{"id":"https://openalex.org/W2167667845","doi":"https://doi.org/10.1109/itcc.2004.1286585","title":"Detecting anomalies in high-performance parallel programs","display_name":"Detecting anomalies in high-performance parallel programs","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2167667845","doi":"https://doi.org/10.1109/itcc.2004.1286585","mag":"2167667845"},"language":"en","primary_location":{"id":"doi:10.1109/itcc.2004.1286585","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itcc.2004.1286585","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082842018","display_name":"German Florez","orcid":null},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"G. Florez","raw_affiliation_strings":["The Center for Computer Security Research, Mississippi State University, USA"],"affiliations":[{"raw_affiliation_string":"The Center for Computer Security Research, Mississippi State University, USA","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027093724","display_name":"Z. Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Z. Liu","raw_affiliation_strings":["The Center for Computer Security Research, Mississippi State University, USA"],"affiliations":[{"raw_affiliation_string":"The Center for Computer Security Research, Mississippi State University, USA","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113385499","display_name":"Sarah Bridges","orcid":null},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Bridges","raw_affiliation_strings":["The Center for Computer Security Research, Mississippi State University, USA"],"affiliations":[{"raw_affiliation_string":"The Center for Computer Security Research, Mississippi State University, USA","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087064145","display_name":"Rayford B. Vaughn","orcid":null},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R. Vaughn","raw_affiliation_strings":["The Center for Computer Security Research, Mississippi State University, USA"],"affiliations":[{"raw_affiliation_string":"The Center for Computer Security Research, Mississippi State University, USA","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026440046","display_name":"Anthony Skjellum","orcid":"https://orcid.org/0000-0001-5252-6600"},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]},{"id":"https://openalex.org/I17301866","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67","country_code":"US","type":"education","lineage":["https://openalex.org/I17301866"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"A. Skjellum","raw_affiliation_strings":["Department of Computer and Information Sciences, University of Alabama, Birmingham, USA","The Center for Computer Security Research, Mississippi State University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, University of Alabama, Birmingham, USA","institution_ids":["https://openalex.org/I17301866"]},{"raw_affiliation_string":"The Center for Computer Security Research, Mississippi State University, USA","institution_ids":["https://openalex.org/I99041443"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5082842018"],"corresponding_institution_ids":["https://openalex.org/I99041443"],"apc_list":null,"apc_paid":null,"fwci":1.1588,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83830138,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"30","last_page":"34 Vol.2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8915945291519165},{"id":"https://openalex.org/keywords/workstation","display_name":"Workstation","score":0.7940863370895386},{"id":"https://openalex.org/keywords/message-passing-interface","display_name":"Message Passing Interface","score":0.7277910709381104},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.6436996459960938},{"id":"https://openalex.org/keywords/computer-cluster","display_name":"Computer cluster","score":0.5717883110046387},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5146895051002502},{"id":"https://openalex.org/keywords/supercomputer","display_name":"Supercomputer","score":0.5045884847640991},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.5030600428581238},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5017385482788086},{"id":"https://openalex.org/keywords/message-passing","display_name":"Message passing","score":0.5008742809295654},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.49593695998191833},{"id":"https://openalex.org/keywords/cluster","display_name":"Cluster (spacecraft)","score":0.4847642779350281},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.41314971446990967},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.265468567609787},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19819903373718262},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.08015361428260803}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8915945291519165},{"id":"https://openalex.org/C67953723","wikidata":"https://www.wikidata.org/wiki/Q192525","display_name":"Workstation","level":2,"score":0.7940863370895386},{"id":"https://openalex.org/C166782233","wikidata":"https://www.wikidata.org/wiki/Q127879","display_name":"Message Passing Interface","level":3,"score":0.7277910709381104},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.6436996459960938},{"id":"https://openalex.org/C29140674","wikidata":"https://www.wikidata.org/wiki/Q206637","display_name":"Computer cluster","level":2,"score":0.5717883110046387},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5146895051002502},{"id":"https://openalex.org/C83283714","wikidata":"https://www.wikidata.org/wiki/Q121117","display_name":"Supercomputer","level":2,"score":0.5045884847640991},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.5030600428581238},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5017385482788086},{"id":"https://openalex.org/C854659","wikidata":"https://www.wikidata.org/wiki/Q1859284","display_name":"Message passing","level":2,"score":0.5008742809295654},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.49593695998191833},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.4847642779350281},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.41314971446990967},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.265468567609787},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19819903373718262},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.08015361428260803},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itcc.2004.1286585","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itcc.2004.1286585","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W59979876","https://openalex.org/W199352148","https://openalex.org/W2039553546","https://openalex.org/W2123180327","https://openalex.org/W2125838338","https://openalex.org/W2129860818","https://openalex.org/W2146635923","https://openalex.org/W2161641280","https://openalex.org/W2161957670","https://openalex.org/W2162989857","https://openalex.org/W2288766236","https://openalex.org/W3136767761","https://openalex.org/W4232616607","https://openalex.org/W4285719527","https://openalex.org/W6602495028","https://openalex.org/W6608065361","https://openalex.org/W6660340487","https://openalex.org/W6678329373","https://openalex.org/W6684031922","https://openalex.org/W6696294499"],"related_works":["https://openalex.org/W2124048060","https://openalex.org/W4386915331","https://openalex.org/W2378910916","https://openalex.org/W2116006827","https://openalex.org/W2361929291","https://openalex.org/W2086666199","https://openalex.org/W1997862718","https://openalex.org/W1511717675","https://openalex.org/W2185992486","https://openalex.org/W2411226825"],"abstract_inverted_index":{"Message":[0],"passing":[1],"interface":[2],"(MPI)":[3],"is":[4,141],"an":[5],"effective":[6],"programming":[7],"technique":[8],"for":[9,13,67],"implementing":[10],"parallel":[11,68,100],"programs":[12,101,111],"distributed":[14],"computation.":[15],"As":[16],"these":[17],"applications":[18,69],"run,":[19],"a":[20,47,61,71,123],"number":[21],"of":[22,25,42,49,73,82,92,99,109],"different":[23,50],"types":[24],"irregularities":[26],"can":[27,56,112],"occur":[28],"including":[29],"those":[30],"that":[31,55,107,133,146,162],"result":[32],"from":[33],"intrusions,":[34],"user":[35],"misbehavior,":[36],"corrupted":[37],"data,":[38],"deadlocks":[39],"or":[40],"failure":[41],"cluster":[43,72],"components.":[44],"We":[45,76,105],"perform":[46,150],"comparison":[48],"artificial":[51],"intelligence":[52],"(AI)":[53],"techniques":[54],"be":[57,113],"used":[58],"to":[59],"implement":[60],"lightweight":[62],"monitoring":[63,108],"and":[64,80,84,95,118,130,159,161],"detection":[65],"system":[66,97],"on":[70,138],"Linux":[74],"workstations.":[75],"study":[77],"the":[78,90,134,153],"accuracy":[79,117],"performance":[81],"deterministic":[83,148],"stochastic":[85],"algorithms":[86],"when":[87,152],"we":[88,131,144],"observe":[89],"flow":[91,155],"function":[93],"library":[94],"OS":[96],"calls":[98],"written":[102],"with":[103,115,122],"MPI.":[104],"demonstrate":[106,145],"MPI":[110],"achieved":[114],"high":[116],"in":[119,128,157],"some":[120],"cases":[121],"0%":[124],"false":[125],"positive":[126],"rate":[127],"real-time,":[129],"show":[132],"added":[135],"computational":[136],"load":[137],"each":[139],"node":[140],"small.":[142],"Finally":[143],"simple":[147],"methods":[149,165],"poorly":[151],"program":[154],"grows":[156],"size":[158],"variety,":[160],"more":[163],"complex":[164],"are":[166],"required.":[167]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
