{"id":"https://openalex.org/W3002373416","doi":"https://doi.org/10.1109/spac46244.2018.8965641","title":"Anomaly Detection Based on Job Monitoring Metrics in Distributed System","display_name":"Anomaly Detection Based on Job Monitoring Metrics in Distributed System","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W3002373416","doi":"https://doi.org/10.1109/spac46244.2018.8965641","mag":"3002373416"},"language":"en","primary_location":{"id":"doi:10.1109/spac46244.2018.8965641","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spac46244.2018.8965641","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023077211","display_name":"Meixiang Ding","orcid":null},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meixiang Ding","raw_affiliation_strings":["Department of Computer Science, Tongji University, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tongji University, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044413617","display_name":"Zhixiang Xiong","orcid":"https://orcid.org/0009-0005-7987-0870"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhixiang Xiong","raw_affiliation_strings":["Department of Computer Science, Tongji University, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tongji University, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007203703","display_name":"Jian Yu","orcid":"https://orcid.org/0000-0001-6154-4800"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Yu","raw_affiliation_strings":["Department of Computer Science, Tongji University, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Tongji University, China","institution_ids":["https://openalex.org/I116953780"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023077211"],"corresponding_institution_ids":["https://openalex.org/I116953780"],"apc_list":null,"apc_paid":null,"fwci":0.1954,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62585304,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"10","issue":null,"first_page":"182","last_page":"186"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8377897143363953},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6032349467277527},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5945199728012085},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.5091318488121033},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.477979838848114},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4773940443992615},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4160650074481964},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3714921772480011},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35271352529525757},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10799670219421387}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8377897143363953},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6032349467277527},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5945199728012085},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.5091318488121033},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.477979838848114},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4773940443992615},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4160650074481964},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3714921772480011},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35271352529525757},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10799670219421387},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/spac46244.2018.8965641","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spac46244.2018.8965641","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","raw_type":"proceedings-article"},{"id":"mag:3090373171","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202002272374005857","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.6100000143051147,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1846416616","https://openalex.org/W1968969471","https://openalex.org/W2028042531","https://openalex.org/W2069952048","https://openalex.org/W2110104287","https://openalex.org/W2155072926","https://openalex.org/W2294739160","https://openalex.org/W2521533145","https://openalex.org/W2755402962","https://openalex.org/W2795554423","https://openalex.org/W2806809133","https://openalex.org/W2963243344","https://openalex.org/W6638897975","https://openalex.org/W6667773583","https://openalex.org/W6676421412","https://openalex.org/W6697242285","https://openalex.org/W6727300623"],"related_works":["https://openalex.org/W2125652721","https://openalex.org/W1540371141","https://openalex.org/W1549363203","https://openalex.org/W4231274751","https://openalex.org/W2154063878","https://openalex.org/W2556012038","https://openalex.org/W1518215897","https://openalex.org/W2333896121","https://openalex.org/W2583763619","https://openalex.org/W2145073242"],"abstract_inverted_index":{"In":[0,52,87,198],"distributed":[1],"systems,":[2],"application":[3],"delays":[4],"caused":[5],"by":[6,14],"stragglers":[7,140,150],"become":[8],"a":[9],"common":[10],"problem.":[11],"And":[12],"interference":[13],"competing":[15],"the":[16,35,76,84,91,98,105,108,124,126,130,145,156,163,166,171,175,179,184,188,195,201,217],"resources":[17],"can":[18,203],"make":[19],"more":[20,139],"stragglers.":[21],"Previous":[22],"works":[23],"mostly":[24],"focus":[25],"on":[26,34,68],"straggler":[27],"detection":[28,59,221],"using":[29,61],"statistical":[30],"analysis":[31],"methods":[32,41],"based":[33,67],"data":[36,185],"extracted":[37],"from":[38,104],"logs.":[39,106],"These":[40],"cannot":[42],"provide":[43],"fine-grained":[44],"insights":[45],"to":[46,74,89,182],"help":[47],"users":[48],"optimize":[49],"their":[50],"programs.":[51],"this":[53,199],"paper,":[54],"we":[55,96,120],"propose":[56],"an":[57],"anomaly":[58,220],"approach":[60],"classification":[62],"method":[63],"in":[64,93,136,155,178,211,232],"machine":[65],"learning":[66],"job":[69,85],"monitoring":[70],"resource":[71,112,196],"metrics.":[72],"Due":[73],"interference,":[75,143],"change":[77],"of":[78,110,118,219],"metrics":[79,92],"may":[80],"vary":[81],"randomly":[82],"as":[83,160,162],"progresses.":[86],"order":[88],"compare":[90],"different":[94],"situation,":[95,138],"extract":[97],"job,":[99],"stage":[100,158,181],"and":[101,129,144,208,236],"task":[102,146,176],"information":[103],"From":[107],"point":[109],"system":[111],"utilization,":[113],"there":[114],"are":[115,123],"three":[116],"kinds":[117],"anomalies":[119],"detect,":[121],"which":[122],"stragglers(tasks),":[125],"abnormal":[127,167,206,234],"jobs":[128,168,207,235],"interfered":[131,172,209,237],"nodes.":[132,238],"We":[133],"prove":[134],"that":[135,154,165,216,227],"most":[137],"happen":[141],"under":[142],"time":[147,177],"for":[148,186],"defining":[149],"is":[151,170,230],"longer":[152],"than":[153],"similar":[157],"time,":[159],"well":[161],"node":[164],"lived":[169],"nodes.We":[173],"use":[174],"same":[180],"label":[183],"training":[187],"adaptive":[189],"boosting":[190],"classifier":[191],"model":[192,202],"solely":[193],"with":[194],"features.":[197],"way,":[200],"detect":[204],"straggles,":[205],"nodes":[210],"real-time.":[212],"Additionally,":[213],"Experiments":[214],"show":[215,226],"accuracy":[218],"reaches":[222],"92%.":[223],"Case":[224],"studies":[225],"our":[228],"framework":[229],"effective":[231],"detecting":[233]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
