Nathan Bosch

Nathan Bosch
KTH Royal Institute of Technology | KTH

About

6
Publications
895
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2
Citations

Publications

Publications (6)
Thesis
Full-text available
In the development of large telecommunications systems, it is imperative to identify, report, analyze and, thereafter, resolve both software and hardware faults. This resolution process often relies on written trouble reports (TRs), that contain information about the observed fault and, after analysis, information about why the fault occurred and t...
Article
Full-text available
A vital component in strategic segmentation is the typing tool. Little is known about their prediction performance. Even less is known how well they perform at the segment-level, in imbalanced situations, and how well they predict the smallest (minority) segment. We investigate using simulated and real-life data, how well typing tools perform overa...
Article
Linear (and other types of) regression are often used in what is referred to as “driver modeling” in customer satisfaction studies. The goal of such research is quite often to determine the relative importance of various sub-components of the product or service in terms of predicting and explaining overall satisfaction. Driver modeling is and can a...
Conference Paper
System logs perform a critical function in software-intensive systems as logs record the state of the system and significant events in the system at important points in time. Unfortunately, log entries are typically created in an ad-hoc, unstructured and uncoordinated fashion, limiting their usefulness for analytics and machine learning. In a DevOp...
Thesis
Full-text available
Complex software-intensive systems write information about their runtime behavior into log files, which are frequently used for both post-mortem and real-time analyses. These analyses can be used to determine anomalous occurrences in the log files. Machine learning techniques have previously been used to automate these analyses on single log files....
Preprint
Full-text available
System logs perform a critical function in software-intensive systems as logs record the state of the system and significant events in the system at important points in time. Unfortunately, log entries are typically created in an ad-hoc, unstructured and uncoordinated fashion, limiting their usefulness for analytics and machine learning. In this pa...

Network

Cited By