Computer Science ›› 2019, Vol. 46 ›› Issue (3): 321-326.doi: 10.11896/j.issn.1002-137X.2019.03.047
• Interdiscipline & Frontier • Previous Articles Next Articles
YUAN Yue
CLC Number:
[1]OpenStack.OpenStack open source cloud computing software ..http://www.openstack.org. [2]MI H B,WANG H M,ZHOU Y F,et al.Toward fine-grained,unsupervised,scalable performance diagnosis for production cloud computing systems.IEEE Transactions on Parallel and Distributed Systems,2013,24(6):1245-1255. [3]SAMBASIVAN R R,ZHENG A X,ROSA M D,et al.Diagnosing performance changes by comparing request flows[C]∥Proceedings of USENIX Conference on Networked Systems Design and Implementation.Berkeley:USENIX Association,2011:43-56. [4]SIGELMAN B H,BARROSO L A,BURROWS M,et al.Dap- per,a Large-Scale Distributed Systems Tracing Infrastructure.Google Technical Report,2010. [5]KALDOR J,MACE J,BEJDA M,et al.Canopy:An End-to-End Performance Tracing And Analysis System[C]∥Proceedings of ACM Symposium on Operating Systems Principles.New York:ACM Press,2017:34-50. [6]NANDI A,MANDAL A,ATREJA S,et al.Anomaly detection using program control flow graph mining from execution logs[C]∥Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York:ACM Press,2016:215-224. [7]SHANG WY,JIANG Z M,HEMMATI H,et al.Assisting developers of big data analytics applications when deploying on hadoop clouds[C]∥Proceedings of International Conference on Software Engineering.New York:IEEE Press,2013:402-411. [8]LIN Q W,ZHANG H Y,LOU J G,et al.Log clustering based problem identification for online service systems[C]∥Procee-dings of International Conference on Software Engineering Companion.New York:IEEE Press,2016:102-111. [9]HE S L,ZHU J M,HE P J,et al.Experience report:System log analysis for anomaly detection[C]∥Proceedings of IEEE International Symposium on Software Reliability Engineering.New York:IEEE Press,2016:207-218. [10]WU F,ANCHURI P,LI Z H.Structural event detection from log messages[C]∥Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York:ACM Press,2017:1175-1184. [11]MAJUMDAR S,JARRAYA Y,OQAILY M,et al.Leaps: Learning-based proactive security auditing for clouds[C]∥Proceedings of European Symposium on Research in Computer Security.Berlin:Springer,2017:265-285. [12]ZHAO X,RODRIGUES K,LUO Y,et al.Non-intrusive per- formance profiling for entire software stacks based on the flow reconstruction principle[C]∥Proceedings of USENIX Confe-rence on Operating Systems Design and Implementation.Berkeley:USENIX Association,2016:603-618. [13]ZHAO X,ZHANG Y L,LION D,et al.Lprof:A non-intrusive request flow profiler for distributed systems[C]∥Proceedings of USENIX Conference on Operating Systems Design and Implementation.Berkeley:USENIX Association,2014:629-644. [14]ROY S,KONIG A C,DVORKIN I,et al.Perfaugur:Robust dia- gnostics for performance anomalies in cloud services[C]∥Proceedings of IEEE International Conference on Data Engineering.New York:IEEE Press,2015:1167-1178. [15]NAGARAJ K,KILLIAN C,NEVILLE J.Structured comparative analysis of systems logs to diagnose performance problems[C]∥Proceedings of USENIX Symposium on Networked Systems Design and Implementation.Berkeley:USENIX Association,2012:353-366. [16]YUAN D,MAI H,XIONG W,et al.SherLog:error diagnosis by connecting clues from run-time logs[C]∥Proceedings of ACM International Conference on Architectural Support for Programming Languages and Operating Systems.New York:ACM Press,2010:143-154. [17]HE P J,ZHU J M,HE S L,et al.Towards automated log parsing for large-scale log data analysis.IEEE Transactions on Dependable and Secure Computing,2018,15(6):931-944. [18]DU M,LI F.Spell:Streaming parsing of system event logs[C]∥Proceedings of IEEE International Conference on Data Mining.New York:IEEE Press,2016:859-864. [19]WEIL S A,BRANDT S A,MILLER E L,et al.Ceph:A scalable,high-performance distributed file system[C]∥Proceedings of USENIX Conference on Symposium on Operating Systems Design and Implementation.Berkeley:USENIX Association,2006:307-320. [20]LIU J L,CHENG C Y,CHEN Z,et al.Research on Cloud Data Management Model Based K-Means and Gridding Clustering.Journal of Chongqing University of Technology(Natural Science),2017,31(9):125-130.(in Chinese) 刘加伶,程春游,陈庄,等.基于K-Means和网格化聚类的云数据管理模型研究.重庆理工大学学报(自然科学),2017,31(9):125-130. |
[1] | GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321. |
[2] | WANG Zheng, JIANG Chun-mao. Cloud Task Scheduling Algorithm Based on Three-way Decisions [J]. Computer Science, 2021, 48(6A): 420-426. |
[3] | PAN Rui-jie, WANG Gao-cai, HUANG Heng-yi. Attribute Access Control Based on Dynamic User Trust in Cloud Computing [J]. Computer Science, 2021, 48(5): 313-319. |
[4] | CHEN Yu-ping, LIU Bo, LIN Wei-wei, CHENG Hui-wen. Survey of Cloud-edge Collaboration [J]. Computer Science, 2021, 48(3): 259-268. |
[5] | WANG Wen-juan, DU Xue-hui, REN Zhi-yu, SHAN Di-bin. Reconstruction of Cloud Platform Attack Scenario Based on Causal Knowledge and Temporal- Spatial Correlation [J]. Computer Science, 2021, 48(2): 317-323. |
[6] | JIANG Hui-min, JIANG Zhe-yuan. Reference Model and Development Methodology for Enterprise Cloud Service Architecture [J]. Computer Science, 2021, 48(2): 13-22. |
[7] | MAO Han-yu, NIE Tie-zheng, SHEN De-rong, YU Ge, XU Shi-cheng, HE Guang-yu. Survey on Key Techniques and Development of Blockchain as a Service Platform [J]. Computer Science, 2021, 48(11): 4-11. |
[8] | WANG Qin, WEI Li-fei, LIU Ji-hai, ZHANG Lei. Private Set Intersection Protocols Among Multi-party with Cloud Server Aided [J]. Computer Science, 2021, 48(10): 301-307. |
[9] | LEI Yang, JIANG Ying. Anomaly Judgment of Directly Associated Nodes Under Cloud Computing Environment [J]. Computer Science, 2021, 48(1): 295-300. |
[10] | XU Yun-qi, HUANG He, JIN Zhong. Application Research on Container Technology in Scientific Computing [J]. Computer Science, 2021, 48(1): 319-325. |
[11] | ZHNAG Kai-qi, TU Zhi-ying, CHU Dian-hui, LI Chun-shan. Survey on Service Resource Availability Forecast Based on Queuing Theory [J]. Computer Science, 2021, 48(1): 26-33. |
[12] | LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323. |
[13] | MA Xiao-xiao and HUANG Yan. Publicly Traceable Accountable Ciphertext Policy Attribute Based Encryption Scheme Supporting Large Universe [J]. Computer Science, 2020, 47(6A): 420-423. |
[14] | LIANG Jun-bin, ZHANG Min, JIANG Chan. Research Progress of Social Sensor Cloud Security [J]. Computer Science, 2020, 47(6): 276-283. |
[15] | JIN Xiao-min, HUA Wen-qiang. Energy Optimization Oriented Resource Management in Mobile Cloud Computing [J]. Computer Science, 2020, 47(6): 247-251. |
|