Learn More
We present a method for automatically extracting from a running system an indexable <i>signature</i> that distills the essential characteristic from a system state and that can be subjected to automated clustering and similarity-based retrieval to identify when an observed system state is similar to a previously-observed state. This allows operators to(More)
Violations of service level objectives (SLO) in Internet services are urgent conditions requiring immediate attention. Previously we explored (I. Cohen et al., 2004) an approach for identifying which low-level system properties were correlated to high-level SLO violations (the metric attribution problem). The approach is based on automatically inducing(More)
This paper demonstrates that the dependability of generic, evolving J2EE applications can be enhanced through a combination of a few recovery-oriented techniques. Our goal is to reduce downtime by automatically and efficiently recovering from a broad class of transient software failures without having to modify applications. We describe here the integration(More)
Most modern systems generate abundant and diverse log data. With dwindling storage costs, there are fewer reasons to summarize or discard data. However, the lack of tools to efficiently store and cross-correlate heterogeneous datasets makes it tedious to mine the data for analytic insights. In this paper, we present Splunk, a semi-structured time series(More)
Recent research activity [2, 12, 27, 10, 1] has shown encouraging results for performance debugging and failure diagnosis and detection in systems by using approaches based on automatically inducing models and deriving correlations from observed data. This paper explores research questions and preliminary results regarding the next steps in advancing this(More)
In the last few years, digital image watermarking have been proposed as a solution for solving the illegal copying and proof of ownership problem in the context of multimedia object. But it is still difficult have a rough standard of their performances and hence to compare them. So we propose a suggestion standard based on the hiding property and robustness(More)
Loss of dopaminergic neurons is primarily responsible for the onset and progression of Parkinson's disease (PD); thus, neuroprotective and/or neuroregenerative strategies remain critical to the treatment of this increasingly prevalent disease. Here we explore a novel approach to neurotrophic factor-based therapy by engineering zinc finger protein(More)
—Java virtual machine (JVM) provides a virtualized execution environment for Java applications. To maintain safety and efficiency of the execution environment, JVM employs some major runtime subsystems such as garbage collection, just-in-time compilation and lock management. Recent work found that the runtime overheads increase significantly when workload(More)
  • 1