共 24 条
[1]
Armbrust M., Fox A., Griffith R., Joseph A.D., Katz R., Konwinski A., Lee G., Et al., A view of cloud computing, Communications of the ACM, 53, 4, pp. 50-58, (2010)
[2]
Denning D.E., An intrusion-detection model, IEEE Transactions on Software Engineering, 13, 2, pp. 222-232, (1987)
[3]
Ding Y., Ross A., An ensemble of one-class SVMs for fingerprint spoof detection across different fabrication materials, 2016 IEEE International Workshop on Information Forensics and Security (WIFS, pp. 1-6, (2016)
[4]
Gabel M., Sato K., Keren D., Matsuoka S., Schuster A., Latent fault detection with unbalanced workloads, EDBT/ICDT Workshops, pp. 118-124, (2015)
[5]
Haeberlen A., Kuznetsov P., The fault detection problem, International Conference on Principles of Distributed Systems, pp. 99-114, (2009)
[6]
Haeberlen A., Kouznetsov P., Druschel P., PeerReview: Practical accountability for distributed systems, ACM SIGOPS Operating Systems Review, ACM, 41, 6, pp. 175-188, (2007)
[7]
Hu P., Dai W., Enhancing fault tolerance based on Hadoop cluster, International Journal of Database Theory and Application, 7, 1, pp. 37-48, (2014)
[8]
Kadirvel S., Ho J., Fortes J.A.B., Fault management in map-reduce through early detection of anomalous nodes, Proceedings of the 10th International Conference on Autonomic Computing (ICAC, 13, pp. 235-245, (2013)
[9]
Karun A.K., Chitharanjan K., A review on Hadoop-HDFS infrastructure extensions, 2013 IEEE Conference on Information and Communication Technologies (ICT), (ICT2013, 11-12, pp. 132-137, (2013)
[10]
Massie M., Chun B., Culler D., The ganglia distributed monitoring system: Design, implementation, and experience, Parallel Computing, 30, 7, pp. 817-840, (2004)