Author of the publication

Using Resource Use Data and System Logs for HPC System Error Propagation and Recovery Diagnosis.

, , , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 458-467. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks., , and . ACM Trans. Internet Things, 2 (1): 4:1-4:32 (2020)Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things., , , , , and . ACM Trans. Sens. Networks, 18 (2): 29:1-29:41 (2022)Challenges in Identifying Network Attacks Using Netflow Data., , , and . NCA, page 1-10. IEEE, (2021)Secure Allocation for Graph-Based Virtual Machines in Cloud Environments., and . PST, page 1-7. IEEE, (2021)Towards Understanding Checkpointing in Transiently Powered IoT Networks., , and . TrustCom, page 559-568. IEEE, (2023)A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems., , , and . IEEE Access, (2022)Stabilizing Interference-Free Slot Assignment for Wireless Mesh Networks., , , and . Guide to Wireless Mesh Networks, Springer, (2009)Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks., , and . Concurr. Comput. Pract. Exp., (2019)Time Machine: Generative Real-Time Model for Failure (and Lead Time) Prediction in HPC Systems., , , , , and . DSN, page 508-521. IEEE, (2023)Clairvoyant: a log-based transformer-decoder for failure prediction in large-scale systems., , , and . ICS, page 35:1-35:14. ACM, (2022)