Lokalisieren von Defekten in Software mit Hilfe von Data Mining

Size: px
Start display at page:

Download "Lokalisieren von Defekten in Software mit Hilfe von Data Mining"

Transcription

1 Lokalisieren von Defekten in Software mit Hilfe von Data Mining Klemens Böhm NAME INSTITUTE OF INSTITUTE, FOR FACULTY, PROGRAMME DEPARTMENT STRUCTURES (change AND DATA masterorganisation view) (IPD) Please insert a figure in the master transparency. KIT University of the State of Baden-Wuerttemerg and Photo: Stadt Karlsruhe National Research Center of the Helmholtz Association KIT University of the State of Baden-Wuerttemerg and National Laoratory of the Helmholtz Association

2 A prolem has een detected and windows has een shut down to rpevent damage to your computer. Please click on to add your Title DRIVER_IRQL_NOT_LESS_OR_EQUAL Please click on to add your Title If this is the first time you`ve seen this stop error screen, restart your computer, If this screen appears again, follow these steps: Check to make sure any new hardware or software is properly installed. If this is a new installation, ask your hardware or software manufacturer for any windows updates you might need. If prolems continue, disale or remove any newly installed hardware or software. Disale BIOS memory options such as caching or shadowing. If NAME you OF need INSTITUTE, to use FACULTY, safe DEPARTMENT Mode to (change remove master or view) disale components, restart your computer, press F8 to select Advanced Startup Options, and then Select Safe Mode. Technical information: Please insert a figure in the master transparency. *** STOP: 0x000000D1 (0x C, 0x , 0x , 0xF86B5A89) *** gv3.sys Adress F86B5A89 ase at F86B5000, DateStam 3dd991e Beginning dump of physical memory Physical memory dump complete. Contact your system administrator or technical support group for further assistance KIT University of the State Prof. Baden-Wuerttemerg Max Mustermannand - Title National Research Center of the Helmholtz Association

3 Locating Bugs in Software Software is almost never shipped ug-free, even if tested extensively. Deugging is time consuming and expensive. Automated localisation would e of great help. Idea: Locate ugs with data mining techniques. Use an approach ased on weighted graph mining. 3Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 1/25

4 Outline 1. Motivation 2. Call Graphs 3. Defect Localization 4. Dataflow-Enaled Defect Localization 5. Evaluation 6. Conclusions 4Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 2/25

5 Call Graphs Program executions as call graphs: methods nodes method calls edges a c 5Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 3/25

6 Call Graphs Program executions as call graphs: methods nodes method calls edges a Bugs in the call graph: Structure affecting (existing approaches) E.g., a ug in an if-condition in a c 6Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 4/25

7 Call Graphs Program executions as call graphs: methods nodes method calls edges a Bugs in the call graph: Structure affecting (existing approaches) E.g., a ug in an if-condition in a c Call frequency affecting (new in our contriution) E.g., a ug in a loop-condition in c 7Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 5/25

8 Reduction of Call Graphs printout showdelete showdelete showsame showinsert showdelete showsame showinsert showinsert showinsert showdelete showdelete showdelete showsame showsymol showsymol printin showsymol printin showsymol printin showsymol showsymol showsymol printin showsymol showsymol showsymol Millions of method calls are very common. Reduction of call graphs is necessary. a a c 1 1 c 3 Example of reduced call graph. Weights have not een used in previous reductions. 8Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 6/25

9 Outline 1. Motivation 2. Call Graphs 3. Defect Localization 4. Dataflow-Enaled Defect Localization 5. Evaluation 6. Conclusions 9Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 2/25

10 How to Use Call Graphs? Existing idea: Look at program executions (correct ones as well as failing ones) represented as call graphs and analyse the graph structure (i.e., graphs without weights). Identify patterns typical of failing executions. Frequent sugraph mining. In a nutshell, this gives way to finding structure-affecting ugs. New aspect: Explicitly analyse call frequencies (edge weights) esides graph structures. 10 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 7/25

11 Weighted Graph Mining No algorithm availale for weighted graph mining (as well as no prolem formulation). How to make use of edge weights? Preprocessing Discretisation of weights (We are currently investigating this.) Postprocessing (our approach already studied and presented susequently) Graph mining without weights Susequent detailed analysis of weights 11 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 8/25

12 Finding Discriminating Edge Weights (1) Apply frequent sugraph mining to reduced call graphs of correct and failing program executions (ignore the weights in this step) (2) Consider only sugraphs occurring in oth correct and failing executions (3) Analyse the edge weights Example graph found y frequent sugraph mining: a c Average weight of a c in correct executions: 1 Average weight of a c in failing executions: 1 Average weight of c in correct executions: 3 Average weight of c in failing executions: Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 9/25

13 Finding Discriminating Edge Weights (1) Apply frequent sugraph mining to reduced call graphs of correct and failing program executions (ignore the weights in this step) (2) Consider only sugraphs occurring in oth correct and failing executions (3) Analyse the edge weights Example graph found y frequent sugraph mining: a c Average weight of a c in correct executions: 1 Average weight of a c in failing executions: 1 Average weight of c in correct executions: 3 Average weight of c in failing executions: Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 10/25

14 Entropy Based Scoring Assemle a tale which contains every edge in every frequent sugraph: a c a SG 1 SG 2 SG 1 SG 1 SG 2 a c c a Class Execution failing Execution correct Application of the Information Gain feature-selection algorithm, ased on entropy. Result: Ranking of the columns (edges) 14 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 11/25

15 Integration of Structural Evidence reduced call graphs in failing and correct frequent sugraph mining (not considering weights) in failing only entropy ased scoring (ased on edge weights) structural scoring (ased on support) comination comined method ranking 15 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 12/25

16 Integration of Structural Evidence reduced call graphs in failing and correct frequent sugraph mining (not considering weights) in failing only entropy ased scoring (ased on edge weights) structural scoring (ased on support) comination comined method ranking 16 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 13/25

17 Integration of Structural Evidence in failing and correct entropy ased scoring (ased on edge weights) reduced call graphs frequent sugraph mining (not considering weights) in failing only structural scoring (ased on support) Usage of two kinds of evidence: frequency (left) and structure (right) Both types of ugs canelocated: call frequency and structure affecting ones comination comined method ranking 17 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 14/25

18 Results Example output: METHOD SCORE 1 inputscan() showinsert() showdelete() oldconsume() addsymol() Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 15/25

19 Results Example output: METHOD SCORE 1 inputscan() showinsert() showdelete() oldconsume() addsymol() The ug has een instrumented in showinsert(). A software developer has to check two methods only. We do not try to explain/fix ugs, just to locate them! 19 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 16/25

20 Outline 1. Motivation 2. Call Graphs 3. Defect Localization 4. Dataflow-Enaled Defect Localization 5. Evaluation 6. Conclusions 20 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 2/25

21 Challenge: Dataflow-Affecting Bugs Not all defects affect the call graph. Example (failing execution): voidmain() void a () void () 1 int c(12, 33) 1. Method calls c(12, 33). 2. Method c calculates a wrong return value Method prints value 8. Graph structure and weights remain unaffected. Call-graph mining cannot find the defect. Approach: Extend call graphs with dataflow information and analyse these extended graphs. 21 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 17/25

22 Dataflow Information Availale Example dataflows (parameter and return values) of int c(int p1, int p2) from : In real executions, one method can e called million times. To deal with this data, we need to aggregate it. 22 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 18/25

23 Our Approach: Discretisation with CAIM CAIM (class-attriute interdependence maximization) class-aware (correct, failing) parameter-free, i.e., it automatically determines a possily small numer of intervals, homogeneous wrt. the class (a) Exemplar call data. Exec. p1 p2 r class correct correct correct failing failing failing failing correct correct () Intervals generated. Value Intervals p1 i 1 : [1; 11.5] i 2 : (11.5; 23] p2 i 1 : [2; 13.5] i 2 : (13.5; 38] i 3 : (38; 47] r i 1 : [5; 8.5] i 2 : (8.5; 13] (c) Discretised data. Exec. p1 p2 r 1 i 1 i 3 i 2 1 i 1 i 3 i 2 1 i 1 i 1 i 2 2 i 2 i 2 i 1 3 i 2 i 2 i 1 3 i 2 i 2 i 1 3 i 2 i 2 i 1 4 i 1 i 1 i 2 4 i 1 i 3 i 2 23 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 19/25

24 Dataflow-Enaled Call Graphs (DEC Graphs) How to represent discretised dataflow data in call graphs? Attach tuples of weights (i.e., counters) to edges: (t; p i 1 1 ; ; p i n1 1 ; ; p i 1 m ; ; p i nm m ; r i 1 ;...; r i nr ) - t: total numer of calls (as efore) - p 1 ; ; p m ; r: parameter values and return value - i 1 ; ; i n x : intervals of the parameter/return values 52 voidmain() void a () 4 2 void () 1,0,1,0,1,0,1, 0 int c(int p1, int p2) Exec. p1 p2 r 1 i 1 i 3 i 2 1 i 1 i 3 i 2 1 i 1 i 1 i 2 2 i 2 i 2 i 1 3 i 2 i 2 i 1 3 i 2 i 2 i 1 3 i 2 i 2 i 1 4 i 1 i 1 i 2 4 i 1 i 3 i 2 Example call c: (t; p i 1 1 ; p i 2 1 ; p i 1 2 ; p i 2 2 ; p i 3 2 ; r i 1 ; r i 2 ) 24 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 20/25

25 Defect Localisation with DEC Graphs 1. Assemle classified DEC graphs for all executions. 2. Perform frequent sugraph mining (CloseGraph). We use sugraphs as contexts to detect defects that occur in certain situations only. 3. Assemle a feature tale with all tuple elements from all edges in all frequent sugraphs separately: 4. Derive a ranking of the columns (and thus the methods) with entropy-ased feature selection (GainRatio). Various optimisations. 25 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 21/25

26 Outline 1. Motivation 2. Call Graphs 3. Defect Localization 4. Dataflow-Enaled Defect Localization 5. Evaluation 6. Conclusions 26 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 2/25

27 Evaluation of Defect Localisation with DEC Graphs A data-centric application: Weka (class DecisionStump) 16 instrumented defects, similar to related evaluations. Most dataflow-affecting ugs indirectly affect the call graph. 90 executions of every version with UCI data The result tale contains the ranking position, i.e., numer of methods one has to inspect to find a defect: With improvements only 1.5 methods on average (out of 30 actually executed methods). 27 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 23/25

28 Conclusions A domain-specific data-mining prolem: software-defect localisation Contriutions: A domain and prolem-specific data representation: DEC graphs (discretisation) An analysis process for DEC graphs (sugraph mining, feature selection) Localization of dataflow-affecting ugs esides other ug classes Future improvements: Dataflows through gloal variales Scalale analysis of large software projects Parallel programs 28 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 24/25

29 Acknowledgements Thanks to Frank Eichinger for letting me use his slides. 29 Motivation Klemens Böhm Lokalisieren von Defekten in Software mit Hilfe von Data Mining 25/25

Scalable Software-Defect Localisation by Hierarchical Mining of Dynamic Call Graphs

Scalable Software-Defect Localisation by Hierarchical Mining of Dynamic Call Graphs Scalable Software-Defect Localisation by Hierarchical Mining of Dynamic Call Graphs Frank Eichinger Christopher Oßner Klemens Böhm Abstract The localisation of defects in computer programmes is essential

More information

Graph Mining and Social Network Analysis

Graph Mining and Social Network Analysis Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann

More information

Real-time Targeted Influence Maximization for Online Advertisements

Real-time Targeted Influence Maximization for Online Advertisements Real-time Targeted Influence Maximization for Online Advertisements Yuchen Li Dongxiang Zhang ian-lee Tan Department of Computer Science School of Computing, National University of Singapore {liyuchen,zhangdo,tankl}@comp.nus.edu.sg

More information

Hardware- and Network-Enhanced Software Systems for Cloud Computing

Hardware- and Network-Enhanced Software Systems for Cloud Computing The HARNESS Project: Hardware- and Network-Enhanced Software Systems for Cloud Computing Prof. Alexander Wolf Imperial College London (Project Coordinator) Cloud Market Strata SaaS Software as a Service

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

Hands-On Microsoft Windows Server 2008

Hands-On Microsoft Windows Server 2008 Hands-On Microsoft Windows Server 2008 Chapter 9 Server and Network Monitoring Objectives Understand the importance of server monitoring Monitor server services and solve problems with services Use Task

More information

Handout for three day Learning Curve Workshop

Handout for three day Learning Curve Workshop Handout for three day Learning Curve Workshop Unit and Cumulative Average Formulations DAUMW (Credits to Professors Steve Malashevitz, Bo Williams, and prior faculty. Blame to Dr. Roland Kankey, roland.kankey@dau.mil)

More information

COC131 Data Mining - Clustering

COC131 Data Mining - Clustering COC131 Data Mining - Clustering Martin D. Sykora m.d.sykora@lboro.ac.uk Tutorial 05, Friday 20th March 2009 1. Fire up Weka (Waikako Environment for Knowledge Analysis) software, launch the explorer window

More information

Localizing Defects in Multithreaded Programs by Mining Dynamic Call Graphs

Localizing Defects in Multithreaded Programs by Mining Dynamic Call Graphs Localizing Defects in Multithreaded Programs by Mining Dynamic Call Graphs Frank Eichinger, Victor Pankratius, Philipp W. L. Große, and Klemens Böhm Karlsruhe Institute of Technology (KIT), Germany, {eichinger,

More information

Data Mining Classification: Decision Trees

Data Mining Classification: Decision Trees Data Mining Classification: Decision Trees Classification Decision Trees: what they are and how they work Hunt s (TDIDT) algorithm How to select the best split How to handle Inconsistent data Continuous

More information

Tech Tip: Understanding Server Memory Counters

Tech Tip: Understanding Server Memory Counters Tech Tip: Understanding Server Memory Counters Written by Bill Bach, President of Goldstar Software Inc. This tech tip is the second in a series of tips designed to help you understand the way that your

More information

Didacticiel Études de cas. Association Rules mining with Tanagra, R (arules package), Orange, RapidMiner, Knime and Weka.

Didacticiel Études de cas. Association Rules mining with Tanagra, R (arules package), Orange, RapidMiner, Knime and Weka. 1 Subject Association Rules mining with Tanagra, R (arules package), Orange, RapidMiner, Knime and Weka. This document extends a previous tutorial dedicated to the comparison of various implementations

More information

Web Document Clustering

Web Document Clustering Web Document Clustering Lab Project based on the MDL clustering suite http://www.cs.ccsu.edu/~markov/mdlclustering/ Zdravko Markov Computer Science Department Central Connecticut State University New Britain,

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1 Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1 Software Release Notes May 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation 2 New features

More information

Definiens XD 1.2.1. Release Notes

Definiens XD 1.2.1. Release Notes Definiens XD 1.2.1 Release Notes Imprint and Version Document Version Copyright 2010 Definiens AG. All rights reserved. This document may be copied and printed only in accordance with the terms of the

More information

Schedule Risk Analysis Simulator using Beta Distribution

Schedule Risk Analysis Simulator using Beta Distribution Schedule Risk Analysis Simulator using Beta Distribution Isha Sharma Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana (INDIA) ishasharma211@yahoo.com Dr. P.K.

More information

QoS Provisioning in Mobile Internet Environment

QoS Provisioning in Mobile Internet Environment QoS Provisioning in Moile Internet Environment Salem Lepaja (salem.lepaja@tuwien.ac.at), Reinhard Fleck, Nguyen Nam Hoang Vienna University of Technology, Institute of Communication Networks, Favoritenstrasse

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0

Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0 Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0 Software Release Notes May 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation 1 New features

More information

Definiens. Enterprise Image Intelligence Suite 7.0.10. Release Notes. www.definiens.com

Definiens. Enterprise Image Intelligence Suite 7.0.10. Release Notes. www.definiens.com Definiens Enterprise Image Intelligence Suite 7.0.10 Release Notes www.definiens.com Imprint and Version Document Version 7.0.10 Copyright 2010 Definiens AG. All rights reserved. This document may be copied

More information

Analysis report examination with CUBE

Analysis report examination with CUBE Analysis report examination with CUBE Brian Wylie Jülich Supercomputing Centre CUBE Parallel program analysis report exploration tools Libraries for XML report reading & writing Algebra utilities for report

More information

Data Mining III: Numeric Estimation

Data Mining III: Numeric Estimation Data Mining III: Numeric Estimation Computer Science 105 Boston University David G. Sullivan, Ph.D. Review: Numeric Estimation Numeric estimation is like classification learning. it involves learning a

More information

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. HUAWEI OceanStor 9000 Load Balancing Technical Issue 01 Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be

More information

CFD analysis for road vehicles - case study

CFD analysis for road vehicles - case study CFD analysis for road vehicles - case study Dan BARBUT*,1, Eugen Mihai NEGRUS 1 *Corresponding author *,1 POLITEHNICA University of Bucharest, Faculty of Transport, Splaiul Independentei 313, 060042, Bucharest,

More information

Binary Bug - Automatic Binary Trading

Binary Bug - Automatic Binary Trading Binary Bug - Automatic Binary Trading Binary Bug specializes in the development of trading algorithms and trade execution technology. Our set of analytical tools, statistical models and complex algorithms

More information

Commissioning IDENTControl Compact IC-KP2-2HB17-2V1D Profinet Protocol with a Siemens S7 PLC

Commissioning IDENTControl Compact IC-KP2-2HB17-2V1D Profinet Protocol with a Siemens S7 PLC Commissioning IDENTControl Compact IC-KP2-2HB17-2V1D Profinet Protocol with a Siemens S7 PLC Seite 1 von 19 Index of contents 1. Adjustment of communication parameter with web interface...3 2. Installation

More information

Back Propagation Neural Networks User Manual

Back Propagation Neural Networks User Manual Back Propagation Neural Networks User Manual Author: Lukáš Civín Library: BP_network.dll Runnable class: NeuralNetStart Document: Back Propagation Neural Networks Page 1/28 Content: 1 INTRODUCTION TO BACK-PROPAGATION

More information

Optimizing Generation of Object Graphs in Java PathFinder

Optimizing Generation of Object Graphs in Java PathFinder Optimizing Generation of Object Graphs in Java PathFinder Milos Gligoric, Tihomir Gvero, Steven Lauterburg, Darko Marinov, Sarfraz Khurshid JPF Workshop 1.5.8 Bugs Six Decades Ago 1947: Harvard Mark II

More information

(COMPANY LOGO) CGMP COMPUTERIZED SYSTEM VENDOR AUDIT QUESTIONNAIRE

(COMPANY LOGO) CGMP COMPUTERIZED SYSTEM VENDOR AUDIT QUESTIONNAIRE 1. GENERAL COMPANY INFORMATION (COMPANY LOGO) 1.1 Name Address Years in Business Number of Employees Services Performed or Products Manufactured Prior Experience with (Company Name) 1.2 Please provide

More information

Shutting down / Rebooting Small Business Server 2003 Version 1.00

Shutting down / Rebooting Small Business Server 2003 Version 1.00 Shutting down / Rebooting Small Business Server 2003 Version 1.00 Need to Know TM It may be necessary at some stage of the life of Small Business Server 2003 that it be shutdown or rebooted. In many cases

More information

Statistical Data analysis With Excel For HSMG.632 students

Statistical Data analysis With Excel For HSMG.632 students 1 Statistical Data analysis With Excel For HSMG.632 students Dialog Boxes Descriptive Statistics with Excel To find a single descriptive value of a data set such as mean, median, mode or the standard deviation,

More information

SQL Server Replication Guide

SQL Server Replication Guide SQL Server Replication Guide Rev: 2013-08-08 Sitecore CMS 6.3 and Later SQL Server Replication Guide Table of Contents Chapter 1 SQL Server Replication Guide... 3 1.1 SQL Server Replication Overview...

More information

Minimizing Probing Cost and Achieving Identifiability in Network Link Monitoring

Minimizing Probing Cost and Achieving Identifiability in Network Link Monitoring Minimizing Proing Cost and Achieving Identifiaility in Network Link Monitoring Qiang Zheng and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University E-mail: {quz3,

More information

Motivation: Smartphone Market

Motivation: Smartphone Market Motivation: Smartphone Market Smartphone Systems External Display Device Display Smartphone Systems Smartphone-like system Main Camera Front-facing Camera Central Processing Unit Device Display Graphics

More information

Lustre tools for ldiskfs investigation and lightweight I/O statistics

Lustre tools for ldiskfs investigation and lightweight I/O statistics Lustre tools for ldiskfs investigation and lightweight I/O statistics Roland Laifer STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State Roland of Baden-Württemberg Laifer Lustre and tools

More information

This presentation explains how to monitor memory consumption of DataStage processes during run time.

This presentation explains how to monitor memory consumption of DataStage processes during run time. This presentation explains how to monitor memory consumption of DataStage processes during run time. Page 1 of 9 The objectives of this presentation are to explain why and when it is useful to monitor

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Microsoft SQL Server OLTP Best Practice

Microsoft SQL Server OLTP Best Practice Microsoft SQL Server OLTP Best Practice The document Introduction to Transactional (OLTP) Load Testing for all Databases provides a general overview on the HammerDB OLTP workload and the document Microsoft

More information

T-61.6010 Non-discriminatory Machine Learning

T-61.6010 Non-discriminatory Machine Learning T-61.6010 Non-discriminatory Machine Learning Seminar 1 Indrė Žliobaitė Aalto University School of Science, Department of Computer Science Helsinki Institute for Information Technology (HIIT) University

More information

TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM

TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM TOWARDS SIMPLE, EASY TO UNDERSTAND, AN INTERACTIVE DECISION TREE ALGORITHM Thanh-Nghi Do College of Information Technology, Cantho University 1 Ly Tu Trong Street, Ninh Kieu District Cantho City, Vietnam

More information

Best practices for efficient HPC performance with large models

Best practices for efficient HPC performance with large models Best practices for efficient HPC performance with large models Dr. Hößl Bernhard, CADFEM (Austria) GmbH PRACE Autumn School 2013 - Industry Oriented HPC Simulations, September 21-27, University of Ljubljana,

More information

ABAP SQL Monitor Implementation Guide and Best Practices

ABAP SQL Monitor Implementation Guide and Best Practices ABAP SQL Monitor Implementation Guide and Best Practices TABLE OF CONTENTS ABAP SQL Monitor - What is it and why do I need it?... 3 When is it available and what are the technical requirements?... 5 In

More information

All-in-One Asset Management Tool

All-in-One Asset Management Tool APEX-RU0781 All-in-One Asset Management Tool Final Report October 2012 Submitted by Mansooreh Mollaghasemi, Ph.D. Chairman and CEO Productivity Apex, Inc 3505 Lake Lynda Drive, Suite 206 Orlando, FL 32817

More information

Customer Relationship Management by Semi-Supervised Learning

Customer Relationship Management by Semi-Supervised Learning Middle-East Journal of Scientific Research 16 (5): 614-620, 2013 ISSN 1990-9233 IDOSI Pulications, 2013 DOI: 10.5829/idosi.mejsr.2013.16.05.930 Customer Relationship Management y Semi-Supervised Learning

More information

GridKa site report. Manfred Alef, Andreas Heiss, Jos van Wezel. www.kit.edu. Steinbuch Centre for Computing

GridKa site report. Manfred Alef, Andreas Heiss, Jos van Wezel. www.kit.edu. Steinbuch Centre for Computing GridKa site report Manfred Alef, Andreas Heiss, Jos van Wezel Steinbuch Centre for Computing KIT The cooperation of and Universität Karlsruhe (TH) www.kit.edu KIT? SCC? { = University ComputingCentre +

More information

STATISTICA. Financial Institutions. Case Study: Credit Scoring. and

STATISTICA. Financial Institutions. Case Study: Credit Scoring. and Financial Institutions and STATISTICA Case Study: Credit Scoring STATISTICA Solutions for Business Intelligence, Data Mining, Quality Control, and Web-based Analytics Table of Contents INTRODUCTION: WHAT

More information

Big Data Mining Services and Knowledge Discovery Applications on Clouds

Big Data Mining Services and Knowledge Discovery Applications on Clouds Big Data Mining Services and Knowledge Discovery Applications on Clouds Domenico Talia DIMES, Università della Calabria & DtoK Lab Italy talia@dimes.unical.it Data Availability or Data Deluge? Some decades

More information

Load balancing in SOAJA (Service Oriented Java Adaptive Applications)

Load balancing in SOAJA (Service Oriented Java Adaptive Applications) Load balancing in SOAJA (Service Oriented Java Adaptive Applications) Richard Olejnik Université des Sciences et Technologies de Lille Laboratoire d Informatique Fondamentale de Lille (LIFL UMR CNRS 8022)

More information

Serendipity: Enabling Remote Computing among Intermittently Connected Mobile Devices

Serendipity: Enabling Remote Computing among Intermittently Connected Mobile Devices Serendipity: Enaling Remote Computing among Intermittently Connected Moile Devices Cong Shi*, Vasileios Lakafosis, Mostafa H. Ammar*, Ellen W. Zegura* *School of Computer Science School of Electrical and

More information

1) This is one recommended way of setting the TaskBar to keep it out of the way of the main application window and yet still easily accessible.

1) This is one recommended way of setting the TaskBar to keep it out of the way of the main application window and yet still easily accessible. Windows XP Tweaks (Suggestions From RML Labs For Better SAC, SAWStudio and overall Windows Performance) (Follow any or all of these at your own discretion) 1) This is one recommended way of setting the

More information

WebSphere Commerce V7 Feature Pack 3

WebSphere Commerce V7 Feature Pack 3 WebSphere Commerce V7 Feature Pack 3 Precision marketing updates 2011 IBM Corporation WebSphere Commerce V7 Feature Pack 3 includes some precision marketing updates. There is a new trigger, Customer Checks

More information

Technical Report. The KNIME Text Processing Feature:

Technical Report. The KNIME Text Processing Feature: Technical Report The KNIME Text Processing Feature: An Introduction Dr. Killian Thiel Dr. Michael Berthold Killian.Thiel@uni-konstanz.de Michael.Berthold@uni-konstanz.de Copyright 2012 by KNIME.com AG

More information

CReST: ToDo List Last Modified: 29 May 2012

CReST: ToDo List Last Modified: 29 May 2012 Last Modified: 29 May 2012 This ToDo List documents pending tasks in the development of CReST. Items include relatively minor bug fixes and code refactoring, others outline new functional requirements

More information

WINDOWS PROCESSES AND SERVICES

WINDOWS PROCESSES AND SERVICES OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.

More information

A Novel Approach to QoS Monitoring in the Cloud

A Novel Approach to QoS Monitoring in the Cloud A Novel Approach to QoS Monitoring in the Cloud 2nd Training on Software Services- Cloud computing - November 11-14 Luigi Sgaglione EPSILON srl luigi.sgaglione@epsilonline.com RoadMap Rationale and Approach

More information

McAfee Network Security Platform

McAfee Network Security Platform 10/100/1000 Copper Passive Fail-open Bypass Kit Guide Revision C McAfee Network Security Platform The 10/100/1000 passive fail-open ypass kit (the kit) minimizes the potential risks of in-line Network

More information

Introduction to DISC and Hadoop

Introduction to DISC and Hadoop Introduction to DISC and Hadoop Alice E. Fischer April 24, 2009 Alice E. Fischer DISC... 1/20 1 2 History Hadoop provides a three-layer paradigm Alice E. Fischer DISC... 2/20 Parallel Computing Past and

More information

Table of Contents. Chapter No. 1 Introduction 1. iii. xiv. xviii. xix. Page No.

Table of Contents. Chapter No. 1 Introduction 1. iii. xiv. xviii. xix. Page No. Table of Contents Title Declaration by the Candidate Certificate of Supervisor Acknowledgement Abstract List of Figures List of Tables List of Abbreviations Chapter Chapter No. 1 Introduction 1 ii iii

More information

Power efficiency and power management in HP ProLiant servers

Power efficiency and power management in HP ProLiant servers Power efficiency and power management in HP ProLiant servers Technology brief Introduction... 2 Built-in power efficiencies in ProLiant servers... 2 Optimizing internal cooling and fan power with Sea of

More information

EMC ApplicationXtender Server

EMC ApplicationXtender Server EMC ApplicationXtender Server 6.0 Monitoring Guide P/N 300 008 232 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2009 EMC Corporation. All

More information

Open source framework for data-flow visual analytic tools for large databases

Open source framework for data-flow visual analytic tools for large databases Open source framework for data-flow visual analytic tools for large databases D5.6 v1.0 WP5 Visual Analytics: D5.6 Open source framework for data flow visual analytic tools for large databases Dissemination

More information

Fast Edge Splitting and Edmonds Arborescence Construction for Unweighted Graphs

Fast Edge Splitting and Edmonds Arborescence Construction for Unweighted Graphs Fast Edge Splitting and Edmonds Arorescence Construction for Unweighted Graphs Anand Bhalgat Ramesh Hariharan Telikepalli Kavitha Demalya Panigrahi Astract Given an unweighted undirected or directed graph

More information

UniGR Workshop: Big Data «The challenge of visualizing big data»

UniGR Workshop: Big Data «The challenge of visualizing big data» Dept. ISC Informatics, Systems & Collaboration UniGR Workshop: Big Data «The challenge of visualizing big data» Dr Ir Benoît Otjacques Deputy Scientific Director ISC The Future is Data-based Can we help?

More information

Additional MBA Information. Business School Faculty of Management Sciences

Additional MBA Information. Business School Faculty of Management Sciences Additional MBA Information Business School Faculty of Management Sciences MBA Programme Welcome We would like to thank you for your enquiry aout our MBA Program. After sumission of your application, you

More information

Discretization and grouping: preprocessing steps for Data Mining

Discretization and grouping: preprocessing steps for Data Mining Discretization and grouping: preprocessing steps for Data Mining PetrBerka 1 andivanbruha 2 1 LaboratoryofIntelligentSystems Prague University of Economic W. Churchill Sq. 4, Prague CZ 13067, Czech Republic

More information

Diagram of Security. - define the attributes of Diagram of security that make it possible to evaluate security properties of modeled elements,

Diagram of Security. - define the attributes of Diagram of security that make it possible to evaluate security properties of modeled elements, Diagram of Security Marek Vysoký Department of Computers and Informatics Faculty of Electrical Engineering and Informatics Technical University of Košice Letná 9, 042 00 Košice, Slovakia mvysoky@lundegaard.sk

More information

Social Media Mining. Data Mining Essentials

Social Media Mining. Data Mining Essentials Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers

More information

DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS

DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS International Scientific Conference & International Workshop Present Day Trends of Innovations 2012 28 th 29 th May 2012 Łomża, Poland DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS Lubos Takac 1 Michal Zabovsky

More information

To get started, you will need the following items Product Key Router with firewall capability Network cables

To get started, you will need the following items Product Key Router with firewall capability Network cables Quick Start Guide Windows Small Business Server 2011 Standard Installing Your New Server Depending on how your server came from the manufacturer, your set up steps are slightly different. Follow the instructions

More information

GPI Global Address Space Programming Interface

GPI Global Address Space Programming Interface GPI Global Address Space Programming Interface SEPARS Meeting Stuttgart, December 2nd 2010 Dr. Mirko Rahn Fraunhofer ITWM Competence Center for HPC and Visualization 1 GPI Global address space programming

More information

Carlos Villavieja, Nacho Navarro {cvillavi,nacho}@ac.upc.edu. Arati Baliga, Liviu Iftode {aratib,liviu}@cs.rutgers.edu

Carlos Villavieja, Nacho Navarro {cvillavi,nacho}@ac.upc.edu. Arati Baliga, Liviu Iftode {aratib,liviu}@cs.rutgers.edu Continuous Monitoring using MultiCores Carlos Villavieja, Nacho Navarro {cvillavi,nacho}@ac.upc.edu Arati Baliga, Liviu Iftode {aratib,liviu}@cs.rutgers.edu Motivation Intrusion detection Intruder gets

More information

FlowMergeCluster Documentation

FlowMergeCluster Documentation FlowMergeCluster Documentation Description: Author: Clustering of flow cytometry data using the FlowMerge algorithm. Josef Spidlen, jspidlen@bccrc.ca Please see the gp-flowcyt-help Google Group (https://groups.google.com/a/broadinstitute.org/forum/#!forum/gpflowcyt-help)

More information

DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7

DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7 DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7 UNDER THE GUIDANCE Dr. N.P. DHAVALE, DGM, INFINET Department SUBMITTED TO INSTITUTE FOR DEVELOPMENT AND RESEARCH IN BANKING TECHNOLOGY

More information

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,

More information

Managing Rack-Mount Servers

Managing Rack-Mount Servers Managing Rack-Mount Servers This chapter includes the following sections: Rack-Mount Server Management, page 1 Guidelines for Removing and Decommissioning Rack-Mount Servers, page 2 Booting Rack-Mount

More information

Conjugating data mood and tenses: Simple past, infinite present, fast continuous, simpler imperative, conditional future perfect

Conjugating data mood and tenses: Simple past, infinite present, fast continuous, simpler imperative, conditional future perfect Matteo Migliavacca (mm53@kent) School of Computing Conjugating data mood and tenses: Simple past, infinite present, fast continuous, simpler imperative, conditional future perfect Simple past - Traditional

More information

WHAT IS A BETTER PREDICTOR OF ACADEMIC SUCCESS IN AN MBA PROGRAM: WORK EXPERIENCE OR THE GMAT?

WHAT IS A BETTER PREDICTOR OF ACADEMIC SUCCESS IN AN MBA PROGRAM: WORK EXPERIENCE OR THE GMAT? WHAT IS A BETTER PREDICTOR OF ACADEMIC SUCCESS IN AN MBA PROGRAM: WORK EXPERIENCE OR THE GMAT? Michael H. Deis, School of Business, Clayton State University, Morrow, Georgia 3060, (678)466-4541, MichaelDeis@clayton.edu

More information

White Paper FPGA Performance Benchmarking Methodology

White Paper FPGA Performance Benchmarking Methodology White Paper Introduction This paper presents a rigorous methodology for benchmarking the capabilities of an FPGA family. The goal of benchmarking is to compare the results for one FPGA family versus another

More information

L1: Introduction to Hadoop

L1: Introduction to Hadoop L1: Introduction to Hadoop Feng Li feng.li@cufe.edu.cn School of Statistics and Mathematics Central University of Finance and Economics Revision: December 1, 2014 Today we are going to learn... 1 General

More information

Bringing Big Data Modelling into the Hands of Domain Experts

Bringing Big Data Modelling into the Hands of Domain Experts Bringing Big Data Modelling into the Hands of Domain Experts David Willingham Senior Application Engineer MathWorks david.willingham@mathworks.com.au 2015 The MathWorks, Inc. 1 Data is the sword of the

More information

The Edge Editions of SAP InfiniteInsight Overview

The Edge Editions of SAP InfiniteInsight Overview Analytics Solutions from SAP The Edge Editions of SAP InfiniteInsight Overview Enabling Predictive Insights with Mouse Clicks, Not Computer Code Table of Contents 3 The Case for Predictive Analysis 5 Fast

More information

Networking Guide. 2008 www.lexmark.com

Networking Guide. 2008 www.lexmark.com Networking Guide 2008 www.lexmark.com Contents Installing the printer on a wireless network...5 Wireless network compatiility...5 Information you will need to set up the printer on a wireless network...5

More information

Information Technology Services will be updating the mark sense test scoring hardware and software on Monday, May 18, 2015. We will continue to score

Information Technology Services will be updating the mark sense test scoring hardware and software on Monday, May 18, 2015. We will continue to score Information Technology Services will be updating the mark sense test scoring hardware and software on Monday, May 18, 2015. We will continue to score all Spring term exams utilizing the current hardware

More information

WEKA Explorer User Guide for Version 3-4-3

WEKA Explorer User Guide for Version 3-4-3 WEKA Explorer User Guide for Version 3-4-3 Richard Kirkby Eibe Frank November 9, 2004 c 2002, 2004 University of Waikato Contents 1 Launching WEKA 2 2 The WEKA Explorer 2 Section Tabs................................

More information

NAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ

NAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ What is NAND Flash? What is the major difference between NAND Flash and other Memory? Structural differences between NAND Flash and NOR Flash What does NAND Flash controller do? How to send command to

More information

KEYWORD SEARCH IN RELATIONAL DATABASES

KEYWORD SEARCH IN RELATIONAL DATABASES KEYWORD SEARCH IN RELATIONAL DATABASES N.Divya Bharathi 1 1 PG Scholar, Department of Computer Science and Engineering, ABSTRACT Adhiyamaan College of Engineering, Hosur, (India). Data mining refers to

More information

Parallels Containers for Windows 6.0

Parallels Containers for Windows 6.0 Parallels Containers for Windows 6.0 Upgrade Guide June 11, 2014 Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Automating with STEP7 in LAD and FBD

Automating with STEP7 in LAD and FBD bisk Automating with STEP7 in LAD and FBD Programmable Controllers SIMATIC S7-300/400 by Hans Berger Publicis MCD Verlag Contents Indroduction 19 1 SIMATIC S7-300/400 Programmable Controller... 20 1.1

More information

In this tutorial, we try to build a roc curve from a logistic regression.

In this tutorial, we try to build a roc curve from a logistic regression. Subject In this tutorial, we try to build a roc curve from a logistic regression. Regardless the software we used, even for commercial software, we have to prepare the following steps when we want build

More information

Beam Loss Monitor Software Guide

Beam Loss Monitor Software Guide Version 1.0 Beam Loss Monitor Software Guide James Leaver 5th December 2008 1 Operating Procedure In order to run the Beam Loss Monitor software, the user should complete the following steps: 1. Open a

More information

Manual Spamfilter Version: 1.1 Date: 20-02-2014

Manual Spamfilter Version: 1.1 Date: 20-02-2014 Manual Spamfilter Version: 1.1 Date: 20-02-2014 Table of contents Introduction... 2 Quick guide... 3 Quarantine reports...3 What to do if a message is blocked inadvertently...4 What to do if a spam has

More information

MODEL BASED TESTING OF WEBSITE

MODEL BASED TESTING OF WEBSITE MODEL BASED TESTING OF WEBSITE Sumit Machra 1 and Narendra Khatri 2 1 Department of Computer Engineering, Jodhpur National University, Jodhpur, Rajasthan, India-342001 2 Department of Electronics & Communication

More information

The Math in Laser Light Math

The Math in Laser Light Math The Math in Laser Light Math When graphed, many mathematical curves are eautiful to view. These curves are usually rought into graphic form y incorporating such devices as a plotter, printer, video screen,

More information

On some Potential Research Contributions to the Multi-Core Enterprise

On some Potential Research Contributions to the Multi-Core Enterprise On some Potential Research Contributions to the Multi-Core Enterprise Oded Maler CNRS - VERIMAG Grenoble, France February 2009 Background This presentation is based on observations made in the Athole project

More information

PostgreSQL Business Intelligence & Performance Simon Riggs CTO, 2ndQuadrant PostgreSQL Major Contributor

PostgreSQL Business Intelligence & Performance Simon Riggs CTO, 2ndQuadrant PostgreSQL Major Contributor PostgreSQL Business Intelligence & Performance Simon Riggs CTO, 2ndQuadrant PostgreSQL Major Contributor The research leading to these results has received funding from the European Union's Seventh Framework

More information

Introduction to Apache Pig Indexing and Search

Introduction to Apache Pig Indexing and Search Large-scale Information Processing, Summer 2014 Introduction to Apache Pig Indexing and Search Emmanouil Tzouridis Knowledge Mining & Assessment Includes slides from Ulf Brefeld: LSIP 2013 Organizational

More information

COMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction

COMP3420: Advanced Databases and Data Mining. Classification and prediction: Introduction and Decision Tree Induction COMP3420: Advanced Databases and Data Mining Classification and prediction: Introduction and Decision Tree Induction Lecture outline Classification versus prediction Classification A two step process Supervised

More information

A Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery

A Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery A Serial Partitioning Approach to Scaling Graph-Based Knowledge Discovery Runu Rathi, Diane J. Cook, Lawrence B. Holder Department of Computer Science and Engineering The University of Texas at Arlington

More information

Chapter 8 Software Testing

Chapter 8 Software Testing Chapter 8 Software Testing Summary 1 Topics covered Development testing Test-driven development Release testing User testing 2 Program testing Testing is intended to show that a program does what it is

More information

Advanced compiler construction. General course information. Teacher & assistant. Course goals. Evaluation. Grading scheme. Michel Schinz 2007 03 16

Advanced compiler construction. General course information. Teacher & assistant. Course goals. Evaluation. Grading scheme. Michel Schinz 2007 03 16 Advanced compiler construction Michel Schinz 2007 03 16 General course information Teacher & assistant Course goals Teacher: Michel Schinz Michel.Schinz@epfl.ch Assistant: Iulian Dragos INR 321, 368 64

More information