knowledge Discovery,1997,1(3):259-289. [7]HATONEN K,KLEMETTINEN M,MANNILA H,et al.TA-SA:Telecommunication alarm sequence analyzer or how to enjoy faults in your network [C]∥Network Operations and Management Symposium,1996,IEEE.IEEE,1996:520-529. [8]JAIN-ZHI O,PEI-HSIN W,MING-SYAN C.Experimental results on a constraint based sequential pattern mining for telecommunication alarm data [C]∥Proceedings of the Second International Conference on Web Information Systems Enginee-ring.IEEE,2001:186-193. [9]GARCIA R,LLANA L,MALAGON C,et al.Event Prediction in Network Monitoring Systems:Performing Sequential Pattern Mining in Osmius Monitoring Tool [M]∥Advances in Data Mining:Applications and Theoretical Aspects.Berlin:Springer-Verlag Berlin,2010:632-642. [10]WANG Z,ZHANG B,LI G.A Topological Constraints Based Sequential Data Mining Approach on Telecom Networks Alarm Data [C]∥International Joint Conference on Computational Scien-ces and Optimization,2009(CSO 2009).2009:750-754. [11]MEIRA D M,NOVEMBER B H.A Model For Alarm Correlation in Telecommunications Networks [J].Federal University of Minas Gerais,1998. [12]EIRA D M,NOGUEIRA J M S.Modelling a telecommunication network for fault management applications [C]∥NetworkOpe-rations and Management Symposium,1998(NOMS 98).IEEE.IEEE,1998:723-732. [13]JAUDET M,HUSSAIN A,SHARIF K.Temporal classification for fault-prediction in a real-world telecommunications network [C]∥Proceedings of the IEEE Symposium on Emerging Technologies,2005.IEEE,2005:209-214. [14]ZAKI M J,LESH N,OGIHARA M.Predicting failures in event sequences [M]∥Data Mining for Scientific and Engineering Applications.Springer,2001:515-539. [15]SALFNER F,LENK M,MALEK M.A survey of online failure prediction methods [J].Acm Computing Surveys,2010,42(3):10. [16]ZHONG J,GUO W,WANG Z.Study on network failure prediction based on alarm logs [C]∥2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC).2016:1-7. |
[1] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[2] | SU Chang, ZHANG Ding-quan, XIE Xian-zhong, TAN Ya. NFV Memory Resource Management in 5G Communication Network [J]. Computer Science, 2020, 47(9): 246-251. |
[3] | SUN Wen-ping, CHANG Liang, BIN Chen-zhong, GU Tian-long, SUN Yan-peng. Travel Route Recommendation Based on Knowledge Graph and Frequent Sequence Mining [J]. Computer Science, 2019, 46(2): 56-61. |
[4] | CHENG Zhen, ZHAO Hui-ting, ZHANG Yi-ming, LIN Fei. Bit Error Rate Analysis of Diffusion-based Multicast Molecular Communication Networks [J]. Computer Science, 2019, 46(11): 80-87. |
[5] | LI Zhi-yuan,LI Jing,ZHANG Jian. Simulation for Integrated Space-Ground TT&C and Communication Network Routing Algorithm [J]. Computer Science, 2018, 45(6A): 295-299. |
[6] | ZHU Peng-yu, BAO Pei-ming and JI Gen-lin. Parallel Algorithm for Mining User Frequent Communication Relationship [J]. Computer Science, 2018, 45(2): 103-108. |
[7] | JIN Xin, LI Long-wei, SU Guo-hua, LIU Xiao-lei and JI Jia-nan. Prediction about Network Security Situation of Electric Power Telecommunication Based on Spark Framework and PSO Algorithm [J]. Computer Science, 2017, 44(Z6): 366-371. |
[8] | CUI Zhan-qi, MU Yong-min, ZHANG Zhi-hua and WANG Wei-guang. Defects Detection Based on Mining Function Call Sequence Patterns [J]. Computer Science, 2017, 44(11): 226-231. |
[9] | JI Hao-bo and WANG Jun-hong. Research on Improved PrefixSpan Algorithm and its Application in Web User Behavior Patterns Mining [J]. Computer Science, 2016, 43(1): 25-29. |
[10] | XU Qian and TAN Cheng-xiang. Mandatory Access Control Model for Android Based on Dynamic Privilege Set [J]. Computer Science, 2015, 42(11): 191-196. |
[11] | YUAN Wei-wei,DUAN Yi-feng,HU Gu-yu,WANG Zhi-ming and ZHU Bao-shan. RABOLC—A New Methodology Used in SCNEO Building [J]. Computer Science, 2013, 40(4): 122-126. |
|