Trace-Context Sensitive Performance Profiling for Enterprise Software Applications

Size: px
Start display at page:

Download "Trace-Context Sensitive Performance Profiling for Enterprise Software Applications"

Transcription

1 Trace-Context Sensitive Performance Profiling for Enterprise Software Applications Presentation at SPEC International Performance Evaluation Workshop 2008 Matthias Rohr 1, André van Hoorn 1, Simon Giesecke 2, Jasminka Matevska 1, Wilhelm Hasselbring 1, and Sergej Alekseev 3 1 Graduate School TrustSoft, Software Engineering Group, University of Oldenburg, Germany 2 OFFIS Institute for Information Technology, Oldenburg, Germany 3 Nokia Siemens Networks GmbH & Co KG, Berlin, Germany Contact: rohr(ät)informatik.uni-oldenburg.de, July 2, 2008 Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 1 / 29

2

3

4

5

6

7

8

9

10

11

12

13

14 Outline Foundations 1 Motivation 2 Foundations 3 Approach to Calling-context Sensitive Timing Behavior Modeling 4 Related work 5 Evaluation 6 Conclusions and Future Work Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 5 / 29

15 Monitoring Foundations <<Component>> M :Catalog :Bookshop :CRM :Catalog M M M M <<Component>> :Bookshop M <<Component>> :CRM M M M M M Monitoring of Response times: Time between start and end of software operation executions Execution sequences of operations for each thread Monitoring tool and trace analysis tool: Kieker 1 [Rohr et al., 2008b] Uses Aspect-oriented Programming (AspectJ) Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 6 / 29

16 Monitoring of traces Foundations Operation TraceID t in t out rt = t out t in a c b c c Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 7 / 29

17 Monitoring of traces Foundations Operation TraceID t in t out rt = t out t in a c b c c Trace reconstruction Traces are sequences of executions that correspond to system service requests Sequence diagrams and dynamic call trees represent (classes) of traces Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 7 / 29

18 Foundations Construction of dynamic call trees Dynamic call trees: Dynamic call trees [Ammons et al., 1997] represent execution sequences by an ordered tree. a A c C D E F d e A.a c d f C.c D.d E.e F.f C.c D.d E.e e Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 8 / 29

19 Foundations Construction of dynamic call trees Dynamic call trees: Dynamic call trees [Ammons et al., 1997] represent execution sequences by an ordered tree. a A c C D E F d e A.a c d f C.c D.d E.e F.f C.c D.d E.e e Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 8 / 29

20 Foundations Construction of dynamic call trees Dynamic call trees: Dynamic call trees [Ammons et al., 1997] represent execution sequences by an ordered tree. a A c C D E F d e A.a c d f C.c E.e F.f C.c D.d E.e e Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 8 / 29

21 Foundations Construction of dynamic call trees Dynamic call trees: Dynamic call trees [Ammons et al., 1997] represent execution sequences by an ordered tree. a A c C D E F d e A.a c d f C.c D.d E.e F.f C.c D.d E.e e Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 8 / 29

22 Foundations Construction of dynamic call trees Dynamic call trees: Dynamic call trees [Ammons et al., 1997] represent execution sequences by an ordered tree. a A c C D E F d e A.a c d f C.c D.d E.e F.f C.c D.d E.e e Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 8 / 29

23 Foundations Construction of dynamic call trees Dynamic call trees: Dynamic call trees [Ammons et al., 1997] represent execution sequences by an ordered tree. a A c C D E F d e A.a c d f C.c D.d E.e F.f C.c D.d E.e e Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 8 / 29

24 Foundations Construction of dynamic call trees Dynamic call trees: Dynamic call trees [Ammons et al., 1997] represent execution sequences by an ordered tree. a A c C D E F d e A.a c d f C.c D.d E.e F.f C.c D.d E.e e Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 8 / 29

25 Foundations Construction of dynamic call trees Dynamic call trees: Dynamic call trees [Ammons et al., 1997] represent execution sequences by an ordered tree. a A c C D E F d e A.a c d f C.c D.d E.e F.f C.c D.d E.e e Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 8 / 29

26 Foundations Construction of dynamic call trees Dynamic call trees: Dynamic call trees [Ammons et al., 1997] represent execution sequences by an ordered tree. a A c C D E F d e A.a c d f C.c D.d E.e F.f C.c D.d E.e e Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 8 / 29

27 Outline Approach to Calling-context Sensitive Timing Behavior Modeling 1 Motivation 2 Foundations 3 Approach to Calling-context Sensitive Timing Behavior Modeling Calling-context Equivalence Classes Optimization of the Trace-context Sensitive Timing Behavior Model 4 Related work 5 Evaluation 6 Conclusions and Future Work Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 9 / 29

28 Approach to Calling-context Sensitive Timing Behavior Modeling Approach Overview Goal Derivation of a timing behavior model with lower variance and less multi-modality in timing behavior distributions Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 10 / 29

29 Approach to Calling-context Sensitive Timing Behavior Modeling Approach Overview Goal Derivation of a timing behavior model with lower variance and less multi-modality in timing behavior distributions Definition: Calling-context of an operation call Set of circumstances or facts that surround an operation call, in particular the sequence of surrounding operation executions. Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 10 / 29

30 Approach to Calling-context Sensitive Timing Behavior Modeling Approach Overview Goal Derivation of a timing behavior model with lower variance and less multi-modality in timing behavior distributions Definition: Calling-context of an operation call Set of circumstances or facts that surround an operation call, in particular the sequence of surrounding operation executions. Steps of the approach 1 Integrate calling-context information into timing behavior model 2 Optimize timing behavior model; e.g. model size reduction Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 10 / 29

31 Approach to Calling-context Sensitive Timing Behavior Modeling Calling-context Equivalence Classes Calling-context equivalence Three levels of abstraction for calling-context information: Equivalence relations on software operation executions Two executions of the same operation are caller-context equivalent (cp. Graham et al. [1982]) := called from operations with the same name. stack-context equivalent (cp. Ammons et al. [1997]) := equal paths from their tree nodes to root trace-context equivalent := 1) corresponding trees are equal 2) tree nodes have same position in tree Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 11 / 29

32 Approach to Calling-context Sensitive Timing Behavior Modeling Calling-context Equivalence Classes Calling-context equivalence Three levels of abstraction for calling-context information: Equivalence relations on software operation executions Two executions of the same operation are caller-context equivalent (cp. Graham et al. [1982]) := called from operations with the same name. stack-context equivalent (cp. Ammons et al. [1997]) := equal paths from their tree nodes to root trace-context equivalent := 1) corresponding trees are equal 2) tree nodes have same position in tree Stack-context equivalence caller-context equivalence Trace-context equivalence stack-context equivalence Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 11 / 29

33 Approach to Calling-context Sensitive Timing Behavior Modeling Calling-context Equivalence Classes Caller-context equivalence (cp. Graham et al. [1982]) Two executions of the same operation are caller-context equivalent if they are called from operations with the same name. A.a C.c D.d E.e F.f C.c D.d E.e Caller context equivalence for E.e B.b A.a F.f C.c D.d E.e B.b B.b C.c D.d E.e Dynamic call tree for trace 1 Dynamic call tree for trace 2 Figure: Example: Caller-context equivalence for operation E.e (3 eq. classes) Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 12 / 29

34 Approach to Calling-context Sensitive Timing Behavior Modeling Calling-context Equivalence Classes Stack-context equivalence (cp. Ammons et al. [1997]) Two executions of the same operation are stack-context equivalent if the paths from the corresponding nodes to its root are equal. A.a C.c D.d E.e F.f C.c D.d E.e Stack context equivalence for E.e B.b A.a F.f C.c D.d E.e B.b B.b C.c D.d E.e Dynamic call tree for trace 1 Dynamic call tree for trace 2 Figure: Example: Stack-context equivalence for operation E.e (4 eq. classes) Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 13 / 29

35 Approach to Calling-context Sensitive Timing Behavior Modeling Calling-context Equivalence Classes Trace-context equivalence Example Two executions of the same operation are trace-context equivalent if the corresponding trees are equal and the both executions correspond to dynamic call tree nodes with the same position within the tree. A.a C.c D.d E.e F.f C.c D.d E.e Trace context equivalence for A.a B.b A.a F.f C.c D.d E.e B.b B.b C.c D.d E.e Dynamic call tree for trace 1 Dynamic call tree for trace 2 Figure: Example: Trace-context equivalence for operation A.a (2 eq. classes) For both traces together, number of trace-contexts = total number of nodes in non-equal trees = 19. Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 14 / 29

36 Approach to Calling-context Sensitive Timing Behavior Modeling Calling-context Equivalence Classes Calling-Context Sensitive Timing Behavior Model Monitored response times of all instrumented software operations RT = [... ] Partitioning based on operation name equality Partitioning based on caller context equivalence Partitioning based on stack context equivalence Partitioning based on trace context equivalence Calling-context sensitive timing behavior model derived from monitoring data: Complete partitioning of all response times based on trace-context, stack-context, or caller-context equivalence Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 15 / 29

37 Approach to Calling-context Sensitive Timing Behavior Modeling Optimization of the Trace-context Sensitive Timing Behavior Model Additional Model Optimization using Tree Operators Possibly new problems resulting from calling-context analysis: Efficiency: Too many calling-contexts Calling-contexts do not differ in timing behavior distributions Applicability and robustness of statistical methods Calling-contexts with an insufficient number of measurements Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 16 / 29

38 Approach to Calling-context Sensitive Timing Behavior Modeling Optimization of the Trace-context Sensitive Timing Behavior Model Additional Model Optimization using Tree Operators Possibly new problems resulting from calling-context analysis: Efficiency: Too many calling-contexts Calling-contexts do not differ in timing behavior distributions Applicability and robustness of statistical methods Calling-contexts with an insufficient number of measurements Leaf nodes without siblings are removed Leaf nodes without a sufficient amount of observations are linked to an ancestor node Leaf nodes with similar distribution characteristics are merged Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 16 / 29

39 Outline Related work 1 Motivation 2 Foundations 3 Approach to Calling-context Sensitive Timing Behavior Modeling 4 Related work 5 Evaluation 6 Conclusions and Future Work Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 17 / 29

40 Related work: Related work Correlating control-flow information and performance measurements: Graham et al. [1982] introduced the profiler gprof that can evaluate measurements in the context of the caller Ammons et al. [1997] introduced evaluation in the context of the stack of callers; Implemented by commerical profilling tools (e.g., Intel s VTune Profiler) Handling clusters in response time distributions: Bulej et al. [2005] describe clusters in timing behavior measurements and apply k-means clustering on response time data Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 18 / 29

41 Outline Evaluation 1 Motivation 2 Foundations 3 Approach to Calling-context Sensitive Timing Behavior Modeling 4 Related work 5 Evaluation Field Study Case Study 6 Conclusions and Future Work Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 19 / 29

42 Field Study Evaluation Field Study Setting System at Nokia Siemens Networks Commercial software platform for implementing telecommunication network services (e.g., signaling) Workload: Test driver of Nokia Siemens Networks (5, ,000 Calls/Hour) Goals Demonstration of applicability in a complex system Demonstration of resolving multi-modality and standard deviation reduction Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 20 / 29

43 Results Evaluation Field Study Response time in microseconds :18 14:20 14:22 14:24 Calendar time (hour:minute) (a) Response times measured for operation f. Probability density Response time in microseconds (b) Probability density distribution for operation f. Figure: Clusters and multi-modality for operation f. Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 21 / 29

44 Evaluation Field Study Results Removal of multi-modality Probability density Response time in microseconds Probability density Probability density Trace context 1 Trace context Response time in microseconds (a) PDF for trace-context Response time in microseconds (b) PDF for trace-context 1 and 3. Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 22 / 29

45 Evaluation Field Study Results Removal of multi-modality Probability density Probability density Trace context 1 Trace context Response time in microseconds (c) PDF for trace-context Response time in microseconds (d) PDF for trace-context 1 and 3. Total average decrease in standard deviation ; 2.20; % reduction of standard deviation Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 22 / 29

46 Outline Evaluation Case Study 1 Motivation 2 Foundations 3 Approach to Calling-context Sensitive Timing Behavior Modeling 4 Related work 5 Evaluation Field Study Case Study 6 Conclusions and Future Work Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 23 / 29

47 Evaluation Case Study Case Study Goals and research questions Setting Quantitative evaluation of standard deviation reduction. Is trace-context analysis more effective than caller- and stack-context analysis? How does the number of monitoring points relate to the number of calling-contexts? System: ibatis JPetStore 5 Web application deployed on Apache Tomcat Workload: Probabilistic workload generated by Markov4JMeter a [van Hoorn et al., 2008] 10 concurrent users Experiment run statistics: Random instrumentation: of 199 possible monitoring points Experiment runs last 18 minutes 2 2,032,572 monitored operation executions per run a Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 24 / 29

48 Evaluation Case Study Case study: Standard deviation reduction for two particular instrumentations Average st.dev. decrease in % 18 mon.pts. scenario Full instrumentation Caller-context analysis Stack-context analysis Trace-context analysis Decrease of stdev in % Decrease of stdev in % Caller Stack Trace Calling context type (e) 18 mon.pts. scenario CallerContext StackContext TraceContext Calling context type (f) Full instrumentation Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 25 / 29

49 Evaluation Case Study Case study: Standard deviation reduction for two particular instrumentations Average st.dev. decrease in % 18 mon.pts. scenario Full instrumentation Caller-context analysis Stack-context analysis Trace-context analysis Decrease of stdev in % Decrease of stdev in % Caller Stack Trace Calling context type (g) 18 mon.pts. scenario CallerContext StackContext TraceContext Calling context type (h) Full instrumentation A significant part of the variance is connected to trace-context information! Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 25 / 29

50 Evaluation Case Study Case study: Number of monitoring points vs. standard deviation reduction Average relative st.dev. decrease in % Trace context analysis Stack context analysis Caller context analysis 1st and 3rd quartile Number of monitoring points Figure: Average decrease in standard deviation for different numbers of monitoring points using calling-context information compared to standard deviation using no calling-context information. Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 26 / 29

51 Evaluation Case Study Case study: Number of monitoring points vs. number of calling-contexts Number of contexts Stack contexts Caller contexts Number of contexts Trace contexts Stack and Caller contexts Number of monitoring points Number of monitoring points (a) (b) The number of stack-contexts and number of caller-contexts both grow linearly with a similar rate (cp. [Rohr et al., 2008a]). The number of trace-contexts increases faster than the number of stack-contexts and number of caller-contexts. Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 27 / 29

52 Summary Conclusions and Future Work Contribution: New approach to consider trace-context information in timing behavior models Trace-context equivalence extends the concepts of caller-context equivalence and stack-context equivalence Results of the field study: Trace-context analysis is applicable in large complex software system Demonstration of multi-modality removal and standard deviation reduction Results of the case study: Significant reduction of standard deviation in timing behavior model Trace-context analysis is more effective than stack- and caller-context analysis The number of trace-contexts grows linearly Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 28 / 29

53 Conclusions and Future Work Outlook and Future work Current limitations / problems: Explosion of the model size is still possible Multi-modality and high variance may not be an issue in a performance analysis Outlook and possibilities for future work: Efficiency evaluation: Benefit vs. monitoring costs Evaluation for execution times (instead response times) Demonstration of effectiveness in the context of anomaly detection ([Rohr et al., 2007]) Considering also asynchronous communication within traces Acknowledgement We would like to acknowledge Nokia Siemens Networks Berlin, Business Service Solution for supporting this project. Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 29 / 29

54 References G. Ammons, T. Ball, and J. R. Larus. Exploiting hardware performance counters with flow and context sensitive profiling. In Proceedings of the Conference on Programming language design and implementation (PLDI 97), pages ACM, ISBN doi: / L. Bulej, T. Kalibera, and P. Tůma. Repeated results analysis for middleware regression benchmarking. Performance Evaluation, 60(1-4): , ISSN doi: /j.peva S. L. Graham, P. B. Kessler, and M. K. McKusick. gprof: a call graph execution profiler. SIGPLAN Notes, 17(6): , doi: / M. Rohr, S. Giesecke, and W. Hasselbring. Timing Behavior Anomaly Detection in Enterprise Information Systems. In J. Cardoso, J. Cordeiro, and J. Filipe, editors, Proceedings of the Ninth International Conference on Enterprise Information Systems (ICEIS 07), volume DISI, pages INSTICC Press, June ISBN M. Rohr, A. van Hoorn, S. Giesecke, J. Matevska, and W. Hasselbring. Trace-context sensitive performance models from monitoring data of software systems. In C. Lebsack, editor, Proceedings of the Workshop on Tools Infrastructures and Methodologies for the Evaluation of Research Systems (TIMERS 08) at IEEE International Symposium on Performance Analysis of Systems and Software 2008, pages 37 44, Apr. 2008a. Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 29 / 29

55 Additional slides M. Rohr, A. van Hoorn, J. Matevska, N. Sommer, L. Stoever, S. Giesecke, and W. Hasselbring. Kieker: Continuous monitoring and on demand visualization of Java software behavior. In Proceedings of the IASTED International Conference on Software Engineering 2008, pages ACTA Press, Feb. 2008b. ISBN A. Sabetta and H. Koziolek. Measuring performance metrics: Techniques and tools. In I. Eusgeld, F. Freiling, and R. Reussner, editors, Dependability Metrics, volume 4909 of Lecture Notes in Computer Science (LNCS). Springer, ISBN A. van Hoorn. Workload-sensitive timing behavior anomaly detection in large software systems, Sept Master s thesis (Diplomarbeit), Department of Computing Science, University of Oldenburg, Germany. A. van Hoorn, M. Rohr, and W. Hasselbring. Generating probabilistic and intensity-varying workload for web-based software systems. In S. Kounev, I. Gorton, and K. Sachs, editors, Performance Evaluation Metrics, Models and Benchmarks: Proceedings of the SPEC International Performance Evaluation Workshop (SIPEW 08), volume 5119 of Lecture Notes in Computer Science (LNCS), pages , Heidelberg, June SPEC, Springer. ISBN doi: / Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 29 / 29

56 Additional slides Application scenario: Anomaly Detection Response time in milliseconds WISAD: Anomaly WISAD: no anomaly Period of anomaly injection Excluded excution Experiment time in seconds Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 29 / 29

57 Additional slides Standard deviation reduction Probability density Response time in milliseconds Probability density Response time in milliseconds Probability density Response time in milliseconds Quantitative evaluation metric: Standard deviation of trace-contexts weighted by invokation frequency compared to original standard deviation: 1 P n i=1 TC i stdev(tc i ) Original stdev(original) Standard variation relates to uncertainty and confidence in statistical analysis For operation insertorder() example: Standard deviation original distribution: 100% Standard deviation trace-context sensitive model: 61.27% = 38.73% less Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 29 / 29

58 Additional slides Resolving multi-modality 1/3 Operation neworder() has a multi-modal response time distribution: Probability density Response time in milliseconds Figure: Kernel density estimate for all response times of operation neworder() Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 29 / 29

59 Additional slides Resolving multi-modality 2/3 Trace-context analysis replaces the original distribution by two uni-modal distributions: Probability density Response time in milliseconds Probability density Probability density Response time in milliseconds Response time in milliseconds Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 29 / 29

60 Additional slides Resolving multi-modality 3/3 Identified by trace analysis: Two trace-contexts One caller-context and one stack-context The two trace-contexts correspond to two call scenarios: $ ActionServlet OrderBean $ ActionServlet OrderBean OrderService process(..) process(..) neworder() neworder() insertorder(..) (a) (b) The sequence diagrams only distinguish in the call action to insertorder(). Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 29 / 29

61 Calling-Context Tree Additional slides Calling-Context Tree Monitored response times of all instrumented software operations RT = [... ] Partitioning based on operation name equality Partitioning based on caller context equivalence Partitioning based on stack context equivalence Partitioning based on trace context equivalence Complete calling-context sensitive timing behavior model A complete timing behavior model consists of any node subset of the CCT that corresponds to a complete partitioning of all monitored observations. Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 29 / 29

62 Additional slides Influences to Software Timing Behavior System architecture: Hardware design Software design System usage [cp. Sabetta and Koziolek, 2008]: Workload intensity Concurrent service requests Number of active users [van Hoorn, 2007] Service demand characteristics Parameter values Parameter value size Caller identity / stack content / history of calls System state: Cache content Load balancer state Other active processes on same platform Database content Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 29 / 29

63 Additional slides Nokia Siemens Field Study Figure: UML Sequence Diagrams from a module of a partially instrumented telecommunication signaling system of Nokia Siemens Networks derived from monitoring data. (Operation names changed, operations omitted). Matthias Rohr et al. (TrustSoft, Univ. Oldenburg) Trace-Context Sensitive Performance Profiling June 27, 2008, Darmstadt Germany 29 / 29

64 Additional slides Nokia Siemens Field Study Figure: Tree representation of each of the traces. Probability density Trace context 1 Trace context 3 Matthias Rohr et 200 al. (TrustSoft, 300 Univ. Oldenburg) 400 Trace-Context 500 Sensitive Performance Profiling 65 June 27, 2008, Darmstadt 70 Germany / 29 Probability density

SAP Hybris Academy. Public. February March 2017

SAP Hybris Academy. Public. February March 2017 SAP Hybris Academy Public February March 2017 Agenda Introduction SAP Hybris Academy Overview Java Knowledge Needed for SAP Hybris Development HY200 SAP Hybris Commerce Functional Analyst: Course Content

More information

COURSE LISTING. Courses Listed. Training for Cloud with SAP Hybris in Commerce for System Administrators. 26 September 2018 (22:37 BST) Einsteiger

COURSE LISTING. Courses Listed. Training for Cloud with SAP Hybris in Commerce for System Administrators. 26 September 2018 (22:37 BST) Einsteiger Training for Cloud with SAP Hybris in Commerce for System Administrators Courses Listed Einsteiger HY100 - SAP Hybris Commerce Product Overview HY100E - SAP Hybris Commerce Essentials Online Grundlagen

More information

COURSE LISTING. Courses Listed. Training for Database & Technology with Administration in SAP Hybris Commerce. 17 August 2018 (04:00 BST) Einsteiger

COURSE LISTING. Courses Listed. Training for Database & Technology with Administration in SAP Hybris Commerce. 17 August 2018 (04:00 BST) Einsteiger Training for Database & Technology with Administration in SAP Hybris Commerce Courses Listed Einsteiger HY100 - SAP Hybris Commerce Product Overview HY100E - SAP Hybris Commerce Essentials Online Grundlagen

More information

Process Mining to enhance security of Web information systems

Process Mining to enhance security of Web information systems Process Mining to enhance security of Web information systems Simona Bernardi, Raúl Piracés Alastuey, and Raquel Trillo Lado Paris, 29th April 2017 Simona Bernardi, Raúl Piracés Alastuey, and Raquel Trillo

More information

Regression Benchmarking with Simple Middleware Benchmarks

Regression Benchmarking with Simple Middleware Benchmarks Regression Benchmarking with Simple Middleware Benchmarks Lubomír Bulej 1,2, Tomáš Kalibera 1, Petr Tůma 1 1 Distributed Systems Research Group, Department of Software Engineering Faculty of Mathematics

More information

Automated Detection of Performance Regressions Using Regression Models on Clustered Performance Counters

Automated Detection of Performance Regressions Using Regression Models on Clustered Performance Counters Automated Detection of Performance Regressions Using Regression Models on Clustered Performance Counters Weiyi Shang, Ahmed E. Hassan Software Analysis and Intelligence Lab (SAIL) Queen s University, Kingston,

More information

An Approach to Applying. Goal Model and Fault Tree for Autonomic Control

An Approach to Applying. Goal Model and Fault Tree for Autonomic Control Contemporary Engineering Sciences, Vol. 9, 2016, no. 18, 853-862 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2016.6697 An Approach to Applying Goal Model and Fault Tree for Autonomic Control

More information

Assignment Question Paper I

Assignment Question Paper I Subject : - Discrete Mathematics Maximum Marks : 30 1. Define Harmonic Mean (H.M.) of two given numbers relation between A.M.,G.M. &H.M.? 2. How we can represent the set & notation, define types of sets?

More information

Contact Tracing in Health-care Information System - with SARS as a Case Study

Contact Tracing in Health-care Information System - with SARS as a Case Study Contact Tracing in Health-care Information System - with SARS as a Case Study by LEONG Kan Ion, Brian Master of Science in Software Engineering 2009 Faculty of Science and Technology University of Macau

More information

HPX integration: APEX (Autonomic Performance Environment for exascale)

HPX integration: APEX (Autonomic Performance Environment for exascale) HPX integration: APEX (Autonomic Performance Environment for exascale) Kevin Huck, With contributions from Nick Chaimov and Sameer Shende, Allen Malony khuck@cs.uoregon.edu http://github.com/khuck/xpress-apex

More information

Design and Development of Several Mobile Communication Systems for People with Hearing Disabilities

Design and Development of Several Mobile Communication Systems for People with Hearing Disabilities Design and Development of Several Mobile Communication Systems for People with Hearing Disabilities Jose L. Martín 1,SiraE.Palazuelos 1,Jerónimo Arenas 2,JavierMacías 3, and Santiago Aguilera 4 1 Department

More information

Outline. What s inside this paper? My expectation. Software Defect Prediction. Traditional Method. What s inside this paper?

Outline. What s inside this paper? My expectation. Software Defect Prediction. Traditional Method. What s inside this paper? Outline A Critique of Software Defect Prediction Models Norman E. Fenton Dongfeng Zhu What s inside this paper? What kind of new technique was developed in this paper? Research area of this technique?

More information

International Journal of Software and Web Sciences (IJSWS)

International Journal of Software and Web Sciences (IJSWS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

CPU MF Formulas and Updates

CPU MF Formulas and Updates CPU MF Formulas and Updates December 2017 John Burg z/os SMF 113 Record SMF113_2_CTRVN2 1 = z10 2 = z196 / z114 3 = zec12 / zbc12 4 = z13 / z13s 5 z14 2 2 RNI-based LSPR Workload Decision Table MP RNI

More information

Bayes Linear Statistics. Theory and Methods

Bayes Linear Statistics. Theory and Methods Bayes Linear Statistics Theory and Methods Michael Goldstein and David Wooff Durham University, UK BICENTENNI AL BICENTENNIAL Contents r Preface xvii 1 The Bayes linear approach 1 1.1 Combining beliefs

More information

Design the Flexibility, Maintain the Stability of Conceptual Schemas

Design the Flexibility, Maintain the Stability of Conceptual Schemas Design the Flexibility, Maintain the Stability of Conceptual Schemas Lex Wedemeijer 1 ABP Netherlands, Department of Information Management, P.O.Box 4476, NL-6401 CZ, Heerlen, The Netherlands L.Wedemeijer@ABP.NL

More information

EMPIRICAL RESEARCH METHODS IN VISUALIZATION

EMPIRICAL RESEARCH METHODS IN VISUALIZATION EMPIRICAL RESEARCH METHODS IN VISUALIZATION and some thoughts on their role in Master, PHD and postdoctoral projects Talk at University of Sydney, 11. August 2014 Stephan Diehl University of Trier / Universität

More information

Leveraging Linux: Code Coverage for Post-Silicon Validation

Leveraging Linux: Code Coverage for Post-Silicon Validation Leveraging Linux: Code Coverage for Post-Silicon Validation Mehdi Karimi-biuki Embedded Linux Conference 2013 San Francisco, CA 22 Feb, 2013 About me MASc (2012) and BASc (2009) from UBC 2 years of work

More information

High-level Vision. Bernd Neumann Slides for the course in WS 2004/05. Faculty of Informatics Hamburg University Germany

High-level Vision. Bernd Neumann Slides for the course in WS 2004/05. Faculty of Informatics Hamburg University Germany High-level Vision Bernd Neumann Slides for the course in WS 2004/05 Faculty of Informatics Hamburg University Germany neumann@informatik.uni-hamburg.de http://kogs-www.informatik.uni-hamburg.de 1 Contents

More information

Outline. Experimental Evaluation in Computer Science: A Quantitative Study. Related Work. Introduction. Select CS Papers.

Outline. Experimental Evaluation in Computer Science: A Quantitative Study. Related Work. Introduction. Select CS Papers. Experimental Evaluation in Computer Science: A Quantitative Study Paul Lukowicz, Ernst A. Heinz, Lutz Prechelt and Walter F. Tichy Journal of Systems and Software January 1995 Introduction Large part of

More information

Spatial Cognition for Mobile Robots: A Hierarchical Probabilistic Concept- Oriented Representation of Space

Spatial Cognition for Mobile Robots: A Hierarchical Probabilistic Concept- Oriented Representation of Space Spatial Cognition for Mobile Robots: A Hierarchical Probabilistic Concept- Oriented Representation of Space Shrihari Vasudevan Advisor: Prof. Dr. Roland Siegwart Autonomous Systems Lab, ETH Zurich, Switzerland.

More information

Determining Patient Similarity in Medical Social Networks

Determining Patient Similarity in Medical Social Networks Determining Patient Similarity in Medical Social Networks Sebastian Klenk, Jürgen Dippon, Peter Fritz, and Gunther Heidemann Stuttgart University Intelligent Systems Group Universitätsstrasse 38, 70569

More information

Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks

Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks Okan Turkes, Hans Scholten, and Paul Havinga Dept. of Computer Engineering, Pervasive Systems University of

More information

Finding Information Sources by Model Sharing in Open Multi-Agent Systems 1

Finding Information Sources by Model Sharing in Open Multi-Agent Systems 1 Finding Information Sources by Model Sharing in Open Multi-Agent Systems Jisun Park, K. Suzanne Barber The Laboratory for Intelligent Processes and Systems The University of Texas at Austin 20 E. 24 th

More information

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. CP 7026-Software Quality Assurance Unit-I. Part-A

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING. CP 7026-Software Quality Assurance Unit-I. Part-A DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CP 7026-Software Quality Assurance Unit-I 1. What is quality? 2. What are the Views of Quality? 3. What is Quality Cost? 4. What is Quality Audit? 5. What

More information

Kinetic Modeling of Data Eviction in Cache

Kinetic Modeling of Data Eviction in Cache Kinetic Modeling of Data Eviction in Cache Xiameng Hu, Xiaolin Wang, Lan Zhou, YingweiLuo Peking University Chen Ding University of Rochester Zhenlin Wang Michigan Technological University 1 Background

More information

MSc Software Testing MSc Prófun hugbúnaðar

MSc Software Testing MSc Prófun hugbúnaðar MSc Software Testing MSc Prófun hugbúnaðar Fyrirlestrar 43 & 44 Evaluating Test Driven Development 15/11/2007 Dr Andy Brooks 1 Case Study Dæmisaga Reference Evaluating Advantages of Test Driven Development:

More information

Using Perceptual Grouping for Object Group Selection

Using Perceptual Grouping for Object Group Selection Using Perceptual Grouping for Object Group Selection Hoda Dehmeshki Department of Computer Science and Engineering, York University, 4700 Keele Street Toronto, Ontario, M3J 1P3 Canada hoda@cs.yorku.ca

More information

COURSE LISTING. Courses Listed. Training for Database & Technology with Development in SAP Hybris Commerce. 29 November 2017 (11:16 GMT) Beginner

COURSE LISTING. Courses Listed. Training for Database & Technology with Development in SAP Hybris Commerce. 29 November 2017 (11:16 GMT) Beginner Training for Database & Technology with Development in SAP Hybris Commerce Courses Listed Beginner HY100 - SAP Hybris Commerce Product Overview HY100E - SAP Hybris Commerce Essentials Online Advanced HY410

More information

Comparative analysis of data mining tools for lungs cancer patients

Comparative analysis of data mining tools for lungs cancer patients Journal of Information & Communication Technology Vol. 9, No. 1, (Spring2015) 33-40 Comparative analysis of data mining tools for lungs cancer patients Adnan Alam khan * Institute of Business & Technology

More information

Recommender Systems Evaluations: Offline, Online, Time and A/A Test

Recommender Systems Evaluations: Offline, Online, Time and A/A Test Recommender Systems Evaluations: Offline, Online, Time and A/A Test Gebrekirstos G. Gebremeskel 1 and Arjen P. de Vries 2 1 Information Access, CWI, Amsterdam, gebre@cwi.nl 2 Radboud University arjen@acm.org

More information

[EN-A-022] Analysis of Positive and Negative Effects of Salience on the ATC Task Performance

[EN-A-022] Analysis of Positive and Negative Effects of Salience on the ATC Task Performance ENRI Int. Workshop on ATM/CNS. Tokyo, Japan. (EIWAC 2017) [EN-A-022] Analysis of Positive and Negative Effects of Salience on the ATC Task Performance + H. Yoshida*, H. Aoyama**, D. Karikawa***, S. Inoue**,

More information

Downloaded from:

Downloaded from: Arnup, SJ; Forbes, AB; Kahan, BC; Morgan, KE; McKenzie, JE (2016) The quality of reporting in cluster randomised crossover trials: proposal for reporting items and an assessment of reporting quality. Trials,

More information

An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use

An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use An Empirical Study on Causal Relationships between Perceived Enjoyment and Perceived Ease of Use Heshan Sun Syracuse University hesun@syr.edu Ping Zhang Syracuse University pzhang@syr.edu ABSTRACT Causality

More information

The 29th Fuzzy System Symposium (Osaka, September 9-, 3) Color Feature Maps (BY, RG) Color Saliency Map Input Image (I) Linear Filtering and Gaussian

The 29th Fuzzy System Symposium (Osaka, September 9-, 3) Color Feature Maps (BY, RG) Color Saliency Map Input Image (I) Linear Filtering and Gaussian The 29th Fuzzy System Symposium (Osaka, September 9-, 3) A Fuzzy Inference Method Based on Saliency Map for Prediction Mao Wang, Yoichiro Maeda 2, Yasutake Takahashi Graduate School of Engineering, University

More information

ANALYSIS AND CLASSIFICATION OF EEG SIGNALS. A Dissertation Submitted by. Siuly. Doctor of Philosophy

ANALYSIS AND CLASSIFICATION OF EEG SIGNALS. A Dissertation Submitted by. Siuly. Doctor of Philosophy UNIVERSITY OF SOUTHERN QUEENSLAND, AUSTRALIA ANALYSIS AND CLASSIFICATION OF EEG SIGNALS A Dissertation Submitted by Siuly For the Award of Doctor of Philosophy July, 2012 Abstract Electroencephalography

More information

Influence Factor: Extending the PROV Model With a Quantitative Measure of Influence

Influence Factor: Extending the PROV Model With a Quantitative Measure of Influence Influence Factor: Extending the PROV Model With a Quantitative Measure of Influence Matthew Gamble Carole Goble University of Manchester first.last@cs.manchester.ac.uk Abstract A central tenet of provenance

More information

Application of Bayesian Network Model for Enterprise Risk Management of Expressway Management Corporation

Application of Bayesian Network Model for Enterprise Risk Management of Expressway Management Corporation 2011 International Conference on Innovation, Management and Service IPEDR vol.14(2011) (2011) IACSIT Press, Singapore Application of Bayesian Network Model for Enterprise Risk Management of Expressway

More information

International Journal of Pharma and Bio Sciences A NOVEL SUBSET SELECTION FOR CLASSIFICATION OF DIABETES DATASET BY ITERATIVE METHODS ABSTRACT

International Journal of Pharma and Bio Sciences A NOVEL SUBSET SELECTION FOR CLASSIFICATION OF DIABETES DATASET BY ITERATIVE METHODS ABSTRACT Research Article Bioinformatics International Journal of Pharma and Bio Sciences ISSN 0975-6299 A NOVEL SUBSET SELECTION FOR CLASSIFICATION OF DIABETES DATASET BY ITERATIVE METHODS D.UDHAYAKUMARAPANDIAN

More information

in Engineering Prof. Dr. Michael Havbro Faber ETH Zurich, Switzerland Swiss Federal Institute of Technology

in Engineering Prof. Dr. Michael Havbro Faber ETH Zurich, Switzerland Swiss Federal Institute of Technology Risk and Safety in Engineering Prof. Dr. Michael Havbro Faber ETH Zurich, Switzerland Contents of Today's Lecture Introduction to Bayesian Probabilistic Nets (BPN) Causality as a support in reasoning Basic

More information

Dynamic Outlier Algorithm Selection for Quality Improvement and Test Program Optimization

Dynamic Outlier Algorithm Selection for Quality Improvement and Test Program Optimization Dynamic Outlier Algorithm Selection for Quality Improvement and Test Program Optimization Authors: Paul Buxton Paul Tabor 5/21/04 Purpose Outliers and quality improvement Outliers and test program optimization

More information

Quantitative Methods in Computing Education Research (A brief overview tips and techniques)

Quantitative Methods in Computing Education Research (A brief overview tips and techniques) Quantitative Methods in Computing Education Research (A brief overview tips and techniques) Dr Judy Sheard Senior Lecturer Co-Director, Computing Education Research Group Monash University judy.sheard@monash.edu

More information

Overview on kidney exchange programs

Overview on kidney exchange programs Overview on kidney exchange programs Ana Viana et al ana.viana@inesctec.pt 11 March 2016 Outline Kidney failure: some figures. The past: deceased and living donor transplants. The present: Kidney exchange

More information

A Bayesian Hierarchical Framework for Multimodal Active Perception

A Bayesian Hierarchical Framework for Multimodal Active Perception A Bayesian Hierarchical Framework for Multimodal Active Perception João Filipe Ferreira and Jorge Dias Institute of Systems and Robotics, FCT-University of Coimbra Coimbra, Portugal {jfilipe,jorge}@isr.uc.pt

More information

Deep Learning Analytics for Predicting Prognosis of Acute Myeloid Leukemia with Cytogenetics, Age, and Mutations

Deep Learning Analytics for Predicting Prognosis of Acute Myeloid Leukemia with Cytogenetics, Age, and Mutations Deep Learning Analytics for Predicting Prognosis of Acute Myeloid Leukemia with Cytogenetics, Age, and Mutations Andy Nguyen, M.D., M.S. Medical Director, Hematopathology, Hematology and Coagulation Laboratory,

More information

SableSpMT: A Software Framework for Analysing Speculative Multithreading in Java

SableSpMT: A Software Framework for Analysing Speculative Multithreading in Java SableSpMT: A Software Framework for Analysing Speculative Multithreading in Java Christopher J.F. Pickett and Clark Verbrugge School of Computer Science, McGill University Montréal, Québec, Canada H3A

More information

Research Review: Multiple Resource Theory. out in multi-task environments. Specifically, multiple display layout and control design

Research Review: Multiple Resource Theory. out in multi-task environments. Specifically, multiple display layout and control design Research Review: Multiple Resource Theory Relevance to HCI Multiple resource theory is a framework for predicting effects on performance when multiple tasks are concurrently executed. These predictions

More information

Outline General overview of the project Last 6 months Next 6 months. Tracking trends on the web using novel Machine Learning methods.

Outline General overview of the project Last 6 months Next 6 months. Tracking trends on the web using novel Machine Learning methods. Tracking trends on the web using novel Machine Learning methods advised by Professor Nello Cristianini Intelligent Systems Laboratory, University of Bristol May 25, 2010 1 General overview of the project

More information

Report on FY2015 Annual User Satisfaction Survey on Patent Examination Quality

Report on FY2015 Annual User Satisfaction Survey on Patent Examination Quality Report on FY2015 Annual User Satisfaction Survey on Patent Examination Quality June 2016 Japan Patent Office ABSTRACT I. Introduction Globally reliable high-quality patent examination and proper patent-granting

More information

A Trade-off Between Number of Impressions and Number of Interaction Attempts

A Trade-off Between Number of Impressions and Number of Interaction Attempts A Trade-off Between Number of Impressions and Number of Interaction Attempts Jacob A. Hasselgren, Stephen J. Elliott, and Jue Gue, Member, IEEE Abstract--The amount of time taken to enroll or collect data

More information

Systems Engineering Guide for Systems of Systems. Summary. December 2010

Systems Engineering Guide for Systems of Systems. Summary. December 2010 DEPARTMENT OF DEFENSE Systems Engineering Guide for Systems of Systems Summary December 2010 Director of Systems Engineering Office of the Director, Defense Research and Engineering Washington, D.C. This

More information

Goal. Security Risk-Oriented Misuse Cases

Goal. Security Risk-Oriented Misuse Cases Fundamentals of Secure System Modelling Springer, 2017 Chapter 7: Security Risk-Oriented Misuse Cases Raimundas Matulevičius University of Tartu, Estonia, rma@ut.ee Goal Understand how security risks can

More information

Getting the Payoff With MDD. Proven Steps to Get Your Return on Investment

Getting the Payoff With MDD. Proven Steps to Get Your Return on Investment Getting the Payoff With MDD Proven Steps to Get Your Return on Investment version 1.4 6/18/11 Generate Results: Real Models, Real Code, Real Fast. www.pathfindersolns.com Welcome Systems development organizations

More information

Workshop on Hadron Beam Therapy of Cancer Erice, Sicily April 24-May

Workshop on Hadron Beam Therapy of Cancer Erice, Sicily April 24-May IONTRIS Synchrotron based PT Solutions from Siemens AG Workshop on Hadron Beam Therapy of Cancer Erice, Sicily April 24-May 1 2009 Matthias Herforth VP Business Development and Communications Siemens AG

More information

AUTOMATIC RETINAL VESSEL TORTUOSITY MEASUREMENT

AUTOMATIC RETINAL VESSEL TORTUOSITY MEASUREMENT Journal of Computer Science 9 (11): 1456-1460, 2013 ISSN: 1549-3636 2013 doi:10.3844/jcssp.2013.1456.1460 Published Online 9 (11) 2013 (http://www.thescipub.com/jcs.toc) AUTOMATIC RETINAL VESSEL TORTUOSITY

More information

Unified Padring Design Flow

Unified Padring Design Flow 2013 First International Conference on Artificial Intelligence, Modelling & Simulation Unified Padring Design Flow Ang Boon Chong, Ho Kah Chun PMC-Sierra, Design Service, Penang,Malaysia Boonchong.ang@pmcs.com,

More information

Position Paper: How Certain is Recommended Trust-Information?

Position Paper: How Certain is Recommended Trust-Information? Position Paper: How Certain is Recommended Trust-Information? Uwe Roth University of Luxembourg FSTC Campus Kirchberg 6, rue Richard Coudenhove-Kalergi L-1359 Luxembourg uwe.roth@uni.lu ABSTRACT Nowadays

More information

Towards Human-Centered Optimization of Mobile Sign Language Video Communication

Towards Human-Centered Optimization of Mobile Sign Language Video Communication Towards Human-Centered Optimization of Mobile Sign Language Video Communication Jessica J. Tran Electrical Engineering DUB Group University of Washington Seattle, WA 98195 USA jjtran@uw.edu Abstract The

More information

Analysis of Model Based Regression Testing Approaches

Analysis of Model Based Regression Testing Approaches Analysis of Model Based Regression Testing Approaches SABAH TAMIMI MUHAMMAD ZAHOOR College of Computing, AlGhurair University, College of Computing, AlGhurair University, Dubai, United Arab Emirates. Dubai,

More information

RELYING ON TRUST TO FIND RELIABLE INFORMATION. Keywords Reputation; recommendation; trust; information retrieval; open distributed systems.

RELYING ON TRUST TO FIND RELIABLE INFORMATION. Keywords Reputation; recommendation; trust; information retrieval; open distributed systems. Abstract RELYING ON TRUST TO FIND RELIABLE INFORMATION Alfarez Abdul-Rahman and Stephen Hailes Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom E-mail:

More information

Analysis of Diabetic Dataset and Developing Prediction Model by using Hive and R

Analysis of Diabetic Dataset and Developing Prediction Model by using Hive and R Indian Journal of Science and Technology, Vol 9(47), DOI: 10.17485/ijst/2016/v9i47/106496, December 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Diabetic Dataset and Developing Prediction

More information

Increased tortuosity of pulmonary arteries in patients with pulmonary hypertension in the arteries

Increased tortuosity of pulmonary arteries in patients with pulmonary hypertension in the arteries M. PIENN et al.: TORTUOSITY OF PULMONARY ARTERIES AND VEINS IN PH 1 Increased tortuosity of pulmonary arteries in patients with pulmonary hypertension in the arteries Michael Pienn 1,2,*, michael.pienn@lvr.lbg.ac.at

More information

The Open Access Institutional Repository at Robert Gordon University

The Open Access Institutional Repository at Robert Gordon University OpenAIR@RGU The Open Access Institutional Repository at Robert Gordon University http://openair.rgu.ac.uk This is an author produced version of a paper published in Intelligent Data Engineering and Automated

More information

Investigating the Temporal Course of Attentional Processing A Test of the Response-Retrieval Account of Negative Priming

Investigating the Temporal Course of Attentional Processing A Test of the Response-Retrieval Account of Negative Priming Investigating the Temporal Course of Attentional Processing A Test of the Response-Retrieval Account of Negative Priming Matthias Ihrke 1,3 Jörg Behrendt 1,2 Hecke Schrobsdorff 1,3 Michael Herrman 1,3

More information

The Engineering of Emergence in Complex Adaptive Systems. Philosophiae Doctor

The Engineering of Emergence in Complex Adaptive Systems. Philosophiae Doctor The Engineering of Emergence in Complex Adaptive Systems by Anna Elizabeth Gezina Potgieter submitted in partial fulfilment of the requirements for the degree of Philosophiae Doctor (Computer Science)

More information

Echocardiography A powerful module of MediConnect

Echocardiography A powerful module of MediConnect Echocardiography A powerful module of MediConnect WHERE IT ALL COMES TOGETHER MEDICONNECT AN OVERVIEW Integrating the latest IT technologies with medical expertise within an existing clinical infrastructure

More information

Open Portable Platform for Hearing Aid Research

Open Portable Platform for Hearing Aid Research Open Portable Platform for Hearing Aid Research Hendrik Kayser Caslav Pavlovic, Volker Hohmann, Louis Wong, Tobias Herzke, S.R. Prakash, Paul Maanen, Zezhang Hou 03/03/2018 Digital hearing devices Medizinische

More information

DARC: Dynamic Analysis of Root Causes of Latency Distributions

DARC: Dynamic Analysis of Root Causes of Latency Distributions DARC: Dynamic Analysis of Root Causes of Latency Distributions Avishay Traeger, Ivan Deras, and Erez Zadok Computer Science Department, Stony Brook University Stony Brook, NY, USA {atraeger,iderashn,ezk}@cs.sunysb.edu

More information

Key Features. Product Overview

Key Features. Product Overview Second Generation IEEE 802.3at PSE Multi-Port Test Suite for the PowerSync Analyzer & Programmable Load Product Overview Key Features In-Depth System Testing of IEEE 802.3at PSE s Concurrently Analyze

More information

Available online at ScienceDirect. Procedia Computer Science 67 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 67 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 67 (2015 ) 185 192 6th International Conference on Software Development and Technologies for Enhancing Accessibility and

More information

Discovering Meaningful Cut-points to Predict High HbA1c Variation

Discovering Meaningful Cut-points to Predict High HbA1c Variation Proceedings of the 7th INFORMS Workshop on Data Mining and Health Informatics (DM-HI 202) H. Yang, D. Zeng, O. E. Kundakcioglu, eds. Discovering Meaningful Cut-points to Predict High HbAc Variation Si-Chi

More information

Application of Bayesian Networks to Quantitative Assessment of Safety Barriers Performance in the Prevention of Major Accidents

Application of Bayesian Networks to Quantitative Assessment of Safety Barriers Performance in the Prevention of Major Accidents 151 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 53, 2016 Guest Editors: Valerio Cozzani, Eddy De Rademaeker, Davide Manca Copyright 2016, AIDIC Servizi S.r.l., ISBN 978-88-95608-44-0; ISSN

More information

From Biostatistics Using JMP: A Practical Guide. Full book available for purchase here. Chapter 1: Introduction... 1

From Biostatistics Using JMP: A Practical Guide. Full book available for purchase here. Chapter 1: Introduction... 1 From Biostatistics Using JMP: A Practical Guide. Full book available for purchase here. Contents Dedication... iii Acknowledgments... xi About This Book... xiii About the Author... xvii Chapter 1: Introduction...

More information

Using Probabilistic Methods to Optimize Data Entry in Accrual of Patients to Clinical Trials

Using Probabilistic Methods to Optimize Data Entry in Accrual of Patients to Clinical Trials Using Probabilistic Methods to Optimize Data Entry in Accrual of Patients to Clinical Trials Bhavesh D. Goswami, Lawrence O. Hall, Dmitry B. Goldgof, Eugene Fink, and Jeffrey P. Krischer bgoswami@csee.usf.edu,

More information

How to Build the Management Mode for the Gymnasiums in Ordinary Universities in China

How to Build the Management Mode for the Gymnasiums in Ordinary Universities in China Journal of Sports Science 4 (2016) 226-231 doi: 10.17265/2332-7839/2016.04.006 D DAVID PUBLISHING How to Build the Management Mode for the Gymnasiums in in China Fengquan Yu Sports Sociology and Humanities,

More information

Measurement and Descriptive Statistics. Katie Rommel-Esham Education 604

Measurement and Descriptive Statistics. Katie Rommel-Esham Education 604 Measurement and Descriptive Statistics Katie Rommel-Esham Education 604 Frequency Distributions Frequency table # grad courses taken f 3 or fewer 5 4-6 3 7-9 2 10 or more 4 Pictorial Representations Frequency

More information

5/20/ Administration & Analysis of Surveys

5/20/ Administration & Analysis of Surveys 5/20/2015-1 Administration & Analysis of Surveys Goals Considerations when Administering Surveys Statistical Analysis of Surveys Examples of Reporting Survey Data 5/20/2015-2 Accuracy of Survey Data is

More information

Using Association Rule Mining to Discover Temporal Relations of Daily Activities

Using Association Rule Mining to Discover Temporal Relations of Daily Activities Using Association Rule Mining to Discover Temporal Relations of Daily Activities Ehsan Nazerfard, Parisa Rashidi, and Diane J. Cook School of Electrical Engineering and Computer Science Washington State

More information

Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection

Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection Marco Mamei DISMI, Università di Modena e Reggio Emilia Via Amendola 2, Reggio Emilia, Italy marco.mamei@unimore.it

More information

Senior Design Project

Senior Design Project Senior Design Project Project short-name: YouTalkWeSign Low-Level Design Report Abdurrezak Efe, Yasin Erdoğdu, Enes Kavak, Cihangir Mercan Supervisor:Hamdi Dibeklioğlu Jury Members: Varol Akman, Mustafa

More information

Hoare Logic and Model Checking. LTL and CTL: a perspective. Learning outcomes. Model Checking Lecture 12: Loose ends

Hoare Logic and Model Checking. LTL and CTL: a perspective. Learning outcomes. Model Checking Lecture 12: Loose ends Learning outcomes Hoare Logic and Model Checking Model Checking Lecture 12: Loose ends Dominic Mulligan Based on previous slides by Alan Mycroft and Mike Gordon Programming, Logic, and Semantics Group

More information

Fault Detection and Localisation in Reduced Test Suites

Fault Detection and Localisation in Reduced Test Suites UNIVERSITY OF SZEGED Fault Detection and Localisation in Reduced Test Suites Árpád Beszédes University of Szeged, Hungary The 29 th CREST Open Workshop, London November 2013 Overview University of Szeged,

More information

Knowledge Discovery and Data Mining Applied to Engineering Applications

Knowledge Discovery and Data Mining Applied to Engineering Applications Knowledge Discovery and Data Mining Applied to Engineering Applications Shirley Williams The University of Reading 25th September 2001 (c) Shirley Williams, 2001 1 Overview The process Understanding the

More information

ScienceDirect. Predictive Methodology for Diabetic Data Analysis in Big Data

ScienceDirect. Predictive Methodology for Diabetic Data Analysis in Big Data Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 50 (2015 ) 203 208 2nd International Symposium on Big Data and Cloud Computing (ISBCC 15) Predictive Methodology for Diabetic

More information

School of Management, NEW JERSEY INSTITUTE OF TECHNOLOGY Master of Science in Management (MSM)

School of Management, NEW JERSEY INSTITUTE OF TECHNOLOGY Master of Science in Management (MSM) School of Management, NEW JERSEY INSTITUTE OF TECHNOLOGY Master of Science in Management (MSM) Courses (30 credits) Semester Completed Note Requirement Module I: Core Courses (15 credits) ACCT 615 Management

More information

Towards an instrument for measuring sensemaking and an assessment of its theoretical features

Towards an instrument for measuring sensemaking and an assessment of its theoretical features http://dx.doi.org/10.14236/ewic/hci2017.86 Towards an instrument for measuring sensemaking and an assessment of its theoretical features Kholod Alsufiani Simon Attfield Leishi Zhang Middlesex University

More information

BAYESIAN NETWORKS AS KNOWLEDGE REPRESENTATION SYSTEM IN DOMAIN OF RELIABILITY ENGINEERING

BAYESIAN NETWORKS AS KNOWLEDGE REPRESENTATION SYSTEM IN DOMAIN OF RELIABILITY ENGINEERING TEKA Kom. Mot. i Energ. Roln. OL PAN, 2011, 11c, 173 180 BAYESIAN NETWORKS AS KNOWLEDGE REPRESENTATION SYSTEM IN DOMAIN OF RELIABILITY ENGINEERING Andrzej Kusz, Piotr Maksym, Andrzej W. Marciniak University

More information

Designing a Web Page Considering the Interaction Characteristics of the Hard-of-Hearing

Designing a Web Page Considering the Interaction Characteristics of the Hard-of-Hearing Designing a Web Page Considering the Interaction Characteristics of the Hard-of-Hearing Miki Namatame 1,TomoyukiNishioka 1, and Muneo Kitajima 2 1 Tsukuba University of Technology, 4-3-15 Amakubo Tsukuba

More information

Local Image Structures and Optic Flow Estimation

Local Image Structures and Optic Flow Estimation Local Image Structures and Optic Flow Estimation Sinan KALKAN 1, Dirk Calow 2, Florentin Wörgötter 1, Markus Lappe 2 and Norbert Krüger 3 1 Computational Neuroscience, Uni. of Stirling, Scotland; {sinan,worgott}@cn.stir.ac.uk

More information

Causal Modeling of the Glucose-Insulin System in Type-I Diabetic Patients J. Fernandez, N. Aguilar, R. Fernandez de Canete, J. C.

Causal Modeling of the Glucose-Insulin System in Type-I Diabetic Patients J. Fernandez, N. Aguilar, R. Fernandez de Canete, J. C. Causal Modeling of the Glucose-Insulin System in Type-I Diabetic Patients J. Fernandez, N. Aguilar, R. Fernandez de Canete, J. C. Ramos-Diaz Abstract In this paper, a simulation model of the glucoseinsulin

More information

Comparative Study of K-means, Gaussian Mixture Model, Fuzzy C-means algorithms for Brain Tumor Segmentation

Comparative Study of K-means, Gaussian Mixture Model, Fuzzy C-means algorithms for Brain Tumor Segmentation Comparative Study of K-means, Gaussian Mixture Model, Fuzzy C-means algorithms for Brain Tumor Segmentation U. Baid 1, S. Talbar 2 and S. Talbar 1 1 Department of E&TC Engineering, Shri Guru Gobind Singhji

More information

Modeling of Main Material and Energy Flows of a Chemicals Company and LCA of Products thereof

Modeling of Main Material and Energy Flows of a Chemicals Company and LCA of Products thereof 17 th European Symposium on Computer Aided Process Engineering ESCAPE17 V. Plesu and P.S. Agachi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Modeling of Main Material and Energy Flows of a Chemicals

More information

Visualizing Data for Hypothesis Generation Using Large-Volume Health care Claims Data

Visualizing Data for Hypothesis Generation Using Large-Volume Health care Claims Data Visualizing Data for Hypothesis Generation Using Large-Volume Health care Claims Data Eberechukwu Onukwugha PhD, School of Pharmacy, UMB Margret Bjarnadottir PhD, Smith School of Business, UMCP Shujia

More information

COURSE LISTING. Courses Listed. Training for Cloud with SAP Hybris in Service Cloud (C4C) 23 August 2018 (06:31 BST) Fortgeschrittene.

COURSE LISTING. Courses Listed. Training for Cloud with SAP Hybris in Service Cloud (C4C) 23 August 2018 (06:31 BST) Fortgeschrittene. Training for Cloud with SAP Hybris in Service Cloud (C4C) Courses Listed Fortgeschrittene C4C10 - SAP Hybris Cloud for Customer Administration C4C10E - SAP Hybris Cloud for Customer Administration C4C14

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction 1.1 Motivation and Goals The increasing availability and decreasing cost of high-throughput (HT) technologies coupled with the availability of computational tools and data form a

More information

Formalizing UMLS Relations using Semantic Partitions in the context of task-based Clinical Guidelines Model

Formalizing UMLS Relations using Semantic Partitions in the context of task-based Clinical Guidelines Model Formalizing UMLS Relations using Semantic Partitions in the context of task-based Clinical Guidelines Model Anand Kumar, Matteo Piazza, Silvana Quaglini, Mario Stefanelli Laboratory of Medical Informatics,

More information

Background Information

Background Information Background Information Erlangen, November 26, 2017 RSNA 2017 in Chicago: South Building, Hall A, Booth 1937 Artificial intelligence: Transforming data into knowledge for better care Inspired by neural

More information

Programme. Open Access Books & Journals

Programme. Open Access Books & Journals Programme Open Access Books & Journals Illustration inspired by the work of Alan Turing OA books in the wild How open access affects usage and reception of scholarly books Ros Pyne, Head of Policy & Development,

More information

A DATA MINING APPROACH FOR PRECISE DIAGNOSIS OF DENGUE FEVER

A DATA MINING APPROACH FOR PRECISE DIAGNOSIS OF DENGUE FEVER A DATA MINING APPROACH FOR PRECISE DIAGNOSIS OF DENGUE FEVER M.Bhavani 1 and S.Vinod kumar 2 International Journal of Latest Trends in Engineering and Technology Vol.(7)Issue(4), pp.352-359 DOI: http://dx.doi.org/10.21172/1.74.048

More information

Computational and visual analysis of brain data

Computational and visual analysis of brain data Scientific Visualization and Computer Graphics University of Groningen Computational and visual analysis of brain data Jos Roerdink Johann Bernoulli Institute for Mathematics and Computer Science, University

More information