default search action
Liang Tang
- > Home > Persons > Liang Tang
Publications
- 2019
- [j43]Chunqiu Zeng, Liang Tang, Wubai Zhou, Tao Li, Larisa Shwartz, Genady Ya. Grabarnik:
An Integrated Framework for Mining Temporal Logs from Fluctuating Events. IEEE Trans. Serv. Comput. 12(2): 199-213 (2019) - 2017
- [j37]Tao Li, Chunqiu Zeng, Yexi Jiang, Wubai Zhou, Liang Tang, Zheng Liu, Yue Huang:
Data-Driven Techniques in Computing System Management. ACM Comput. Surv. 50(3): 45:1-45:43 (2017) - 2016
- [j29]Jian Xu, Liang Tang, Tao Li:
System situation ticket identification using SVMs ensemble. Expert Syst. Appl. 60: 130-140 (2016) - [j26]Jian Xu, Liang Tang, Chunqiu Zeng, Tao Li:
Pattern discovery via constraint programming. Knowl. Based Syst. 94: 23-32 (2016) - [j22]Wubai Zhou, Liang Tang, Chunqiu Zeng, Tao Li, Larisa Shwartz, Genady Ya. Grabarnik:
Resolution Recommendation for Event Tickets in Service Management. IEEE Trans. Netw. Serv. Manag. 13(4): 954-967 (2016) - 2015
- [c63]Wubai Zhou, Liang Tang, Tao Li, Larisa Shwartz, Genady Grabarnik:
Resolution recommendation for event tickets in service management. IM 2015: 287-295 - [c62]Liang Tang, Yexi Jiang, Lei Li, Chunqiu Zeng, Tao Li:
Personalized Recommendation via Parameter-Free Contextual Bandits. SIGIR 2015: 323-332 - 2014
- [j19]Liang Tang, Tao Li, Yexi Jiang, Zhiyuan Chen:
Dynamic Query Forms for Database Queries. IEEE Trans. Knowl. Data Eng. 26(9): 2166-2178 (2014) - [c61]Lei Li, Chao Shen, Long Wang, Li Zheng, Yexi Jiang, Liang Tang, Hongtai Li, Longhui Zhang, Chunqiu Zeng, Tao Li, Jun Tang, Dong Liu:
iMiner: Mining Inventory Data for Intelligent Management. CIKM 2014: 2057-2059 - [c60]Chunqiu Zeng, Liang Tang, Tao Li, Larisa Shwartz, Genady Grabarnik:
Mining temporal lag from fluctuating events for correlation and root cause analysis. CNSM 2014: 19-27 - [c55]Li Zheng, Chunqiu Zeng, Lei Li, Yexi Jiang, Wei Xue, Jingxuan Li, Chao Shen, Wubai Zhou, Hongtai Li, Liang Tang, Tao Li, Bing Duan, Ming Lei, Pengnian Wang:
Applying data mining techniques to address critical process optimization needs in advanced manufacturing. KDD 2014: 1739-1748 - [c52]Liang Tang, Yexi Jiang, Lei Li, Tao Li:
Ensemble contextual bandits for personalized recommendation. RecSys 2014: 73-80 - 2013
- [j16]Shunzhi Zhu, Liang Tang, Tao Li:
Finding multiple global linear correlations in sparse and noisy data sets. Knowl. Based Syst. 53: 40-50 (2013) - [j14]Li Zheng, Chao Shen, Liang Tang, Chunqiu Zeng, Tao Li, Steven Luis, Shu-Ching Chen:
Data Mining Meets the Needs of Disaster Information Management. IEEE Trans. Hum. Mach. Syst. 43(5): 451-464 (2013) - [c50]Liang Tang, Tao Li, Shu-Ching Chen, Shunzhi Zhu:
Searching similar segments over textual event sequences. CIKM 2013: 329-338 - [c48]Liang Tang, Tao Li, Larisa Shwartz, Genady Grabarnik:
Identifying missed monitoring alerts based on unstructured incident tickets. CNSM 2013: 143-146 - [c45]Liang Tang, Tao Li, Larisa Shwartz, Genady Grabarnik:
Recommending resolutions for problems identified by monitoring. IM 2013: 134-142 - [c40]Liang Tang, Tao Li, Larisa Shwartz, Florian Pinel, Genady Grabarnik:
An integrated framework for optimizing automatic monitoring systems in large IT infrastructures. KDD 2013: 1249-1257 - 2012
- [c37]Li Zheng, Chao Shen, Liang Tang, Chunqiu Zeng, Tao Li, Steven Luis, Shu-Ching Chen, Jainendra K. Navlakha:
Disaster SitRep - A vertical search engine and information analysis tool in disaster management domain. IRI 2012: 457-465 - [c36]Liang Tang, Tao Li, Larisa Shwartz:
Discovering lag intervals for temporal dependencies. KDD 2012: 633-641 - [c35]Liang Tang, Tao Li, Florian Pinel, Larisa Shwartz, Genady Grabarnik:
Optimizing system monitoring configurations for non-actionable alerts. NOMS 2012: 34-42 - 2011
- [c32]Liang Tang, Tao Li, Chang-Shing Perng:
LogSig: generating system events from raw textual logs. CIKM 2011: 785-794 - [c27]Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Luis, Shu-Ching Chen:
Applying data mining techniques to address disaster information management challenges on mobile devices. KDD 2011: 283-291 - 2010
- [c26]Liang Tang, Tao Li:
LogTree: A Framework for Generating System Events from Raw Textual Logs. ICDM 2010: 491-500 - [c23]Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Luis, Shu-Ching Chen, Vagelis Hristidis:
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks. KDD 2010: 125-134
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint