The smart factory is characterized by the high value of industrial big data, the applications of IoT(Internet of Things) technologies and cloud computing technologies. Developing an industrial big data system is a com...
详细信息
ISBN:
(纸本)9781538693414
The smart factory is characterized by the high value of industrial big data, the applications of IoT(Internet of Things) technologies and cloud computing technologies. Developing an industrial big data system is a comprehensive challenge job as it involves both software and hardware. Big data are pervasive in all the lifecycle of the industrial product. Thus, developing an industrial big data system is different from that of the traditional business process system. We noticed there is not much emphasis on the design concerns for industrial big data system from the product lifecycle view in the smart factory domain. In this paper, the challenges that industrial big data systems meet in the smart factory domain are discussed. The domain requirements are analyzed. The design concerns for industrial big data-based system are abstracted from the product lifecycle view. The design concerns are focused on the requirements from the acquirers, system builders, and other stakeholders of smart factory. Furthermore, we demonstrate the instantiation to define solutions about smart fault diagnosis for complex equipment based on big operation data including the architecture design, data management, data analysis, and services provider.
Re-occurrence of the same problem is very common in many large software products. By matching the symptoms of a new problem to those in a database of known problems, automated diagnosis and even self-healing for re-oc...
详细信息
ISBN:
(纸本)9781424408313
Re-occurrence of the same problem is very common in many large software products. By matching the symptoms of a new problem to those in a database of known problems, automated diagnosis and even self-healing for re-occurrences can be (partially) realized. This paper exploits function call stacks as highly structured symptoms of a certain class of problems, including crashes, hangs, and traps. We propose and evaluate algorithms for efficiently and accurately matching call stacks by a weighted metric of the similarity of their function names, after first removing redundant recursion and uninformative (poor discriminator) functions from those stacks. We also describe a new indexing scheme to speed queries to the repository of known problems, without compromising the quality of matches returned Experiments conducted using call stacks from actual product problem reports demonstrate the improved accuracy (both precision and recall) resulting from our new stack-matching algorithms and removal of uninformative or redundant function names, as well as the performance and scalability improvements realized by indexing call stacks. We also discuss how call-stack matching can be used in both self-managing (or autonomic systems) and human "help desk" applications.
Finite state verification is emerging as an important technology for proving properties about software. In our experience, we have found that analysts have different expectations at different rimes. When an analyst is...
详细信息
ISBN:
(纸本)0769510507
Finite state verification is emerging as an important technology for proving properties about software. In our experience, we have found that analysts have different expectations at different rimes. When an analyst is in an exploratory mode, initially formulating and verifying properties, analyses usually find inconsistencies because of flaws in the properties or in the software artifacts being analyzed. Once an inconsistency is found, the analyst begins to operate in a fault finding mode, during which meaningful counter example traces are needed to help determine the cause of the inconsistency. Eventually systems become relatively stable, but still require re-verification as evolution occurs. During such periods, the analyst is operating in a maintenance mode and would expect re-verification to usually report consistent results. Although it could be that one algorithm suits all three of these modes of use, the hypothesis explored here is that each would be best served by an algorithm optimized for the expectations of the analyst.
software bugs reported by human users and automatic error reporting software are often stored in some bug tracking tools (e.g., Bugzilia and Debbugs). These accumulated bug reports may contain valuable information tha...
详细信息
ISBN:
(纸本)1891706292
software bugs reported by human users and automatic error reporting software are often stored in some bug tracking tools (e.g., Bugzilia and Debbugs). These accumulated bug reports may contain valuable information that could be used to improve the quality of the bug reporting, reduce the quality assurance effort and cost, analyze software reliability, and predict future bug report trend. In this paper, we present BugMiner, a tool that is able to derive useful information from historic bug report database using data mining, use these information to do completion check and redundancy check on a new or given bug report, and to estimate the bug report trend using statistical analysis. Our empirical studies of the tool using several real-world bug report repositories show that it is effective, easy to implement, and has relatively high accuracy despite low quality data.
Global software development is rapidly becoming the norm for technology companies. Previous qualitative research suggests that multi-site development may increase development cycle time. We use both survey data and da...
详细信息
ISBN:
(纸本)0769510507
Global software development is rapidly becoming the norm for technology companies. Previous qualitative research suggests that multi-site development may increase development cycle time. We use both survey data and data from the source code change management system to model the extent of delay in a multi-site software development organization, and explore several possible mechanisms for this delay. We also measure differences in same-site and cross-site communication patterns, and analyze the relationship of these variables to delay. Our results show that compared to same-site work, cross-site work takes much longer, and requires more people for work of equal size and complexity. We also report a strong relationship between delay in cross-site work and the degree to which remote colleagues are perceived to help out when workloads are heavy. We discuss implications of our findings for collaboration technology for distributed software development.
Control theory is a well established discipline that has emerged from aeronautical, electrical, and mechanical engineering to provide a formal approach to building robust systems. While similar robustness concerns exi...
详细信息
ISBN:
(纸本)9781424408313
Control theory is a well established discipline that has emerged from aeronautical, electrical, and mechanical engineering to provide a formal approach to building robust systems. While similar robustness concerns exist in database management systems, control theory is rarely used due to the lack of canonical control models and a dearth of control theory expertise among database researchers. We discuss our experience with using control theory to build self managing databases, showing experimental results, discussing pitfalls and limitations, and contrasting formal models against with feedback loops. While our experience indicates that control theory is a good paradigm for database self management, control theory should be used judiciously since its techniques are not suited to all problems in database administration.
The objective of feature selection is to identify irrelevant and redundant features, which can then be discarded from the analysis. Reducing the number of metrics (features) in a data set can lead to faster software q...
详细信息
ISBN:
(纸本)1891706292
The objective of feature selection is to identify irrelevant and redundant features, which can then be discarded from the analysis. Reducing the number of metrics (features) in a data set can lead to faster software quality model training and improved classifier performance. In this study we focus on feature ranking using linear Support Vector Machines (SVM) which is implemented in WEKA. The contribution of this study is to provide an extensive empirical evaluation of SVM rankers built from unbalanced data. Should the features be removed at each iteration? What should the recommended value be for the tolerance parameter? We address these and other related issues in this work.
In this paper, we illustrate how to enhance an existing state-of-the-art modeling language and tool for the Internet of Things (IoT), called ThingML, to support machine learning on the modeling level. To this aim, we ...
详细信息
ISBN:
(纸本)9781450381352
In this paper, we illustrate how to enhance an existing state-of-the-art modeling language and tool for the Internet of Things (IoT), called ThingML, to support machine learning on the modeling level. To this aim, we extend the Domain-Specific Language (DSL) of ThingML, as well as its code generation framework. Our DSL allows one to define things, which are in charge of carrying out data analytics. Further, our code generators can automatically produce the complete implementation in Java and Python. The generated Python code is responsible for data analytics and employs APIs of machine learning libraries, such as Keras, Tensorflow and Scikit Learn. Our prototype is available as open source software on Github.
We propose an interactive fault localization method based on two data mining techniques, formal concept analysis and association rules. A lattice formalizes the partial ordering and the dependencies between the sets o...
详细信息
ISBN:
(纸本)1891706292
We propose an interactive fault localization method based on two data mining techniques, formal concept analysis and association rules. A lattice formalizes the partial ordering and the dependencies between the sets of program elements (e.g., lines) that are most likely to lead to program execution failures. The paper provides an algorithm to traverse that lattice starting from the most suspect places. The main contribution is that the algorithm is able to deal with any number of faults within a single execution of a test suite. In addition, a stopping criterion independent of the number of faults is provided.
Proceedings includes 53 papers (4 appear in abstract form only) presented in 25 sessions dealing with various aspects of productivity and its associated measures, human factors quality assurance, experience with tools...
详细信息
Proceedings includes 53 papers (4 appear in abstract form only) presented in 25 sessions dealing with various aspects of productivity and its associated measures, human factors quality assurance, experience with tools, computer software and hardware, education, mathematical models, data base systems, standards, tool evaluation, management, office automation, the role played by the US Dept of Defense, software product quality as well as computer architecture. Topics covered include: programming languages, integrated circuits, image processing, industrial engineering and hierarchical control. Technical and professional papers from this conference are indexed with the conference code no. 00118 in the Ei engineering Meetings (TM) database produced by engineering Information, Inc.
暂无评论