[prev in list] [next in list] [prev in thread] [next in thread] 

List:       focus-ids
Subject:    CFP: Workshop on the Analysis of System Logs
From:       "Kathryn Mohror" <mohror1 () llnl ! gov>
Date:       2010-02-05 0:01:46
Message-ID: 012801caa5f6$68858880$39909980$ () gov
[Download RAW message or body]

        Workshop on the Analysis of System Logs (WASL) 2010
                 http://www.systemloganalysis.com
                         Call for Papers

                 ===============================
                       October 3, 2010
                       Vancouver, Canada
                           (at OSDI)
                 ===============================

           FULL PAPER SUBMISSION: Sunday, June 13, 2010
           AUTHOR NOTIFICATION: Sunday, July 18, 2010
           FINAL PAPERS DUE: Sunday, August 22, 2010
--------------------------------------------------------------------------

System logs contain a wide variety of information about system status and
health, 
including events from various applications, daemons and drivers, as well as
sampled 
information such as resource utilization statistics. As such, these logs
represent a 
rich source of information for the analysis and diagnosis of system problems
and 
prediction of future system events. However, their lack of organization and
the general 
lack of semantic consistency between information from various software and
hardware 
vendors means that most of this information content is wasted. Indeed,
today's 
most popular log analysis technique is to use regular expressions to either
detect 
events of interest or to filter the log so that a human operator can examine
it manually. 
Clearly, this captures only a fraction of the information available in these
logs and 
does not scale to the large systems common in business and supercomputing
environments.

This workshop will focus on novel techniques for extracting operationally
useful 
information from existing logs and methods to improve the information
content of future 
logs. Topics include but are not limited to:
    o Reports on publicly available sources of sample log data
    o Log anonymization
    o Log feature detection and extraction
    o Prediction of malfunction or misuse based on log data
    o Statistical techniques to characterize log data
    o Applications of Natural-Language Processing (NLP) to logs
    o Scalable log compression
    o Log comparison techniques
    o Methods to enhance astandardize log semantics
    o System diagnostic techniques
    o Log visualization 
    o Analysis of services (problem ticket) logs 
    o Applications of log analysis to system administration

Papers limited to 8 2-column pages using >=10pt font.

Workshop Chairs:
	Greg Bronevetsky (Lawrence Livermore National Laboratory)
	greg@bronevetsky.com
	Kathryn Mohror (Lawrence Livermore National Laboratory)
	mohror1@llnl.gov

Program Committee:
	Vijay K. Gurbani, Bell Labs
	

-------------------------------
Kathryn Mohror
Lawrence Livermore National Lab





-----------------------------------------------------------------
Securing Your Online Data Transfer with SSL.
A guide to understanding SSL certificates, how they operate and their application. By \
making use of an SSL certificate on your web server, you can securely collect \
sensitive information online, and increase business by giving your customers \
confidence that their transactions are safe. \
http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a17f194


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic