首页 > 最新文献

Proceedings of the 2006 ACM symposium on Applied computing最新文献

英文 中文
On bounding energy consumption in dynamic, embedded real-time systems 动态嵌入式实时系统的边界能耗研究
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141494
H. Wu, B. Ravindran, E. Jensen
We present a CPU scheduling algorithm, called the Energy-Bounded Utility Accrual Algorithm (or EBUA). EBUA is a polynomial-time algorithm that satisfies bounds on system-level energy consumption and activities' accrued timeliness utility. We analytically establish several timeliness properties of EBUA. Our simulation experiments using AMD's (DVS-enabled) k6 processor model confirm the algorithm's effectiveness and superiority.
我们提出了一种CPU调度算法,称为能量有限效用应计算法(EBUA)。EBUA是一种多项式时间算法,它满足系统级能量消耗和活动累积时效性效用的界限。分析建立了EBUA的几个时效性性质。我们在AMD的k6处理器模型上进行了仿真实验,验证了该算法的有效性和优越性。
{"title":"On bounding energy consumption in dynamic, embedded real-time systems","authors":"H. Wu, B. Ravindran, E. Jensen","doi":"10.1145/1141277.1141494","DOIUrl":"https://doi.org/10.1145/1141277.1141494","url":null,"abstract":"We present a CPU scheduling algorithm, called the Energy-Bounded Utility Accrual Algorithm (or EBUA). EBUA is a polynomial-time algorithm that satisfies bounds on system-level energy consumption and activities' accrued timeliness utility. We analytically establish several timeliness properties of EBUA. Our simulation experiments using AMD's (DVS-enabled) k6 processor model confirm the algorithm's effectiveness and superiority.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122389533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BBQ: group-based querying in a ubiquitous environment BBQ:在无处不在的环境中基于组的查询
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141729
G. Lam, H. Leong, S. Chan
The cost of sending queries to a server is high for mobile ubiquitous hosts. To address this, we adopt query consolidation mechanism, by exploiting the knowledge of similar queries generated by neighboring hosts to the server, especially in location-dependent applications. We propose a group-based query processing scheme, where group members are close in location and moving direction, to collectively deliver the aggregate querying need from members to the server. A leader or boss elected within each group is responsible for gathering and consolidating data requests from members, within an adaptive query listening period. We conducted simulated experiments to study the performance improvement with our scheme.
对于无处不在的移动主机来说,向服务器发送查询的成本很高。为了解决这个问题,我们采用了查询整合机制,利用相邻主机对服务器生成的类似查询的知识,特别是在依赖于位置的应用程序中。我们提出了一种基于组的查询处理方案,其中组成员在位置和移动方向上都很接近,从而将组成员的聚合查询需求集体地传递给服务器。在每个组中选出的领导或老板负责在一个自适应的查询监听期内收集和整合来自成员的数据请求。我们进行了模拟实验来研究我们的方案对性能的改善。
{"title":"BBQ: group-based querying in a ubiquitous environment","authors":"G. Lam, H. Leong, S. Chan","doi":"10.1145/1141277.1141729","DOIUrl":"https://doi.org/10.1145/1141277.1141729","url":null,"abstract":"The cost of sending queries to a server is high for mobile ubiquitous hosts. To address this, we adopt query consolidation mechanism, by exploiting the knowledge of similar queries generated by neighboring hosts to the server, especially in location-dependent applications. We propose a group-based query processing scheme, where group members are close in location and moving direction, to collectively deliver the aggregate querying need from members to the server. A leader or boss elected within each group is responsible for gathering and consolidating data requests from members, within an adaptive query listening period. We conducted simulated experiments to study the performance improvement with our scheme.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122468153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An initial analysis and presentation of malware exhibiting swarm-like behavior 一个初步的分析和演示的恶意软件表现出类似群体的行为
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141356
F. C. Osorio, Zachi Klopman
The Slammer, which is currently the fastest computer worm in recorded history, was observed to infect 90 percent of all vulnerable Internets hosts within 10 minutes. Although the main action that the Slammer worm takes is a relatively unsophisticated replication of itself, it still spreads so quickly that human response was ineffective. Most proposed countermeasures strategies are based primarily on rate detection and limiting algorithms. However, such strategies are being designed and developed to effectively contain worms whose behaviors are similar to that of Slammer.In our work, we put forth the hypothesis that next generation worms will be radically different, and potentially such techniques will prove ineffective. Specifically, we propose to study a new generation of worms called "Swarm Worms", whose behavior is predicated on the concept of "emergent intelligence". Emergent Intelligence is the behavior of systems, very much like biological systems such as ants or bees, where simple local interactions of autonomous members, with simple primitive actions, gives rise to complex and intelligent global behavior. In this manuscript we will introduce the basic principles behind the idea of "Swarm Worms", as well as the basic structure required in order to be considered a "swarm worm". In addition, we will present preliminary results on the propagation speeds of one such swarm worm, called the ZachiK worm. We will show that ZachiK is capable of propagating at a rate 2 orders of magnitude faster than similar worms without swarm capabilities.
Slammer是目前有记录以来速度最快的计算机蠕虫,据观察,它可以在10分钟内感染90%的易受攻击的互联网主机。尽管Slammer蠕虫采取的主要行动是相对简单的自我复制,但它仍然传播得如此之快,以至于人类的反应无效。大多数提出的对策策略主要基于速率检测和限制算法。然而,这种策略正在被设计和开发,以有效地遏制行为类似于Slammer的蠕虫。在我们的工作中,我们提出了一个假设,即下一代蠕虫将完全不同,而且这些技术可能被证明是无效的。具体来说,我们建议研究新一代的蠕虫,称为“群虫”,其行为是基于“涌现智能”的概念。涌现智能是系统的行为,非常像蚂蚁或蜜蜂等生物系统,在这些系统中,自主成员之间简单的局部互动,以及简单的原始行为,产生了复杂而智能的全局行为。在本文中,我们将介绍“虫群”概念背后的基本原理,以及被认为是“虫群”所需的基本结构。此外,我们将介绍一种称为ZachiK虫的虫群的传播速度的初步结果。我们将证明ZachiK能够以比没有群体能力的类似蠕虫快2个数量级的速度传播。
{"title":"An initial analysis and presentation of malware exhibiting swarm-like behavior","authors":"F. C. Osorio, Zachi Klopman","doi":"10.1145/1141277.1141356","DOIUrl":"https://doi.org/10.1145/1141277.1141356","url":null,"abstract":"The Slammer, which is currently the fastest computer worm in recorded history, was observed to infect 90 percent of all vulnerable Internets hosts within 10 minutes. Although the main action that the Slammer worm takes is a relatively unsophisticated replication of itself, it still spreads so quickly that human response was ineffective. Most proposed countermeasures strategies are based primarily on rate detection and limiting algorithms. However, such strategies are being designed and developed to effectively contain worms whose behaviors are similar to that of Slammer.In our work, we put forth the hypothesis that next generation worms will be radically different, and potentially such techniques will prove ineffective. Specifically, we propose to study a new generation of worms called \"Swarm Worms\", whose behavior is predicated on the concept of \"emergent intelligence\". Emergent Intelligence is the behavior of systems, very much like biological systems such as ants or bees, where simple local interactions of autonomous members, with simple primitive actions, gives rise to complex and intelligent global behavior. In this manuscript we will introduce the basic principles behind the idea of \"Swarm Worms\", as well as the basic structure required in order to be considered a \"swarm worm\". In addition, we will present preliminary results on the propagation speeds of one such swarm worm, called the ZachiK worm. We will show that ZachiK is capable of propagating at a rate 2 orders of magnitude faster than similar worms without swarm capabilities.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122480785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Editorial message: special track on dependable and adaptive distributed systems 编辑信息:专门跟踪可靠和自适应分布式系统
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141431
K. M. Göschka, Svein O. Hallsteinsen, R. Oliveira, A. Romanovsky
Distributed systems and databases are at the core of the information society and increasingly pervade many aspects of our daily lives. While mobility and pervasiveness require support for systems that adapt themselves to changing environments, the middleware infrastructures become more and more heterogeneous and complex. In addition, we can see an increasing demand for dependability of such systems, taking into account the software as well as the surrounding environment. Generally, adaptiveness can either satisfy a change in user requirements or seek to fulfill the same requirements in a changing system context and environment. In particular, adaptation is also a means to achieve dependability in a computing infrastructure with dynamically varying structure and properties. Fault tolerance can consequently be seen as a special case, where the adaptation seeks to overcome an otherwise negative effect of a change in the computing infrastructure that can be classified as a fault. However, dependability can not only be achieved by fault tolerance, but also by other means like fault avoidance (e.g. through formal methods). Therefore, future middleware needs to support adaptiveness and dependability while maintaining scalability and mastering complexity. Still, software legacy must be integrated in a way, such that open and standardized interfaces support not only functional integration, but also a seamless integration of non-functional aspects. Moreover, service-oriented architectures need coordination in order to achieve dependability and can further benefit from context-aware approaches.
分布式系统和数据库是信息社会的核心,并日益渗透到我们日常生活的许多方面。虽然移动性和普遍性需要对能够适应不断变化的环境的系统提供支持,但中间件基础设施变得越来越异构和复杂。此外,考虑到软件和周围环境,我们可以看到对此类系统可靠性的需求越来越大。一般来说,适应性既可以满足用户需求的变化,也可以在不断变化的系统上下文和环境中寻求满足相同的需求。特别是,自适应也是在具有动态变化的结构和属性的计算基础设施中实现可靠性的一种手段。因此,容错可以被视为一种特殊情况,在这种情况下,适应性试图克服计算基础设施中可以归类为故障的更改的负面影响。然而,可靠性不仅可以通过容错来实现,还可以通过其他方式来实现,比如避免错误(例如通过形式化方法)。因此,未来的中间件需要在保持可伸缩性和控制复杂性的同时支持适应性和可靠性。但是,软件遗留必须以某种方式集成,这样开放和标准化的接口不仅支持功能集成,而且还支持非功能方面的无缝集成。此外,面向服务的体系结构需要协调才能实现可靠性,并进一步受益于上下文感知方法。
{"title":"Editorial message: special track on dependable and adaptive distributed systems","authors":"K. M. Göschka, Svein O. Hallsteinsen, R. Oliveira, A. Romanovsky","doi":"10.1145/1141277.1141431","DOIUrl":"https://doi.org/10.1145/1141277.1141431","url":null,"abstract":"Distributed systems and databases are at the core of the information society and increasingly pervade many aspects of our daily lives. While mobility and pervasiveness require support for systems that adapt themselves to changing environments, the middleware infrastructures become more and more heterogeneous and complex. In addition, we can see an increasing demand for dependability of such systems, taking into account the software as well as the surrounding environment. Generally, adaptiveness can either satisfy a change in user requirements or seek to fulfill the same requirements in a changing system context and environment. In particular, adaptation is also a means to achieve dependability in a computing infrastructure with dynamically varying structure and properties. Fault tolerance can consequently be seen as a special case, where the adaptation seeks to overcome an otherwise negative effect of a change in the computing infrastructure that can be classified as a fault. However, dependability can not only be achieved by fault tolerance, but also by other means like fault avoidance (e.g. through formal methods). Therefore, future middleware needs to support adaptiveness and dependability while maintaining scalability and mastering complexity. Still, software legacy must be integrated in a way, such that open and standardized interfaces support not only functional integration, but also a seamless integration of non-functional aspects. Moreover, service-oriented architectures need coordination in order to achieve dependability and can further benefit from context-aware approaches.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128474104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the use of spectral filtering for privacy preserving data mining 频谱滤波在保护隐私数据挖掘中的应用
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141418
Songtao Guo, Xintao Wu
Randomization has been a primary tool to hide sensitive private information during privacy preserving data mining. The previous work based on spectral filtering, show the noise may be separated from the perturbed data under some conditions and as a result privacy can be seriously compromised. In this paper, we explicitly assess the effects of perturbation on the accuracy of the estimated value and give the explicit relation on how the estimation error varies with perturbation. In particular, we derive one upper bound for the Frobenius norm of reconstruction error. This upper bound may be exploited by attackers to determine how close their estimates are from the original data using spectral filtering technique, which imposes a serious threat of privacy breaches.
在保护隐私的数据挖掘中,随机化是隐藏敏感隐私信息的主要工具。以往基于频谱滤波的研究表明,在某些条件下,噪声可能会从扰动数据中分离出来,从而严重损害隐私。本文明确地评估了摄动对估计精度的影响,并给出了估计误差随摄动的显式变化关系。特别地,我们导出了重构误差的Frobenius范数的一个上界。攻击者可以利用这个上限来确定他们的估计与原始数据使用频谱滤波技术的接近程度,这对隐私泄露造成了严重的威胁。
{"title":"On the use of spectral filtering for privacy preserving data mining","authors":"Songtao Guo, Xintao Wu","doi":"10.1145/1141277.1141418","DOIUrl":"https://doi.org/10.1145/1141277.1141418","url":null,"abstract":"Randomization has been a primary tool to hide sensitive private information during privacy preserving data mining. The previous work based on spectral filtering, show the noise may be separated from the perturbed data under some conditions and as a result privacy can be seriously compromised. In this paper, we explicitly assess the effects of perturbation on the accuracy of the estimated value and give the explicit relation on how the estimation error varies with perturbation. In particular, we derive one upper bound for the Frobenius norm of reconstruction error. This upper bound may be exploited by attackers to determine how close their estimates are from the original data using spectral filtering technique, which imposes a serious threat of privacy breaches.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128505942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Ubicomp assistant: an omnipresent customizable service using MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing) Ubicomp助手:一个使用MARKS的无所不在的定制服务(用于资源发现、知识可用性和自我修复的中间件适应性)
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141518
Moushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed
Due to the pervasive nature of current short range, low-power wireless connectivity and easy availability of low-cost light weight mobile devices, it is necessary to have an omnipresent customizable service. It can be used by different types of users different fields such as education, healthcare, marketing, or business, at any time, and at any place. These devices can reach ubiquitously to neighboring devices using a free short range ad hoc network. Unfortunately, to the best of our knowledge, no one has designed such a service. In this paper, we present the details of the Ubicomp Assistant (UA), which is designed to accomplish the above objectives. To evaluate the design, we have developed an application which uses UA as a service. It uses MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) as an underlying core service provider.
由于当前短距离、低功耗无线连接的普遍特性以及低成本轻量级移动设备的容易获得性,有必要拥有无处不在的定制服务。它可以被不同类型的用户在任何时间、任何地点、不同领域(如教育、医疗保健、营销或商业)使用。这些设备可以通过自由的短距离自组织网络无处不在地到达邻近设备。不幸的是,据我们所知,还没有人设计出这样的服务。在本文中,我们介绍了Ubicomp助手(UA)的细节,该助手旨在实现上述目标。为了评估设计,我们开发了一个使用UA作为服务的应用程序。它使用MARKS(用于资源发现、知识可用性和自我修复的中间件适应性)作为底层核心服务提供者。
{"title":"Ubicomp assistant: an omnipresent customizable service using MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing)","authors":"Moushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed","doi":"10.1145/1141277.1141518","DOIUrl":"https://doi.org/10.1145/1141277.1141518","url":null,"abstract":"Due to the pervasive nature of current short range, low-power wireless connectivity and easy availability of low-cost light weight mobile devices, it is necessary to have an omnipresent customizable service. It can be used by different types of users different fields such as education, healthcare, marketing, or business, at any time, and at any place. These devices can reach ubiquitously to neighboring devices using a free short range ad hoc network. Unfortunately, to the best of our knowledge, no one has designed such a service. In this paper, we present the details of the Ubicomp Assistant (UA), which is designed to accomplish the above objectives. To evaluate the design, we have developed an application which uses UA as a service. It uses MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) as an underlying core service provider.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123826580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Investigating the use of summarisation for interactive XML retrieval 研究交互式XML检索中摘要的使用
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141529
Z. Szlávik, A. Tombros, M. Lalmas
As the number of components in XML documents is much larger than that of 'flat' documents, we believe it is essential to provide users of XML information retrieval systems with overviews of the content of retrieved elements. In this paper, we investigate the use of summarisation in XML retrieval as a means of helping users in their searching process.
由于XML文档中的组件数量比“平面”文档大得多,我们认为有必要向XML信息检索系统的用户提供检索元素内容的概览。在本文中,我们研究了在XML检索中使用摘要作为帮助用户进行搜索过程的一种手段。
{"title":"Investigating the use of summarisation for interactive XML retrieval","authors":"Z. Szlávik, A. Tombros, M. Lalmas","doi":"10.1145/1141277.1141529","DOIUrl":"https://doi.org/10.1145/1141277.1141529","url":null,"abstract":"As the number of components in XML documents is much larger than that of 'flat' documents, we believe it is essential to provide users of XML information retrieval systems with overviews of the content of retrieved elements. In this paper, we investigate the use of summarisation in XML retrieval as a means of helping users in their searching process.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121464201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Evaluation measures for business process models 业务流程模型的评估方法
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141641
Elvira Rolón Aguilar, F. Ruiz, Félix García, M. Piattini
This work presents a set of measures to evaluate the structural complexity of business process models at a conceptual level, and also the general plan of a family of experiments whose aim is to validate the measures proposed. We believe that the early evaluation of business process models would provide business process management with support which would make their maintenance tasks easier. This proposal is based on the standard notation for business process modelling BPMN and on the adoption and extension of the FMESP framework.
这项工作提出了一组在概念层面上评估业务流程模型结构复杂性的措施,以及一系列实验的总体计划,其目的是验证所提出的措施。我们相信,业务流程模型的早期评估将为业务流程管理提供支持,从而使其维护任务更加容易。该建议基于业务流程建模BPMN的标准符号,以及FMESP框架的采用和扩展。
{"title":"Evaluation measures for business process models","authors":"Elvira Rolón Aguilar, F. Ruiz, Félix García, M. Piattini","doi":"10.1145/1141277.1141641","DOIUrl":"https://doi.org/10.1145/1141277.1141641","url":null,"abstract":"This work presents a set of measures to evaluate the structural complexity of business process models at a conceptual level, and also the general plan of a family of experiments whose aim is to validate the measures proposed. We believe that the early evaluation of business process models would provide business process management with support which would make their maintenance tasks easier. This proposal is based on the standard notation for business process modelling BPMN and on the adoption and extension of the FMESP framework.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124323349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
On handling conflicts between rules with numerical features 数值特征规则间冲突的处理
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141284
Tony Lindgren
Rule conflicts can arise in machine learning systems that utilise unordered rule sets. A rule conflict is when two or more rules cover the same example but differ in their majority classes. This conflict must be solved before a classification can be made. The standard methods for solving this type of problem are to use naive Bayes to solve the conflict or using the most frequent class (CN2). This paper studies the problem of rule conflicts in the area of numerical features. A novel family of methods, called distance based methods, for solving rule conflicts in continuous domains is presented. An empirical evaluation between a distance based method, CN2 and naive Bayes is made. It is shown that the distance based method significantly outperforms both naive Bayes and CN2.
规则冲突可能出现在使用无序规则集的机器学习系统中。规则冲突是指两个或多个规则覆盖相同的示例,但它们的多数类不同。在进行分类之前,必须先解决这一冲突。解决这类问题的标准方法是使用朴素贝叶斯来解决冲突或使用最频繁的类(CN2)。本文研究数值特征领域的规则冲突问题。提出了一种新的解决连续域规则冲突的方法,称为基于距离的方法。对基于距离的CN2方法和朴素贝叶斯方法进行了经验评价。结果表明,基于距离的方法显著优于朴素贝叶斯和CN2。
{"title":"On handling conflicts between rules with numerical features","authors":"Tony Lindgren","doi":"10.1145/1141277.1141284","DOIUrl":"https://doi.org/10.1145/1141277.1141284","url":null,"abstract":"Rule conflicts can arise in machine learning systems that utilise unordered rule sets. A rule conflict is when two or more rules cover the same example but differ in their majority classes. This conflict must be solved before a classification can be made. The standard methods for solving this type of problem are to use naive Bayes to solve the conflict or using the most frequent class (CN2). This paper studies the problem of rule conflicts in the area of numerical features. A novel family of methods, called distance based methods, for solving rule conflicts in continuous domains is presented. An empirical evaluation between a distance based method, CN2 and naive Bayes is made. It is shown that the distance based method significantly outperforms both naive Bayes and CN2.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127666314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Combining supervised and unsupervised monitoring for fault detection in distributed computing systems 结合监督与无监督监测的分布式计算系统故障检测
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141438
Haifeng Chen, Guofei Jiang, C. Ungureanu, K. Yoshihira
Fast and accurate fault detection is becoming an essential component of management software for mission critical systems. A good fault detector makes possible to initiate repair actions quickly, increasing the availability of the system. The contribution of this paper is twofold. First a new concept of supervised and unsupervised monitoring is proposed for system fault detection. We use a statistical method, canonical correlation analysis (CCA), to model the contextual dependencies between system inputs u and internal behavior x. By means of CCA, the space x is transformed into two subsets of variables, which are monitored in a supervised and unsupervised manner respectively. By doing so, our approach can reduce the false alarms resulting from unusual workload changes, and hence achieve high fault detection rate. Second, in order to test the performance of our approach, we simulate a variety of system faults in a real e-commerce application based on the multi-tiered J2EE architecture. Experimental results demonstrate that the CCA based approach can detect injected failures at their early stages when unusual phenomenon is very weak, and hence contribute to enormous time and cost savings in managing large scale distributed systems.
快速、准确的故障检测正成为关键任务系统管理软件的重要组成部分。一个好的故障检测器可以快速启动修复行动,增加系统的可用性。本文的贡献是双重的。首先提出了系统故障检测的监督监测和无监督监测的新概念。我们使用典型相关分析(CCA)的统计方法来建模系统输入u与内部行为x之间的上下文依赖关系。通过典型相关分析,将空间x转换为两个变量子集,分别以监督和无监督的方式进行监测。通过这样做,我们的方法可以减少异常工作负载变化导致的假警报,从而实现高故障检测率。其次,为了测试我们的方法的性能,我们在基于多层J2EE体系结构的真实电子商务应用程序中模拟了各种系统故障。实验结果表明,基于CCA的方法可以在异常现象非常弱的早期阶段检测到注入故障,从而为大规模分布式系统的管理节省了大量的时间和成本。
{"title":"Combining supervised and unsupervised monitoring for fault detection in distributed computing systems","authors":"Haifeng Chen, Guofei Jiang, C. Ungureanu, K. Yoshihira","doi":"10.1145/1141277.1141438","DOIUrl":"https://doi.org/10.1145/1141277.1141438","url":null,"abstract":"Fast and accurate fault detection is becoming an essential component of management software for mission critical systems. A good fault detector makes possible to initiate repair actions quickly, increasing the availability of the system. The contribution of this paper is twofold. First a new concept of supervised and unsupervised monitoring is proposed for system fault detection. We use a statistical method, canonical correlation analysis (CCA), to model the contextual dependencies between system inputs u and internal behavior x. By means of CCA, the space x is transformed into two subsets of variables, which are monitored in a supervised and unsupervised manner respectively. By doing so, our approach can reduce the false alarms resulting from unusual workload changes, and hence achieve high fault detection rate. Second, in order to test the performance of our approach, we simulate a variety of system faults in a real e-commerce application based on the multi-tiered J2EE architecture. Experimental results demonstrate that the CCA based approach can detect injected failures at their early stages when unusual phenomenon is very weak, and hence contribute to enormous time and cost savings in managing large scale distributed systems.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126294020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Proceedings of the 2006 ACM symposium on Applied computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1