Software bugs often arise from differences between what develop-ers envision their system does and what that system actually does. When faced with such conceptual inconsistencies, debugging can be very difficult. Inferring and presenting developers with accurate behavioral models of the system implementation can help devel-opers reconcile their view of the system with reality and improve system quality. We present Perfume, a model-inference algorithm that improves on the state of the art by using performance information to differ-entiate otherwise similar-appearing executions and to remove false positives from the inferred models. Perfume uses a system’s run-time execution logs to infer a concise, precise, and predictive fi-nite state machi...
Traditional means of gathering performance data are trac-ing, which is limited by the available stor...
Program verication is a promising approach to improving program quality, because it can search all p...
Robust distributed systems commonly employ high-level recov-ery mechanisms enabling the system to re...
Software bugs often arise because of differences between what de-velopers think their system does an...
The many configuration options of modern applications make it difficult for users to select a perfor...
Abstract—Modern applications (e.g., the so called Future Internet applications) exhibit properties t...
Many testing and analysis techniques use finite state mod-els to validate and verify the quality of ...
Models such as finite state automata are widely used to abstract the behavior of software systems b...
Currently, few tools are available for assisting developers with debugging intelligent systems. Beca...
Software library documentation often describes individual meth-ods ’ APIs, but not the intended prot...
Software library documentation often describes individual meth-ods ’ APIs, but not the intended prot...
This paper presents a methodology to detect the origin of closed-loop performance degradation of mod...
Performance bugs are frequently observed in commodity soft-ware. While profilers or source code-base...
Improvements in performance and energy efficiency often require deep understanding of the complex in...
Event logs have become a valuable information source for business process management, e.g., when ana...
Traditional means of gathering performance data are trac-ing, which is limited by the available stor...
Program verication is a promising approach to improving program quality, because it can search all p...
Robust distributed systems commonly employ high-level recov-ery mechanisms enabling the system to re...
Software bugs often arise because of differences between what de-velopers think their system does an...
The many configuration options of modern applications make it difficult for users to select a perfor...
Abstract—Modern applications (e.g., the so called Future Internet applications) exhibit properties t...
Many testing and analysis techniques use finite state mod-els to validate and verify the quality of ...
Models such as finite state automata are widely used to abstract the behavior of software systems b...
Currently, few tools are available for assisting developers with debugging intelligent systems. Beca...
Software library documentation often describes individual meth-ods ’ APIs, but not the intended prot...
Software library documentation often describes individual meth-ods ’ APIs, but not the intended prot...
This paper presents a methodology to detect the origin of closed-loop performance degradation of mod...
Performance bugs are frequently observed in commodity soft-ware. While profilers or source code-base...
Improvements in performance and energy efficiency often require deep understanding of the complex in...
Event logs have become a valuable information source for business process management, e.g., when ana...
Traditional means of gathering performance data are trac-ing, which is limited by the available stor...
Program verication is a promising approach to improving program quality, because it can search all p...
Robust distributed systems commonly employ high-level recov-ery mechanisms enabling the system to re...