Search
Now showing items 1-10 of 11
DILAF: A framework for distributed analysis of large-scale system logs for anomaly detection
(Wiley, 2019-02)
System logs constitute a rich source of information for detection and prediction of anomalies. However, they can include a huge volume of data, which is usually unstructured or semistructured. We introduce DILAF, a framework ...
MaLeFICE: Machine learning support for continuous performance improvement in computational engineering
(Wiley, 2022-04-25)
Computer aided engineering (CAE) practices improved drastically within the last decade due to ease of access to computing resources and open-source software. However, increasing complexity of hardware and software settings ...
Automated defect prioritization based on defects resolved at various project periods
(Elsevier, 2021-09)
Defect prioritization is mainly a manual and error-prone task in the current state-of-the-practice. We evaluated the effectiveness of an automated approach that employs supervised machine learning. We used two alternative ...
Finecloud: Fine-grained cloud service advisory using machine learning
(IEEE, 2022)
Motivated by real customer problems, we investigated utilization of cloud services at different layers including infrastructure (IaaS), application services (PaaS) and databases (DaaS). We found several issues such as ...
On the use of machine learning for predicting defect fix time violations
(Science and Technology Publications, 2022)
Accurate prediction of defect fix time is important for estimating and coordinating software maintenance efforts. Likewise, it is useful to predict whether or not the initially estimated defect fix time will be exceeded ...
DiBLIoT: A distributed blacklisting protocol for iot device classification using the hashgraph consensus algorithm
(IEEE Computer Society, 2022)
Industrial applications require highly reliable, secure, low-power and low-delay communications. However, wireless communication links in the industrial environment suffer from various channel impairments which can compromise ...
Disentangling human trafficking types and the identification of pathways to forced labor and sex: an explainable analytics approach
(Springer, 2023-07)
Terms such as human trafficking and modern-day slavery are ephemeral but reflect manifestations of oppression, servitude, and captivity that perpetually have threatened the basic right of all humans. Operations research ...
Comparative study of credit risk evaluation for unbalanced datasets using deep learning classifiers
(IEEE, 2023)
Credit risk assessment deals with calculating the risk of a loan not being repaid. For this reason, a lot of research effort is directed at credit risk analysis. In this study, machine learning models such as Light ...
Feature extraction for enhancing data-driven urban building energy models
(European Council on Computing in Construction (EC3), 2023)
Building energy demand assessment plays a crucial role in designing energy-efficient building stocks. However, most studies adopting a data-driven approach feel the deficiency of datasets with building-specific information ...
Incremental analysis of large-scale system logs for anomaly detection
(IEEE, 2019)
Anomalies during system execution can be detected by automated analysis of logs generated by the system. However, large scale systems can generate tens of millions of lines of logs within days. Centralized implementations ...
Share this page