{"id":"https://openalex.org/W2098228785","doi":"https://doi.org/10.1109/tpds.2014.2311814","title":"Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks","display_name":"Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks","publication_year":2014,"publication_date":"2014-03-14","ids":{"openalex":"https://openalex.org/W2098228785","doi":"https://doi.org/10.1109/tpds.2014.2311814","mag":"2098228785"},"language":"en","primary_location":{"id":"doi:10.1109/tpds.2014.2311814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpds.2014.2311814","pdf_url":null,"source":{"id":"https://openalex.org/S97130795","display_name":"IEEE Transactions on Parallel and Distributed Systems","issn_l":"1045-9219","issn":["1045-9219","1558-2183","2161-9883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Parallel and Distributed Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111733440","display_name":"Srikar Tati","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Srikar Tati","raw_affiliation_strings":["Institute for Networking and Security Research, Pennsylvania State University, University Park, PA","Institute for Networking and Security Research, Pennsylvania State University, University Park,"],"affiliations":[{"raw_affiliation_string":"Institute for Networking and Security Research, Pennsylvania State University, University Park, PA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Institute for Networking and Security Research, Pennsylvania State University, University Park,","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110791651","display_name":"Bong Jun Ko","orcid":null},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bong Jun Ko","raw_affiliation_strings":["IBM T.J. Watson Research Center, Hawthorne, NY","IBM T.J. Watson Research Center , 19 Skyline Dr., Hawthorne"],"affiliations":[{"raw_affiliation_string":"IBM T.J. Watson Research Center, Hawthorne, NY","institution_ids":["https://openalex.org/I1341412227"]},{"raw_affiliation_string":"IBM T.J. Watson Research Center , 19 Skyline Dr., Hawthorne","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102287047","display_name":"Guohong Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guohong Cao","raw_affiliation_strings":["Institute for Networking and Security Research, Pennsylvania State University, University Park, PA","Institute for Networking and Security Research, Pennsylvania State University, University Park,"],"affiliations":[{"raw_affiliation_string":"Institute for Networking and Security Research, Pennsylvania State University, University Park, PA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Institute for Networking and Security Research, Pennsylvania State University, University Park,","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113663310","display_name":"Ananthram Swami","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ananthram Swami","raw_affiliation_strings":["Army Research Laboratory, Adelphi, MD","Army Research Laboratory, Adelphi#TAB#"],"affiliations":[{"raw_affiliation_string":"Army Research Laboratory, Adelphi, MD","institution_ids":["https://openalex.org/I166416128"]},{"raw_affiliation_string":"Army Research Laboratory, Adelphi#TAB#","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073465096","display_name":"Thomas La Porta","orcid":"https://orcid.org/0000-0003-1295-4461"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thomas F. La Porta","raw_affiliation_strings":["Institute for Networking and Security Research, Pennsylvania State University, University Park, PA","Institute for Networking and Security Research, Pennsylvania State University, University Park,"],"affiliations":[{"raw_affiliation_string":"Institute for Networking and Security Research, Pennsylvania State University, University Park, PA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Institute for Networking and Security Research, Pennsylvania State University, University Park,","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5111733440"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":0.6896,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.75803941,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"26","issue":"3","first_page":"646","last_page":"656"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8180975914001465},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.7942272424697876},{"id":"https://openalex.org/keywords/false-positives-and-false-negatives","display_name":"False positives and false negatives","score":0.633678138256073},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6325304508209229},{"id":"https://openalex.org/keywords/true-positive-rate","display_name":"True positive rate","score":0.4741976857185364},{"id":"https://openalex.org/keywords/greedy-algorithm","display_name":"Greedy algorithm","score":0.47290241718292236},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.451760858297348},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.43667787313461304},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3687399625778198},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.22983235120773315},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21222198009490967}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8180975914001465},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.7942272424697876},{"id":"https://openalex.org/C112789634","wikidata":"https://www.wikidata.org/wiki/Q18207010","display_name":"False positives and false negatives","level":3,"score":0.633678138256073},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6325304508209229},{"id":"https://openalex.org/C2989486834","wikidata":"https://www.wikidata.org/wiki/Q3808900","display_name":"True positive rate","level":2,"score":0.4741976857185364},{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.47290241718292236},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.451760858297348},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.43667787313461304},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3687399625778198},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.22983235120773315},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21222198009490967},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tpds.2014.2311814","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpds.2014.2311814","pdf_url":null,"source":{"id":"https://openalex.org/S97130795","display_name":"IEEE Transactions on Parallel and Distributed Systems","issn_l":"1045-9219","issn":["1045-9219","1558-2183","2161-9883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Parallel and Distributed Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320332186","display_name":"Defense Threat Reduction Agency","ror":"https://ror.org/04tz64554"},{"id":"https://openalex.org/F4320338295","display_name":"Army Research Laboratory","ror":"https://ror.org/011hc8f90"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1964946211","https://openalex.org/W2020066904","https://openalex.org/W2035363137","https://openalex.org/W2112713313","https://openalex.org/W2115303222","https://openalex.org/W2124165698","https://openalex.org/W2127577941","https://openalex.org/W2161415693","https://openalex.org/W2166734840","https://openalex.org/W2168716032","https://openalex.org/W4233014035","https://openalex.org/W4238452917","https://openalex.org/W6659235122"],"related_works":["https://openalex.org/W1557094818","https://openalex.org/W2183246718","https://openalex.org/W4287692494","https://openalex.org/W2099261052","https://openalex.org/W1973412793","https://openalex.org/W3129715955","https://openalex.org/W4292605373","https://openalex.org/W2951146195","https://openalex.org/W3047594718","https://openalex.org/W3119537175"],"abstract_inverted_index":{"We":[0,13,109],"propose":[1,111],"a":[2,36,40,99,128,141],"greedy":[3],"algorithm,":[4],"Cluster-MAX-COVERAGE":[5],"(CMC),":[6],"to":[7,34,63],"efficiently":[8,120],"diagnose":[9],"large-scale":[10],"clustered":[11,125],"failures.":[12,126],"primarily":[14],"address":[15],"the":[16],"challenge":[17],"of":[18,28,43,81,130,144],"determining":[19],"faults":[20],"with":[21,39,66],"incomplete":[22],"symptoms.":[23],"CMC":[24,50,71,102],"makes":[25],"novel":[26],"use":[27],"both":[29,122,134],"positive":[30,94],"and":[31,46,95,124,136,147],"negative":[32,96],"symptoms":[33,97],"output":[35],"hypothesis":[37],"list":[38],"low":[41],"number":[42,143],"false":[44,47,145,148],"negatives":[45,146],"positives":[48],"quickly.":[49],"requires":[51],"reports":[52],"from":[53],"about":[54],"half":[55],"as":[56,59],"many":[57],"nodes":[58],"other":[60],"existing":[61,107],"algorithms":[62],"determine":[64],"failures":[65,131],"100":[67],"percent":[68],"accuracy.":[69,89],"Moreover,":[70],"accomplishes":[72],"this":[73],"gain":[74],"significantly":[75],"faster":[76],"(sometimes":[77],"by":[78],"two":[79],"orders":[80],"magnitude)":[82],"than":[83,106],"an":[84,112],"algorithm":[85,114],"that":[86,118,132],"matches":[87],"its":[88],"When":[90],"there":[91],"are":[92],"fewer":[93],"at":[98],"reporting":[100],"node,":[101],"performs":[103,119],"much":[104],"better":[105],"algorithms.":[108],"also":[110],"adaptive":[113],"called":[115],"Adaptive-MAX-COVERAGE":[116],"(AMC)":[117],"during":[121],"independent":[123,135],"During":[127],"series":[129],"include":[133],"clustered,":[137],"AMC":[138],"results":[139],"in":[140],"reduced":[142],"positives.":[149]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
