[1] JAUDET M, IQBAL N, HUSSAIN A. Neural networks for fault-prediction in a telecommunications network[C]//INMIC 2004:Proceedings of the 20048th International Multitopic Conference. Piscataway, NJ:IEEE, 2004:315-320. [2] LO S C, LIN C C, CHUANG Y C. Using support vector machine and sequential pattern mining to construct financial prediction model[C]//APSCC 2008:Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference. Washington, DC:IEEE Computer Society, 2008:993-998. [3] WEISS G M. Timeweaver:a genetic algorithm for identifying predictive patterns in sequences of events[C]//GECCO 1999:Proceedings of the 1st Annual Conference on Genetic and Evolutionary Computation. San Francisco, CA:Morgan Kaufmann, 1999,1:718-725. [4] CARAVELA I, ARSENIO A, BORGES N. A closed-loop automatic data-mining approach for preventive network monitoring[J]. Journal of Network and Systems Management, 2016, 24(4):974-1003. [5] ZHU M, LI Y, CHEN S. Mining multi-attribute sequential pattern in onboard failure logging[C]//Proceedings of the 201411th International Conference on Fuzzy Systems and Knowledge Discovery. Piscataway, NJ:IEEE, 2014:644-649. [6] 肖海林,李兴明.层次分析法在通信网告警相关性分析中的应用研究[J]. 电信科学, 2006, 22(11):36-39.(XIAO H L, LI X M. Study of analytic hierarchy process applied to the alarm correlation analysis in communication networks[J]. Telecommunications Science, 2006, 22(11):36-39.) [7] 闫仁武,李佳,绳英英,等.基于时间权值的增量关联规则挖掘算法[J].计算机工程,2010,36(17):57-59.(YAN R W, LI J, SHENG Y Y, et al. Increment association rule mining algorithm based on time weight[J]. Computer Engineering, 2010, 36(17):57-59.) [8] CAI C H, FU A W C, CHENG C H, et al. Mining association rules with weighted items[C]//IDEAS 1998:Proceedings of the 1998 International Symposium on Database Engineering and Applications. Washington, DC:IEEE Computer Society, 1998:68-77. [9] 邹力鹍,张其善.基于CAN-树的高效关联规则增量挖掘算法[J]. 计算机工程, 2008, 34(3):29-31.(ZOU L K, ZHANG Q S. Efficient incremental association rules mining algorithm based on CAN-tree[J]. Computer Engineering, 2008, 34(3):29-31.) [10] WANG H, KHOSHGOFTAAR T M, SELIYA N. How many software metrics should be selected for defect prediction?[EB/OL].[2017-12-20]. https://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS11/paper/viewFile/2558/2993. [11] BUCKLAND M, GEY F. The relationship between recall and precision[J]. Journal of the Association for Information Science and Technology, 1994, 45(1):12-19. [12] ZAKI M J, LESH N, OGIHARA M. Predicting Failures in Event Sequences[M]. Berlin:Springer, 2001:515-539. [13] SALFNER F, LENK M, MALEK M. A survey of online failure prediction methods[J]. ACM Computing Surveys, 2010, 42(3):10. WANG Shuai, born in 1992, M. S. candidate. His research interests include software quality assurance, data mining.YANG Qiuhui, born in 1970, Ph. D., associate professor. Her research interests include software testing, empirical software engineering.ZENG Jiayan, born in 1992, M. S. Her research interests include data mining, software automated testing.WAN Ying, born in 1993, M. S. candidate. Her research interests include data mining.FAN Zhening, born in 1994, M. S. candidate. Her research interests include software quality assurance.ZHANG Guanglan, born in 1994, M. S. candidate. Her research interests include software automated testing. |