{"id":"https://openalex.org/W4254970287","doi":"https://doi.org/10.1145/3322798","title":"Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics","display_name":"Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics","publication_year":2019,"publication_date":"2019-06-17","ids":{"openalex":"https://openalex.org/W4254970287","doi":"https://doi.org/10.1145/3322798"},"language":"en","primary_location":{"id":"doi:10.1145/3322798","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3322798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9672999978065491,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7743486762046814},{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.6410835981369019},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4924539029598236},{"id":"https://openalex.org/keywords/supercomputer","display_name":"Supercomputer","score":0.45181185007095337},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.4475124180316925},{"id":"https://openalex.org/keywords/telemetry","display_name":"Telemetry","score":0.43812939524650574},{"id":"https://openalex.org/keywords/network-monitoring","display_name":"Network monitoring","score":0.41555047035217285},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36468541622161865},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.31305521726608276},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24040868878364563},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1911517083644867},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.18394452333450317}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7743486762046814},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.6410835981369019},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4924539029598236},{"id":"https://openalex.org/C83283714","wikidata":"https://www.wikidata.org/wiki/Q121117","display_name":"Supercomputer","level":2,"score":0.45181185007095337},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.4475124180316925},{"id":"https://openalex.org/C183121708","wikidata":"https://www.wikidata.org/wiki/Q209867","display_name":"Telemetry","level":2,"score":0.43812939524650574},{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.41555047035217285},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36468541622161865},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.31305521726608276},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24040868878364563},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1911517083644867},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18394452333450317}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3322798","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3322798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2070863773","https://openalex.org/W2056771637","https://openalex.org/W748047311","https://openalex.org/W2359918844","https://openalex.org/W4298110012","https://openalex.org/W2384867379","https://openalex.org/W4212896802","https://openalex.org/W2993587666","https://openalex.org/W1569911790","https://openalex.org/W4388599231"],"abstract_inverted_index":{"The":[0,55,95,297],"2nd":[1],"International":[2],"Workshop":[3],"on":[4],"Systems":[5],"and":[6,9,30,33,40,48,52,59,69,73,81,111,116,126,132,142,151,158,173,183,188,204,207,214,222,226,229,236,244,255,269,300,305,310,325,336],"Network":[7],"Telemetry":[8],"Analytics":[10],"(SNTA":[11],"2019),":[12],"a":[13,63,274,282],"half-day":[14],"meeting":[15],"at":[16,26,92,200,238],"the":[17,28,34,46,86,102,112,123,149,174,190,202,208,220,239,248,259,295,316,322,326],"HPDC":[18],"2019":[19],"conference":[20],"in":[21,37,138,156,211,333],"Phoenix,":[22],"AZ,":[23],"USA,":[24],"aims":[25,199],"bridging":[27,201],"systems":[29,58,157,203,243],"network":[31,60,109,177,205],"telemetry":[32,61,125,206],"latest":[35,209],"advances":[36,210],"machine":[38,212],"learning":[39,213],"data":[41,144,154,192,215,245],"science":[42,216],"technologies,":[43,217],"to":[44,84,129,148,218,288,294,321],"advance":[45,219],"performance":[47,221],"reliability":[49,223],"of":[50,57,71,105,224,232,241,251,312],"HPC":[51,72,225,242],"distributed":[53,74,227],"systems.":[54],"tasks":[56,96],"are":[62,319],"key":[64],"element":[65],"for":[66,140,194,339],"effective":[67],"operations":[68],"management":[70],"computing":[75,106],"systems,":[76,107,168,228],"by":[77],"offering":[78],"comprehensive":[79],"monitoring":[80],"analysis":[82,127],"capabilities":[83],"provide":[85],"visibility":[87],"into":[88],"what":[89],"is":[90],"occurring":[91],"any":[93],"time.":[94],"will":[97,121],"be":[98,130,137],"significantly":[99],"complicated":[100],"with":[101,180],"greater":[103],"complexity":[104],"increasing":[108],"speed,":[110],"newly":[113,175],"introduced":[114],"mobile":[115],"IoT":[117],"devices.":[118],"Such":[119],"changes":[120],"render":[122],"existing":[124],"techniques":[128,135],"outdated,":[131],"more":[133],"scalable":[134],"may":[136],"place":[139],"data-driven":[141],"deeper":[143],"analysis.":[145,196],"In":[146],"addition":[147],"quantitative":[150],"qualitative":[152],"challenges,":[153],"pressure":[155],"networks":[159],"also":[160],"comes":[161],"from":[162,247],"various":[163],"sources":[164],"such":[165],"as":[166],"end":[167],"routers,":[169],"firewalls,":[170],"intrusion":[171],"sensors,":[172],"emerging":[176],"elements":[178],"speaking":[179],"different":[181],"syntax":[182],"semantics,":[184],"which":[185],"makes":[186],"organizing":[187],"incorporating":[189],"generated":[191],"difficult":[193],"extensive":[195],"This":[197,257],"workshop":[198,260],"sharing":[230],"visions":[231],"investigating":[233],"new":[234,313],"approaches":[235],"methods":[237],"intersection":[240],"sciences":[246],"diverse":[249,298],"angles":[250],"systems/network":[252],"performance,":[253],"availability,":[254],"security.":[256],"year,":[258],"presents":[261],"5":[262],"full":[263],"technical":[264],"papers,":[265],"2":[266],"short":[267],"papers":[268,335],"1":[270],"work-in-progress":[271],"paper":[272],"after":[273],"rigorous":[275],"review":[276],"process.":[277],"Putting":[278],"together":[279],"SNTA'19":[280],"was":[281],"team":[283],"effort.":[284],"We":[285,318],"would":[286],"like":[287],"thank":[289],"all":[290],"authors":[291],"who":[292,329],"submitted":[293],"workshop.":[296,317],"submission":[299],"selection":[301],"assure":[302],"interesting":[303],"discussions":[304],"most":[306],"importantly":[307],"out-of-the-box":[308],"thinking":[309],"generation":[311],"ideas":[314],"during":[315],"grateful":[320],"program":[323],"committee":[324],"external":[327],"reviewers,":[328],"worked":[330],"very":[331],"hard":[332],"reviewing":[334],"providing":[337],"feedback":[338],"authors.":[340]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
