Michael Stroucken

Learn More
The causes of performance changes in a distributed system often elude even its developers. This paper develops a new technique for gaining insight into such changes: comparing request flows from two executions (e.g., of two system versions or time periods). Building on end-to-end request-flow tracing within and across components, algorithms are described(More)
Big Data applications, those that require large data corpora either for correctness or for fidelity, are becoming increasingly prevalent. Tashi is a cluster management system designed particularly for enabling cloud computing applications to operate on repositories of Big Data. These applications are extremely scalable but also have very high resource(More)
Recent years have seen a dramatic increase in the number and importance of mobile devices. The security properties that these devices provide to their applications, however, are inadequate to protect against many undesired behaviors. A broad class of such behaviors is violations of simple informationflow properties. This paper proposes an enforcement system(More)
The causes of performance changes in a distributed system often elude even its developers. This paper develops a new technique for gaining insight into such changes: comparing system behaviours from two executions (e.g., of two system versions or time periods). Building on end-to-end request flow tracing within and across components, algorithms are(More)
time monitoring and formal analysis of information flows in Chromium. We use labels to specify information flow policies. We first introduce the syntax of labels and operations on labels. Then, we discuss how these labels can be used to implement various policies present in browsers today. An information flow label, written (S , I , D), is composed of a(More)
Web browsers are a key enabler of a wide range of online services, from shopping and email to banking and health services. Because these services frequently involve handling sensitive data, a wide range of web browser security policies and mechanisms has been implemented or proposed to mitigate the dangers posed by malicious code and sites. This paper(More)
Automatic identification of anomalies for performance diagnosis in the cloud computing is a fundamental and challenging issue. TPA is interested to identifies these anomalies and remove them so that the performance of the cloud systems increased. In this paper we are proposing an Automatic Black Box Anomaly Detector which can find anomalies automatically(More)
time monitoring and formal analysis of information flows in Chromium. We use labels to specify information flow policies. We first introduce the syntax of labels and operations on labels. Then, we discuss how these labels can be used to implement various policies present in browsers today. An information flow label, written (S , I , D), is composed of a(More)
  • 1