Darvishi et al., 2024 - Google Patents
Toward adaptive tracing: Efficient system behavior analysis using language modelsDarvishi et al., 2024
- Document ID
- 10701248147899472431
- Author
- Darvishi K
- Noferesti M
- Ezzati-Jivan N
- Publication year
- Publication venue
- Proceedings of the 2024 ACM/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results
External Links
Snippet
Tracing, a technique essential for unraveling the complexities of computer systems' behavior, involves the organized collection of low-level events, enabling anomaly identification, performance debugging, and root cause analysis. However, the significant …
- 238000004458 analytical method 0 title abstract description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
- G06F11/3636—Software debugging by tracing the execution of the program
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
- G06F11/0775—Content or structure details of the error report, e.g. specific table structure, specific error fields
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/86—Event-based monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN109241740B (en) | Malware benchmark test set generation method and device | |
| He et al. | Learning from open-source projects: An empirical study on defect prediction | |
| US8185781B2 (en) | Invariants-based learning method and system for failure diagnosis in large scale computing systems | |
| Yu et al. | Deep learning or classical machine learning? an empirical study on log-based anomaly detection | |
| Sayadi et al. | Comprehensive assessment of run-time hardware-supported malware detection using general and ensemble learning | |
| Chiang et al. | Modeling entity evolution for temporal record matching | |
| Chen et al. | Exploring better black-box test case prioritization via log analysis | |
| Zhao et al. | Predicting performance anomalies in software systems at run-time | |
| Tu et al. | FRUGAL: Unlocking semi-supervised learning for software analytics | |
| Zhang et al. | SentiLog: Anomaly detecting on parallel file systems via log-based sentiment analysis | |
| Ozcelik et al. | Seer: a lightweight online failure prediction approach | |
| CN114741369A (en) | A system log detection method based on self-attention mechanism of graph network | |
| CN110956278A (en) | Method and system for retraining machine learning models | |
| Yolacan et al. | System call anomaly detection using multi-hmms | |
| CN119690725B (en) | Intelligent prediction and tracking method and system for memory leaks in microservice architecture | |
| Duan et al. | Aclog: An approach to detecting anomalies from system logs with active learning | |
| Suhuan et al. | Android malware detection based on logistic regression and xgboost | |
| CN109918901A (en) | A method for real-time detection of cache-based attacks | |
| Weeraddana et al. | Characterizing timeout builds in continuous integration | |
| Darvishi et al. | Toward adaptive tracing: Efficient system behavior analysis using language models | |
| CN118966768A (en) | Project risk identification method, device, computer program product and electronic device | |
| CN118820026A (en) | Cloud service cluster status monitoring method, device, equipment and storage medium | |
| US20220027779A1 (en) | Value over replacement feature (vorf) based determination of feature importance in machine learning | |
| Ma | Anomaly detection for Linux system log | |
| Jiao et al. | Evaluating Large Language Model Application Impacts on Evasive Spectre Attack Detection. |