Have We Seen Enough Traces?
نویسندگان
چکیده
Dynamic specification mining extracts candidate specifications from logs of execution traces. Existing algorithms differ in the kinds of traces they take as input and in the kinds of candidate specification they present as output. One challenge common to all approaches relates to the faithfulness of the mining results: how can we be confident that the extracted specifications faithfully characterize the program we investigate? Since producing and analyzing traces is costly, how would we know we have seen enough traces? And, how would we know we have not wasted resources and seen too many of them? In this paper we address these important questions by presenting a novel, black box, probabilistic framework based on a notion of log completeness, and by applying it to three different well-known specification mining algorithms from the literature: k-Tails, Synoptic, and mining of scenario-based triggers and effects. Extensive evaluation over 24 models taken from 9 different sources shows the soundness, generalizability, and usefulness of the framework and its contribution to the state-of-the-art in dynamic specification mining.
منابع مشابه
Traces of Greek Mythology in Samuel Beckett’s Waiting for Godot
This study addresses Samuel Beckett’s most celebrated play, Waiting for Godot, in an effort to analyze its characters from a novel perspective. Since Greek mythology has been undisputedly influential on Western culture and literature, the researcher attempts to investigate a connection between Greek mythology and the play. This study aims to reveal that even after more than fifty seven years of...
متن کاملPRR Is Not Enough
We study the effects of wireless channel burstiness on TCP. We measure TCP throughput over single-hop link traces from MIT’s 802.11b Roofnet and Intel Berkeley’s 802.15.4 Mirage testbeds. We observe that links with the same packet reception ratio (PRR) have throughput variations of up to 320%. We find that differences in throughput are accompanied by differences in link burstiness. Using the Gi...
متن کاملThe Function of a Chlorite Hand-Bag of the Halil Rud Civilization as Inferred from Its Wear Traces
A chlorite “hand-bag” belonging to the once-called “intercultural style” production, currently on exhibit in the NationalArchaeological Museum, Tehran, is described focusing attention, for the first time, to the peculiar wear traces clearlyvisible on the handle and along its contour. The strong wear suggests that the hand-bag was suspended for a long time ona cord; and that in this setting it w...
متن کاملTime Series Learning using Monotonic Logical Properties
We propose a new paradigm for time-series learning where users implicitly specify families of signal shapes by choosing monotonic parameterized signal predicates. These families of predicates (also called specifications) can be seen as infinite Boolean feature vectors, that are able to leverage a user’s domain expertise and have the property that as the parameter values increase, the specificat...
متن کاملMonitoring Hierarchical Agent-based Simulation Traces
Due to their internal complexity, agent-based simulations are rarely amenable to conventional formal verification. With its focus on individual traces, runtime verification represents an interesting alternative for correctness assessment. Here, execution traces produced by the running system are observed by a monitor and checked for correctness on-the-fly. If the truth or falsity of a given pro...
متن کامل