{"id":"https://openalex.org/W3138929364","doi":"https://doi.org/10.1109/bigdata50022.2020.9378419","title":"Failure Prediction in Datacenters Using Unsupervised Multimodal Anomaly Detection","display_name":"Failure Prediction in Datacenters Using Unsupervised Multimodal Anomaly Detection","publication_year":2020,"publication_date":"2020-12-10","ids":{"openalex":"https://openalex.org/W3138929364","doi":"https://doi.org/10.1109/bigdata50022.2020.9378419","mag":"3138929364"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata50022.2020.9378419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata50022.2020.9378419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091102986","display_name":"Minglu Zhao","orcid":"https://orcid.org/0000-0002-0338-0833"},"institutions":[{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Minglu Zhao","raw_affiliation_strings":["Tohoku University,Graduate School of Information Sciences","Graduate School of Information Sciences, Tohoku University"],"affiliations":[{"raw_affiliation_string":"Tohoku University,Graduate School of Information Sciences","institution_ids":["https://openalex.org/I201537933"]},{"raw_affiliation_string":"Graduate School of Information Sciences, Tohoku University","institution_ids":["https://openalex.org/I201537933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087312490","display_name":"Reo Furuhata","orcid":null},"institutions":[{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Reo Furuhata","raw_affiliation_strings":["Tohoku University,Graduate School of Information Sciences","Graduate School of Information Sciences, Tohoku University"],"affiliations":[{"raw_affiliation_string":"Tohoku University,Graduate School of Information Sciences","institution_ids":["https://openalex.org/I201537933"]},{"raw_affiliation_string":"Graduate School of Information Sciences, Tohoku University","institution_ids":["https://openalex.org/I201537933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073353406","display_name":"Mulya Agung","orcid":"https://orcid.org/0000-0001-9521-2177"},"institutions":[{"id":"https://openalex.org/I4210093896","display_name":"Tohoku University Hospital","ror":"https://ror.org/00kcd6x60","country_code":"JP","type":"healthcare","lineage":["https://openalex.org/I4210093896"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mulya Agung","raw_affiliation_strings":["Tohoku University,Cyberscience Center","Cyberscience Center, Tohoku University"],"affiliations":[{"raw_affiliation_string":"Tohoku University,Cyberscience Center","institution_ids":["https://openalex.org/I4210093896"]},{"raw_affiliation_string":"Cyberscience Center, Tohoku University","institution_ids":["https://openalex.org/I4210093896"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011172934","display_name":"Hiroyuki Takizawa","orcid":"https://orcid.org/0000-0003-2858-3140"},"institutions":[{"id":"https://openalex.org/I4210093896","display_name":"Tohoku University Hospital","ror":"https://ror.org/00kcd6x60","country_code":"JP","type":"healthcare","lineage":["https://openalex.org/I4210093896"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroyuki Takizawa","raw_affiliation_strings":["Tohoku University,Cyberscience Center","Cyberscience Center, Tohoku University"],"affiliations":[{"raw_affiliation_string":"Tohoku University,Cyberscience Center","institution_ids":["https://openalex.org/I4210093896"]},{"raw_affiliation_string":"Cyberscience Center, Tohoku University","institution_ids":["https://openalex.org/I4210093896"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113984943","display_name":"Tomoya Soma","orcid":null},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tomoya Soma","raw_affiliation_strings":["NEC Corporation,Corporate Business Development Division","Corporate Business Development Division, NEC Corporation"],"affiliations":[{"raw_affiliation_string":"NEC Corporation,Corporate Business Development Division","institution_ids":["https://openalex.org/I118347220"]},{"raw_affiliation_string":"Corporate Business Development Division, NEC Corporation","institution_ids":["https://openalex.org/I118347220"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5091102986"],"corresponding_institution_ids":["https://openalex.org/I201537933"],"apc_list":null,"apc_paid":null,"fwci":0.7709,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.7563698,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"3545","last_page":"3549"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8309240341186523},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7785326242446899},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5286237001419067},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.4710557162761688},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4506431519985199},{"id":"https://openalex.org/keywords/microphone","display_name":"Microphone","score":0.437644898891449},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.42460328340530396},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.413823664188385},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3889731466770172},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.34364476799964905},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.19021892547607422}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8309240341186523},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7785326242446899},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5286237001419067},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.4710557162761688},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4506431519985199},{"id":"https://openalex.org/C2778263558","wikidata":"https://www.wikidata.org/wiki/Q46384","display_name":"Microphone","level":3,"score":0.437644898891449},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.42460328340530396},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.413823664188385},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3889731466770172},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.34364476799964905},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.19021892547607422},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C68115822","wikidata":"https://www.wikidata.org/wiki/Q1068172","display_name":"Sound pressure","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata50022.2020.9378419","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata50022.2020.9378419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1989554261","https://openalex.org/W2033398965","https://openalex.org/W2074787299","https://openalex.org/W2344045455","https://openalex.org/W2409205391","https://openalex.org/W2409810657","https://openalex.org/W2899160323","https://openalex.org/W2909616172"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W3210364259","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W2143820878","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4300558037","https://openalex.org/W4377864969"],"abstract_inverted_index":{"Predicting":[0],"hard":[1,98],"drive":[2],"failures":[3,58],"in":[4,54],"datacenters":[5],"can":[6,127,135],"help":[7],"avoid":[8],"wasting":[9],"resources":[10],"and":[11,102,112,123,131,149,165],"waiting":[12],"time":[13],"for":[14,24,42,51],"recovery.":[15],"Anomaly":[16],"detection":[17,31,66,84,150],"from":[18,72],"sensing":[19,70],"data":[20,71],"is":[21,47,88],"commonly":[22],"used":[23],"predicting":[25],"failures.":[26],"Usually,":[27],"conventional":[28],"threshold-based":[29],"anomaly":[30,65,83],"methods":[32],"consider":[33],"each":[34,43],"sensor":[35],"independently.":[36],"However,":[37],"deciding":[38],"an":[39],"optimal":[40],"threshold":[41],"type":[44],"of":[45,75],"sensors":[46],"not":[48],"trivial,":[49],"especially":[50],"large-scale":[52],"systems":[53],"datacenters.":[55],"To":[56],"detect":[57,128,136,158],"that":[59,120,143],"cannot":[60],"conventionally":[61],"be":[62],"detected,":[63],"multimodal":[64,82,140,153],"becomes":[67],"crucial":[68],"integrating":[69],"different":[73],"types":[74],"sensors.":[76],"This":[77,86],"work":[78],"proposes":[79],"a":[80,91,107,110,146],"correlation-based":[81],"approach.":[85,172],"approach":[87,154],"applied":[89],"to":[90,157],"Network-Attached":[92],"Storage":[93],"(NAS)":[94],"system":[95,113,124],"with":[96,145],"multiple":[97],"disk":[99],"drives":[100],"(HDDs)":[101],"three":[103],"sensors,":[104],"which":[105],"are":[106],"thermal":[108,133],"camera,":[109],"microphone,":[111],"performance":[114,125],"logs.":[115],"The":[116,139],"unimodal":[117,171],"results":[118,141],"show":[119,142],"the":[121,132,152,162,169],"auditory":[122,170],"model":[126,134],"temporal":[129],"anomalies,":[130],"spatial":[137],"anomalies.":[138],"even":[144],"simple":[147],"filter":[148],"algorithms,":[151],"was":[155],"able":[156],"failure":[159,164],"signs":[160],"before":[161],"real":[163],"also":[166],"earlier":[167],"than":[168]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2026-01-25T23:04:38.658462","created_date":"2025-10-10T00:00:00"}
