Lokalisieren von Defekten in Software mit Hilfe von Data Mining
|
|
- Brent Green
- 8 years ago
- Views:
Transcription
1 Lokalisieren von Defekten in Software mit Hilfe von Data Mining Klemens Böhm NAME INSTITUTE OF INSTITUTE, FOR FACULTY, PROGRAMME DEPARTMENT STRUCTURES (change AND DATA masterorganisation view) (IPD) Please insert a figure in the master transparency. KIT University of the State of Baden-Wuerttemerg and Photo: Stadt Karlsruhe National Research Center of the Helmholtz Association KIT University of the State of Baden-Wuerttemerg and National Laoratory of the Helmholtz Association
2 A prolem has een detected and windows has een shut down to rpevent damage to your computer. Please click on to add your Title DRIVER_IRQL_NOT_LESS_OR_EQUAL Please click on to add your Title If this is the first time you`ve seen this stop error screen, restart your computer, If this screen appears again, follow these steps: Check to make sure any new hardware or software is properly installed. If this is a new installation, ask your hardware or software manufacturer for any windows updates you might need. If prolems continue, disale or remove any newly installed hardware or software. Disale BIOS memory options such as caching or shadowing. If NAME you OF need INSTITUTE, to use FACULTY, safe DEPARTMENT Mode to (change remove master or view) disale components, restart your computer, press F8 to select Advanced Startup Options, and then Select Safe Mode. Technical information: Please insert a figure in the master transparency. *** STOP: 0x000000D1 (0x C, 0x , 0x , 0xF86B5A89) *** gv3.sys Adress F86B5A89 ase at F86B5000, DateStam 3dd991e Beginning dump of physical memory Physical memory dump complete. Contact your system administrator or technical support group for further assistance KIT University of the State Prof. Baden-Wuerttemerg Max Mustermannand - Title National Research Center of the Helmholtz Association
3 Locating Bugs in Software Software is almost never shipped ug-free, even if tested extensively. Deugging is time consuming and expensive. Automated localisation would e of great help. Idea: Locate ugs with data mining techniques. Use an approach ased on weighted graph mining. 3Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 1/25
4 Outline 1. Motivation 2. Call Graphs 3. Defect Localization 4. Dataflow-Enaled Defect Localization 5. Evaluation 6. Conclusions 4Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 2/25
5 Call Graphs Program executions as call graphs: methods nodes method calls edges a c 5Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 3/25
6 Call Graphs Program executions as call graphs: methods nodes method calls edges a Bugs in the call graph: Structure affecting (existing approaches) E.g., a ug in an if-condition in a c 6Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 4/25
7 Call Graphs Program executions as call graphs: methods nodes method calls edges a Bugs in the call graph: Structure affecting (existing approaches) E.g., a ug in an if-condition in a c Call frequency affecting (new in our contriution) E.g., a ug in a loop-condition in c 7Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 5/25
8 Reduction of Call Graphs printout showdelete showdelete showsame showinsert showdelete showsame showinsert showinsert showinsert showdelete showdelete showdelete showsame showsymol showsymol printin showsymol printin showsymol printin showsymol showsymol showsymol printin showsymol showsymol showsymol Millions of method calls are very common. Reduction of call graphs is necessary. a a c 1 1 c 3 Example of reduced call graph. Weights have not een used in previous reductions. 8Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 6/25
9 Outline 1. Motivation 2. Call Graphs 3. Defect Localization 4. Dataflow-Enaled Defect Localization 5. Evaluation 6. Conclusions 9Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 2/25
10 How to Use Call Graphs? Existing idea: Look at program executions (correct ones as well as failing ones) represented as call graphs and analyse the graph structure (i.e., graphs without weights). Identify patterns typical of failing executions. Frequent sugraph mining. In a nutshell, this gives way to finding structure-affecting ugs. New aspect: Explicitly analyse call frequencies (edge weights) esides graph structures. 10 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 7/25
11 Weighted Graph Mining No algorithm availale for weighted graph mining (as well as no prolem formulation). How to make use of edge weights? Preprocessing Discretisation of weights (We are currently investigating this.) Postprocessing (our approach already studied and presented susequently) Graph mining without weights Susequent detailed analysis of weights 11 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 8/25
12 Finding Discriminating Edge Weights (1) Apply frequent sugraph mining to reduced call graphs of correct and failing program executions (ignore the weights in this step) (2) Consider only sugraphs occurring in oth correct and failing executions (3) Analyse the edge weights Example graph found y frequent sugraph mining: a c Average weight of a c in correct executions: 1 Average weight of a c in failing executions: 1 Average weight of c in correct executions: 3 Average weight of c in failing executions: Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 9/25
13 Finding Discriminating Edge Weights (1) Apply frequent sugraph mining to reduced call graphs of correct and failing program executions (ignore the weights in this step) (2) Consider only sugraphs occurring in oth correct and failing executions (3) Analyse the edge weights Example graph found y frequent sugraph mining: a c Average weight of a c in correct executions: 1 Average weight of a c in failing executions: 1 Average weight of c in correct executions: 3 Average weight of c in failing executions: Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 10/25
14 Entropy Based Scoring Assemle a tale which contains every edge in every frequent sugraph: a c a SG 1 SG 2 SG 1 SG 1 SG 2 a c c a Class Execution failing Execution correct Application of the Information Gain feature-selection algorithm, ased on entropy. Result: Ranking of the columns (edges) 14 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 11/25
15 Integration of Structural Evidence reduced call graphs in failing and correct frequent sugraph mining (not considering weights) in failing only entropy ased scoring (ased on edge weights) structural scoring (ased on support) comination comined method ranking 15 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 12/25
16 Integration of Structural Evidence reduced call graphs in failing and correct frequent sugraph mining (not considering weights) in failing only entropy ased scoring (ased on edge weights) structural scoring (ased on support) comination comined method ranking 16 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 13/25
17 Integration of Structural Evidence in failing and correct entropy ased scoring (ased on edge weights) reduced call graphs frequent sugraph mining (not considering weights) in failing only structural scoring (ased on support) Usage of two kinds of evidence: frequency (left) and structure (right) Both types of ugs canelocated: call frequency and structure affecting ones comination comined method ranking 17 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 14/25
18 Results Example output: METHOD SCORE 1 inputscan() showinsert() showdelete() oldconsume() addsymol() Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 15/25
19 Results Example output: METHOD SCORE 1 inputscan() showinsert() showdelete() oldconsume() addsymol() The ug has een instrumented in showinsert(). A software developer has to check two methods only. We do not try to explain/fix ugs, just to locate them! 19 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 16/25
20 Outline 1. Motivation 2. Call Graphs 3. Defect Localization 4. Dataflow-Enaled Defect Localization 5. Evaluation 6. Conclusions 20 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 2/25
21 Challenge: Dataflow-Affecting Bugs Not all defects affect the call graph. Example (failing execution): voidmain() void a () void () 1 int c(12, 33) 1. Method calls c(12, 33). 2. Method c calculates a wrong return value Method prints value 8. Graph structure and weights remain unaffected. Call-graph mining cannot find the defect. Approach: Extend call graphs with dataflow information and analyse these extended graphs. 21 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 17/25
22 Dataflow Information Availale Example dataflows (parameter and return values) of int c(int p1, int p2) from : In real executions, one method can e called million times. To deal with this data, we need to aggregate it. 22 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 18/25
23 Our Approach: Discretisation with CAIM CAIM (class-attriute interdependence maximization) class-aware (correct, failing) parameter-free, i.e., it automatically determines a possily small numer of intervals, homogeneous wrt. the class (a) Exemplar call data. Exec. p1 p2 r class correct correct correct failing failing failing failing correct correct () Intervals generated. Value Intervals p1 i 1 : [1; 11.5] i 2 : (11.5; 23] p2 i 1 : [2; 13.5] i 2 : (13.5; 38] i 3 : (38; 47] r i 1 : [5; 8.5] i 2 : (8.5; 13] (c) Discretised data. Exec. p1 p2 r 1 i 1 i 3 i 2 1 i 1 i 3 i 2 1 i 1 i 1 i 2 2 i 2 i 2 i 1 3 i 2 i 2 i 1 3 i 2 i 2 i 1 3 i 2 i 2 i 1 4 i 1 i 1 i 2 4 i 1 i 3 i 2 23 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 19/25
24 Dataflow-Enaled Call Graphs (DEC Graphs) How to represent discretised dataflow data in call graphs? Attach tuples of weights (i.e., counters) to edges: (t; p i 1 1 ; ; p i n1 1 ; ; p i 1 m ; ; p i nm m ; r i 1 ;...; r i nr ) - t: total numer of calls (as efore) - p 1 ; ; p m ; r: parameter values and return value - i 1 ; ; i n x : intervals of the parameter/return values 52 voidmain() void a () 4 2 void () 1,0,1,0,1,0,1, 0 int c(int p1, int p2) Exec. p1 p2 r 1 i 1 i 3 i 2 1 i 1 i 3 i 2 1 i 1 i 1 i 2 2 i 2 i 2 i 1 3 i 2 i 2 i 1 3 i 2 i 2 i 1 3 i 2 i 2 i 1 4 i 1 i 1 i 2 4 i 1 i 3 i 2 Example call c: (t; p i 1 1 ; p i 2 1 ; p i 1 2 ; p i 2 2 ; p i 3 2 ; r i 1 ; r i 2 ) 24 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 20/25
25 Defect Localisation with DEC Graphs 1. Assemle classified DEC graphs for all executions. 2. Perform frequent sugraph mining (CloseGraph). We use sugraphs as contexts to detect defects that occur in certain situations only. 3. Assemle a feature tale with all tuple elements from all edges in all frequent sugraphs separately: 4. Derive a ranking of the columns (and thus the methods) with entropy-ased feature selection (GainRatio). Various optimisations. 25 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 21/25
26 Outline 1. Motivation 2. Call Graphs 3. Defect Localization 4. Dataflow-Enaled Defect Localization 5. Evaluation 6. Conclusions 26 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 2/25
27 Evaluation of Defect Localisation with DEC Graphs A data-centric application: Weka (class DecisionStump) 16 instrumented defects, similar to related evaluations. Most dataflow-affecting ugs indirectly affect the call graph. 90 executions of every version with UCI data The result tale contains the ranking position, i.e., numer of methods one has to inspect to find a defect: With improvements only 1.5 methods on average (out of 30 actually executed methods). 27 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 23/25
28 Conclusions A domain-specific data-mining prolem: software-defect localisation Contriutions: A domain and prolem-specific data representation: DEC graphs (discretisation) An analysis process for DEC graphs (sugraph mining, feature selection) Localization of dataflow-affecting ugs esides other ug classes Future improvements: Dataflows through gloal variales Scalale analysis of large software projects Parallel programs 28 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 24/25
29 Acknowledgements Thanks to Frank Eichinger for letting me use his slides. 29 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 25/25
Scalable Software-Defect Localisation by Hierarchical Mining of Dynamic Call Graphs
Scalable Software-Defect Localisation by Hierarchical Mining of Dynamic Call Graphs Frank Eichinger Christopher Oßner Klemens Böhm Abstract The localisation of defects in computer programmes is essential
More informationGraph Mining and Social Network Analysis
Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann
More informationReal-time Targeted Influence Maximization for Online Advertisements
Real-time Targeted Influence Maximization for Online Advertisements Yuchen Li Dongxiang Zhang ian-lee Tan Department of Computer Science School of Computing, National University of Singapore {liyuchen,zhangdo,tankl}@comp.nus.edu.sg
More informationHardware- and Network-Enhanced Software Systems for Cloud Computing
The HARNESS Project: Hardware- and Network-Enhanced Software Systems for Cloud Computing Prof. Alexander Wolf Imperial College London (Project Coordinator) Cloud Market Strata SaaS Software as a Service
More informationPSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
More informationHands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server 2008 Chapter 9 Server and Network Monitoring Objectives Understand the importance of server monitoring Monitor server services and solve problems with services Use Task
More informationHandout for three day Learning Curve Workshop
Handout for three day Learning Curve Workshop Unit and Cumulative Average Formulations DAUMW (Credits to Professors Steve Malashevitz, Bo Williams, and prior faculty. Blame to Dr. Roland Kankey, roland.kankey@dau.mil)
More informationCOC131 Data Mining - Clustering
COC131 Data Mining - Clustering Martin D. Sykora m.d.sykora@lboro.ac.uk Tutorial 05, Friday 20th March 2009 1. Fire up Weka (Waikako Environment for Knowledge Analysis) software, launch the explorer window
More informationLocalizing Defects in Multithreaded Programs by Mining Dynamic Call Graphs
Localizing Defects in Multithreaded Programs by Mining Dynamic Call Graphs Frank Eichinger, Victor Pankratius, Philipp W. L. Große, and Klemens Böhm Karlsruhe Institute of Technology (KIT), Germany, {eichinger,
More informationData Mining Classification: Decision Trees
Data Mining Classification: Decision Trees Classification Decision Trees: what they are and how they work Hunt s (TDIDT) algorithm How to select the best split How to handle Inconsistent data Continuous
More informationTech Tip: Understanding Server Memory Counters
Tech Tip: Understanding Server Memory Counters Written by Bill Bach, President of Goldstar Software Inc. This tech tip is the second in a series of tips designed to help you understand the way that your
More informationDidacticiel Études de cas. Association Rules mining with Tanagra, R (arules package), Orange, RapidMiner, Knime and Weka.
1 Subject Association Rules mining with Tanagra, R (arules package), Orange, RapidMiner, Knime and Weka. This document extends a previous tutorial dedicated to the comparison of various implementations
More informationWeb Document Clustering
Web Document Clustering Lab Project based on the MDL clustering suite http://www.cs.ccsu.edu/~markov/mdlclustering/ Zdravko Markov Computer Science Department Central Connecticut State University New Britain,
More informationCisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1
Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1 Software Release Notes May 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation 2 New features
More informationDefiniens XD 1.2.1. Release Notes
Definiens XD 1.2.1 Release Notes Imprint and Version Document Version Copyright 2010 Definiens AG. All rights reserved. This document may be copied and printed only in accordance with the terms of the
More informationSchedule Risk Analysis Simulator using Beta Distribution
Schedule Risk Analysis Simulator using Beta Distribution Isha Sharma Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana (INDIA) ishasharma211@yahoo.com Dr. P.K.
More informationQoS Provisioning in Mobile Internet Environment
QoS Provisioning in Moile Internet Environment Salem Lepaja (salem.lepaja@tuwien.ac.at), Reinhard Fleck, Nguyen Nam Hoang Vienna University of Technology, Institute of Communication Networks, Favoritenstrasse
More informationCisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0
Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0 Software Release Notes May 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation 1 New features
More informationDefiniens. Enterprise Image Intelligence Suite 7.0.10. Release Notes. www.definiens.com
Definiens Enterprise Image Intelligence Suite 7.0.10 Release Notes www.definiens.com Imprint and Version Document Version 7.0.10 Copyright 2010 Definiens AG. All rights reserved. This document may be copied
More informationAnalysis report examination with CUBE
Analysis report examination with CUBE Brian Wylie Jülich Supercomputing Centre CUBE Parallel program analysis report exploration tools Libraries for XML report reading & writing Algebra utilities for report
More informationData Mining III: Numeric Estimation
Data Mining III: Numeric Estimation Computer Science 105 Boston University David G. Sullivan, Ph.D. Review: Numeric Estimation Numeric estimation is like classification learning. it involves learning a
More informationHUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD.
HUAWEI OceanStor 9000 Load Balancing Technical Issue 01 Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be
More informationCFD analysis for road vehicles - case study
CFD analysis for road vehicles - case study Dan BARBUT*,1, Eugen Mihai NEGRUS 1 *Corresponding author *,1 POLITEHNICA University of Bucharest, Faculty of Transport, Splaiul Independentei 313, 060042, Bucharest,
More informationBinary Bug - Automatic Binary Trading
Binary Bug - Automatic Binary Trading Binary Bug specializes in the development of trading algorithms and trade execution technology. Our set of analytical tools, statistical models and complex algorithms
More informationCommissioning IDENTControl Compact IC-KP2-2HB17-2V1D Profinet Protocol with a Siemens S7 PLC
Commissioning IDENTControl Compact IC-KP2-2HB17-2V1D Profinet Protocol with a Siemens S7 PLC Seite 1 von 19 Index of contents 1. Adjustment of communication parameter with web interface...3 2. Installation
More informationBack Propagation Neural Networks User Manual
Back Propagation Neural Networks User Manual Author: Lukáš Civín Library: BP_network.dll Runnable class: NeuralNetStart Document: Back Propagation Neural Networks Page 1/28 Content: 1 INTRODUCTION TO BACK-PROPAGATION
More informationOptimizing Generation of Object Graphs in Java PathFinder
Optimizing Generation of Object Graphs in Java PathFinder Milos Gligoric, Tihomir Gvero, Steven Lauterburg, Darko Marinov, Sarfraz Khurshid JPF Workshop 1.5.8 Bugs Six Decades Ago 1947: Harvard Mark II
More information(COMPANY LOGO) CGMP COMPUTERIZED SYSTEM VENDOR AUDIT QUESTIONNAIRE
1. GENERAL COMPANY INFORMATION (COMPANY LOGO) 1.1 Name Address Years in Business Number of Employees Services Performed or Products Manufactured Prior Experience with (Company Name) 1.2 Please provide
More informationShutting down / Rebooting Small Business Server 2003 Version 1.00
Shutting down / Rebooting Small Business Server 2003 Version 1.00 Need to Know TM It may be necessary at some stage of the life of Small Business Server 2003 that it be shutdown or rebooted. In many cases
More informationStatistical Data analysis With Excel For HSMG.632 students
1 Statistical Data analysis With Excel For HSMG.632 students Dialog Boxes Descriptive Statistics with Excel To find a single descriptive value of a data set such as mean, median, mode or the standard deviation,
More informationSQL Server Replication Guide
SQL Server Replication Guide Rev: 2013-08-08 Sitecore CMS 6.3 and Later SQL Server Replication Guide Table of Contents Chapter 1 SQL Server Replication Guide... 3 1.1 SQL Server Replication Overview...
More informationMinimizing Probing Cost and Achieving Identifiability in Network Link Monitoring
Minimizing Proing Cost and Achieving Identifiaility in Network Link Monitoring Qiang Zheng and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University E-mail: {quz3,
More informationMotivation: Smartphone Market
Motivation: Smartphone Market Smartphone Systems External Display Device Display Smartphone Systems Smartphone-like system Main Camera Front-facing Camera Central Processing Unit Device Display Graphics
More informationLustre tools for ldiskfs investigation and lightweight I/O statistics
Lustre tools for ldiskfs investigation and lightweight I/O statistics Roland Laifer STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State Roland of Baden-Württemberg Laifer Lustre and tools
More informationThis presentation explains how to monitor memory consumption of DataStage processes during run time.
This presentation explains how to monitor memory consumption of DataStage processes during run time. Page 1 of 9 The objectives of this presentation are to explain why and when it is useful to monitor
More informationSo today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
More informationMicrosoft SQL Server OLTP Best Practice
Microsoft SQL Server OLTP Best Practice The document Introduction to Transactional (OLTP) Load Testing for all Databases provides a general overview on the HammerDB OLTP workload and the document Microsoft
More informationT-61.6010 Non-discriminatory Machine Learning
T-61.6010 Non-discriminatory Machine Learning Seminar 1 Indrė Žliobaitė Aalto University School of Science, Department of Computer Science Helsinki Institute for Information Technology (HIIT) University
More informationTOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM
TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM Thanh-Nghi Do College of Information Technology, Cantho University 1 Ly Tu Trong Street, Ninh Kieu District Cantho City, Vietnam
More informationBest practices for efficient HPC performance with large models
Best practices for efficient HPC performance with large models Dr. Hößl Bernhard, CADFEM (Austria) GmbH PRACE Autumn School 2013 - Industry Oriented HPC Simulations, September 21-27, University of Ljubljana,
More informationABAP SQL Monitor Implementation Guide and Best Practices
ABAP SQL Monitor Implementation Guide and Best Practices TABLE OF CONTENTS ABAP SQL Monitor - What is it and why do I need it?... 3 When is it available and what are the technical requirements?... 5 In
More informationAll-in-One Asset Management Tool
APEX-RU0781 All-in-One Asset Management Tool Final Report October 2012 Submitted by Mansooreh Mollaghasemi, Ph.D. Chairman and CEO Productivity Apex, Inc 3505 Lake Lynda Drive, Suite 206 Orlando, FL 32817
More informationCustomer Relationship Management by Semi-Supervised Learning
Middle-East Journal of Scientific Research 16 (5): 614-620, 2013 ISSN 1990-9233 IDOSI Pulications, 2013 DOI: 10.5829/idosi.mejsr.2013.16.05.930 Customer Relationship Management y Semi-Supervised Learning
More informationGridKa site report. Manfred Alef, Andreas Heiss, Jos van Wezel. www.kit.edu. Steinbuch Centre for Computing
GridKa site report Manfred Alef, Andreas Heiss, Jos van Wezel Steinbuch Centre for Computing KIT The cooperation of and Universität Karlsruhe (TH) www.kit.edu KIT? SCC? { = University ComputingCentre +
More informationSTATISTICA. Financial Institutions. Case Study: Credit Scoring. and
Financial Institutions and STATISTICA Case Study: Credit Scoring STATISTICA Solutions for Business Intelligence, Data Mining, Quality Control, and Web-based Analytics Table of Contents INTRODUCTION: WHAT
More informationBig Data Mining Services and Knowledge Discovery Applications on Clouds
Big Data Mining Services and Knowledge Discovery Applications on Clouds Domenico Talia DIMES, Università della Calabria & DtoK Lab Italy talia@dimes.unical.it Data Availability or Data Deluge? Some decades
More informationLoad balancing in SOAJA (Service Oriented Java Adaptive Applications)
Load balancing in SOAJA (Service Oriented Java Adaptive Applications) Richard Olejnik Université des Sciences et Technologies de Lille Laboratoire d Informatique Fondamentale de Lille (LIFL UMR CNRS 8022)
More informationSerendipity: Enabling Remote Computing among Intermittently Connected Mobile Devices
Serendipity: Enaling Remote Computing among Intermittently Connected Moile Devices Cong Shi*, Vasileios Lakafosis, Mostafa H. Ammar*, Ellen W. Zegura* *School of Computer Science School of Electrical and
More information1) This is one recommended way of setting the TaskBar to keep it out of the way of the main application window and yet still easily accessible.
Windows XP Tweaks (Suggestions From RML Labs For Better SAC, SAWStudio and overall Windows Performance) (Follow any or all of these at your own discretion) 1) This is one recommended way of setting the
More informationWebSphere Commerce V7 Feature Pack 3
WebSphere Commerce V7 Feature Pack 3 Precision marketing updates 2011 IBM Corporation WebSphere Commerce V7 Feature Pack 3 includes some precision marketing updates. There is a new trigger, Customer Checks
More informationTechnical Report. The KNIME Text Processing Feature:
Technical Report The KNIME Text Processing Feature: An Introduction Dr. Killian Thiel Dr. Michael Berthold Killian.Thiel@uni-konstanz.de Michael.Berthold@uni-konstanz.de Copyright 2012 by KNIME.com AG
More informationCReST: ToDo List Last Modified: 29 May 2012
Last Modified: 29 May 2012 This ToDo List documents pending tasks in the development of CReST. Items include relatively minor bug fixes and code refactoring, others outline new functional requirements
More informationWINDOWS PROCESSES AND SERVICES
OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.
More informationA Novel Approach to QoS Monitoring in the Cloud
A Novel Approach to QoS Monitoring in the Cloud 2nd Training on Software Services- Cloud computing - November 11-14 Luigi Sgaglione EPSILON srl luigi.sgaglione@epsilonline.com RoadMap Rationale and Approach
More informationMcAfee Network Security Platform
10/100/1000 Copper Passive Fail-open Bypass Kit Guide Revision C McAfee Network Security Platform The 10/100/1000 passive fail-open ypass kit (the kit) minimizes the potential risks of in-line Network
More informationIntroduction to DISC and Hadoop
Introduction to DISC and Hadoop Alice E. Fischer April 24, 2009 Alice E. Fischer DISC... 1/20 1 2 History Hadoop provides a three-layer paradigm Alice E. Fischer DISC... 2/20 Parallel Computing Past and
More informationTable of Contents. Chapter No. 1 Introduction 1. iii. xiv. xviii. xix. Page No.
Table of Contents Title Declaration by the Candidate Certificate of Supervisor Acknowledgement Abstract List of Figures List of Tables List of Abbreviations Chapter Chapter No. 1 Introduction 1 ii iii
More informationPower efficiency and power management in HP ProLiant servers
Power efficiency and power management in HP ProLiant servers Technology brief Introduction... 2 Built-in power efficiencies in ProLiant servers... 2 Optimizing internal cooling and fan power with Sea of
More informationEMC ApplicationXtender Server
EMC ApplicationXtender Server 6.0 Monitoring Guide P/N 300 008 232 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2009 EMC Corporation. All
More informationOpen source framework for data-flow visual analytic tools for large databases
Open source framework for data-flow visual analytic tools for large databases D5.6 v1.0 WP5 Visual Analytics: D5.6 Open source framework for data flow visual analytic tools for large databases Dissemination
More informationFast Edge Splitting and Edmonds Arborescence Construction for Unweighted Graphs
Fast Edge Splitting and Edmonds Arorescence Construction for Unweighted Graphs Anand Bhalgat Ramesh Hariharan Telikepalli Kavitha Demalya Panigrahi Astract Given an unweighted undirected or directed graph
More informationUniGR Workshop: Big Data «The challenge of visualizing big data»
Dept. ISC Informatics, Systems & Collaboration UniGR Workshop: Big Data «The challenge of visualizing big data» Dr Ir Benoît Otjacques Deputy Scientific Director ISC The Future is Data-based Can we help?
More informationAdditional MBA Information. Business School Faculty of Management Sciences
Additional MBA Information Business School Faculty of Management Sciences MBA Programme Welcome We would like to thank you for your enquiry aout our MBA Program. After sumission of your application, you
More informationDiscretization and grouping: preprocessing steps for Data Mining
Discretization and grouping: preprocessing steps for Data Mining PetrBerka 1 andivanbruha 2 1 LaboratoryofIntelligentSystems Prague University of Economic W. Churchill Sq. 4, Prague CZ 13067, Czech Republic
More informationDiagram of Security. - define the attributes of Diagram of security that make it possible to evaluate security properties of modeled elements,
Diagram of Security Marek Vysoký Department of Computers and Informatics Faculty of Electrical Engineering and Informatics Technical University of Košice Letná 9, 042 00 Košice, Slovakia mvysoky@lundegaard.sk
More informationSocial Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
More informationDATA ANALYSIS IN PUBLIC SOCIAL NETWORKS
International Scientific Conference & International Workshop Present Day Trends of Innovations 2012 28 th 29 th May 2012 Łomża, Poland DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS Lubos Takac 1 Michal Zabovsky
More informationTo get started, you will need the following items Product Key Router with firewall capability Network cables
Quick Start Guide Windows Small Business Server 2011 Standard Installing Your New Server Depending on how your server came from the manufacturer, your set up steps are slightly different. Follow the instructions
More informationGPI Global Address Space Programming Interface
GPI Global Address Space Programming Interface SEPARS Meeting Stuttgart, December 2nd 2010 Dr. Mirko Rahn Fraunhofer ITWM Competence Center for HPC and Visualization 1 GPI Global address space programming
More informationCarlos Villavieja, Nacho Navarro {cvillavi,nacho}@ac.upc.edu. Arati Baliga, Liviu Iftode {aratib,liviu}@cs.rutgers.edu
Continuous Monitoring using MultiCores Carlos Villavieja, Nacho Navarro {cvillavi,nacho}@ac.upc.edu Arati Baliga, Liviu Iftode {aratib,liviu}@cs.rutgers.edu Motivation Intrusion detection Intruder gets
More informationFlowMergeCluster Documentation
FlowMergeCluster Documentation Description: Author: Clustering of flow cytometry data using the FlowMerge algorithm. Josef Spidlen, jspidlen@bccrc.ca Please see the gp-flowcyt-help Google Group (https://groups.google.com/a/broadinstitute.org/forum/#!forum/gpflowcyt-help)
More informationDATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7
DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7 UNDER THE GUIDANCE Dr. N.P. DHAVALE, DGM, INFINET Department SUBMITTED TO INSTITUTE FOR DEVELOPMENT AND RESEARCH IN BANKING TECHNOLOGY
More informationFuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques
Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,
More informationManaging Rack-Mount Servers
Managing Rack-Mount Servers This chapter includes the following sections: Rack-Mount Server Management, page 1 Guidelines for Removing and Decommissioning Rack-Mount Servers, page 2 Booting Rack-Mount
More informationConjugating data mood and tenses: Simple past, infinite present, fast continuous, simpler imperative, conditional future perfect
Matteo Migliavacca (mm53@kent) School of Computing Conjugating data mood and tenses: Simple past, infinite present, fast continuous, simpler imperative, conditional future perfect Simple past - Traditional
More informationWHAT IS A BETTER PREDICTOR OF ACADEMIC SUCCESS IN AN MBA PROGRAM: WORK EXPERIENCE OR THE GMAT?
WHAT IS A BETTER PREDICTOR OF ACADEMIC SUCCESS IN AN MBA PROGRAM: WORK EXPERIENCE OR THE GMAT? Michael H. Deis, School of Business, Clayton State University, Morrow, Georgia 3060, (678)466-4541, MichaelDeis@clayton.edu
More informationWhite Paper FPGA Performance Benchmarking Methodology
White Paper Introduction This paper presents a rigorous methodology for benchmarking the capabilities of an FPGA family. The goal of benchmarking is to compare the results for one FPGA family versus another
More informationL1: Introduction to Hadoop
L1: Introduction to Hadoop Feng Li feng.li@cufe.edu.cn School of Statistics and Mathematics Central University of Finance and Economics Revision: December 1, 2014 Today we are going to learn... 1 General
More informationBringing Big Data Modelling into the Hands of Domain Experts
Bringing Big Data Modelling into the Hands of Domain Experts David Willingham Senior Application Engineer MathWorks david.willingham@mathworks.com.au 2015 The MathWorks, Inc. 1 Data is the sword of the
More informationThe Edge Editions of SAP InfiniteInsight Overview
Analytics Solutions from SAP The Edge Editions of SAP InfiniteInsight Overview Enabling Predictive Insights with Mouse Clicks, Not Computer Code Table of Contents 3 The Case for Predictive Analysis 5 Fast
More informationNetworking Guide. 2008 www.lexmark.com
Networking Guide 2008 www.lexmark.com Contents Installing the printer on a wireless network...5 Wireless network compatiility...5 Information you will need to set up the printer on a wireless network...5
More informationInformation Technology Services will be updating the mark sense test scoring hardware and software on Monday, May 18, 2015. We will continue to score
Information Technology Services will be updating the mark sense test scoring hardware and software on Monday, May 18, 2015. We will continue to score all Spring term exams utilizing the current hardware
More informationWEKA Explorer User Guide for Version 3-4-3
WEKA Explorer User Guide for Version 3-4-3 Richard Kirkby Eibe Frank November 9, 2004 c 2002, 2004 University of Waikato Contents 1 Launching WEKA 2 2 The WEKA Explorer 2 Section Tabs................................
More informationNAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ
What is NAND Flash? What is the major difference between NAND Flash and other Memory? Structural differences between NAND Flash and NOR Flash What does NAND Flash controller do? How to send command to
More informationKEYWORD SEARCH IN RELATIONAL DATABASES
KEYWORD SEARCH IN RELATIONAL DATABASES N.Divya Bharathi 1 1 PG Scholar, Department of Computer Science and Engineering, ABSTRACT Adhiyamaan College of Engineering, Hosur, (India). Data mining refers to
More informationParallels Containers for Windows 6.0
Parallels Containers for Windows 6.0 Upgrade Guide June 11, 2014 Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen
More informationUnderstanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
More informationAutomating with STEP7 in LAD and FBD
bisk Automating with STEP7 in LAD and FBD Programmable Controllers SIMATIC S7-300/400 by Hans Berger Publicis MCD Verlag Contents Indroduction 19 1 SIMATIC S7-300/400 Programmable Controller... 20 1.1
More informationIn this tutorial, we try to build a roc curve from a logistic regression.
Subject In this tutorial, we try to build a roc curve from a logistic regression. Regardless the software we used, even for commercial software, we have to prepare the following steps when we want build
More informationBeam Loss Monitor Software Guide
Version 1.0 Beam Loss Monitor Software Guide James Leaver 5th December 2008 1 Operating Procedure In order to run the Beam Loss Monitor software, the user should complete the following steps: 1. Open a
More informationManual Spamfilter Version: 1.1 Date: 20-02-2014
Manual Spamfilter Version: 1.1 Date: 20-02-2014 Table of contents Introduction... 2 Quick guide... 3 Quarantine reports...3 What to do if a message is blocked inadvertently...4 What to do if a spam has
More informationMODEL BASED TESTING OF WEBSITE
MODEL BASED TESTING OF WEBSITE Sumit Machra 1 and Narendra Khatri 2 1 Department of Computer Engineering, Jodhpur National University, Jodhpur, Rajasthan, India-342001 2 Department of Electronics & Communication
More informationThe Math in Laser Light Math
The Math in Laser Light Math When graphed, many mathematical curves are eautiful to view. These curves are usually rought into graphic form y incorporating such devices as a plotter, printer, video screen,
More informationOn some Potential Research Contributions to the Multi-Core Enterprise
On some Potential Research Contributions to the Multi-Core Enterprise Oded Maler CNRS - VERIMAG Grenoble, France February 2009 Background This presentation is based on observations made in the Athole project
More informationPostgreSQL Business Intelligence & Performance Simon Riggs CTO, 2ndQuadrant PostgreSQL Major Contributor
PostgreSQL Business Intelligence & Performance Simon Riggs CTO, 2ndQuadrant PostgreSQL Major Contributor The research leading to these results has received funding from the European Union's Seventh Framework
More informationIntroduction to Apache Pig Indexing and Search
Large-scale Information Processing, Summer 2014 Introduction to Apache Pig Indexing and Search Emmanouil Tzouridis Knowledge Mining & Assessment Includes slides from Ulf Brefeld: LSIP 2013 Organizational
More informationCOMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction
COMP3420: Advanced Databases and Data Mining Classification and prediction: Introduction and Decision Tree Induction Lecture outline Classification versus prediction Classification A two step process Supervised
More informationA Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery
A Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery Runu Rathi, Diane J. Cook, Lawrence B. Holder Department of Computer Science and Engineering The University of Texas at Arlington
More informationChapter 8 Software Testing
Chapter 8 Software Testing Summary 1 Topics covered Development testing Test-driven development Release testing User testing 2 Program testing Testing is intended to show that a program does what it is
More informationAdvanced compiler construction. General course information. Teacher & assistant. Course goals. Evaluation. Grading scheme. Michel Schinz 2007 03 16
Advanced compiler construction Michel Schinz 2007 03 16 General course information Teacher & assistant Course goals Teacher: Michel Schinz Michel.Schinz@epfl.ch Assistant: Iulian Dragos INR 321, 368 64
More information