Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/582128.582139acmconferencesArticle/Chapter ViewAbstractPublication PagesfseConference Proceedingsconference-collections
Article

Enabling automatic adaptation in systems with under-specified elements

Published: 18 November 2002 Publication History

Abstract

Software that people use for everyday purposes is usually not mission critical---some failures can be tolerated. However, this software should be dependable enough for its intended use, even when users change expectations. Software systems that could adapt to accommodate both failures and changing user expectations could significantly improve the dependability of such everyday software. Many adaptation techniques require specifications of proper behavior (for detecting improper behavior) and problem severity, alternatives and their selection (for mitigation and for repair).However, the specifications of everyday software are usually incomplete and imprecise. This makes it difficult to determine the dependability of the software and even more difficult to adapt.We address the problem of detecting anomalies---deviations from expected behavior---when specifications of expected behavior are missing. Setting up anomaly detection depends on human participation, yielding predicates that can serve as proxies for missing specifications.We propose a template mechanism to lower the demands on human attention when setting up detection. We show how this mechanism may be used in our framework for enhancing dynamic data feeds with automatic adaptation. We discuss how the same mechanism may be used in repair. Our emphasis is on detecting semantic anomalies: cases in which the data feed is responsive and delivers well-formed results, but these results are unreasonable.

References

[1]
IBM. Autonomic Computing. URL: http://www.research.ibm.com/autonomic/overview/. Accessed November 2001.
[2]
IBM. eLiza: self-manging servers. URL: http://www-1.ibm.com/servers/eserver/introducing/eliza/. Accessed November 2001.
[3]
W3C. The Semantic Web, Activity. URL: http://www.w3.org/2001/sw/. Accessed November 2001.
[4]
Alexa browser enhancement. URL: http://www.alexa.com. Accessed April 2001.
[5]
G. Ammons, R. Bodik, and J. Larus. Mining specifi cations. In POPL, 2002.
[6]
M. Bauer and D. Dengler. Trias: Trainable information assistants for cooperative problem solving. In Intl' Conf' on Autonomous Agents, 1999.
[7]
W. Dickinson, D. Leon, and A. Podgurski. Finding failures by cluster analysis of execution profi les. In ICSE, 2001.
[8]
Stock quotes data source. URL: http://quote.pathfinder.com. Accessed September-November 2000.
[9]
D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as deviant behavior: A general approach to inferring errors in systems code. In SOSP, 2001.
[10]
M. Ernst, J. Cockrell, W. Griswold, and D. Notkin. Dynamically discovering likely program invariants to support program evolution. In IEEE TSE, 2000.
[11]
Google search engine (caching service). URL: http://www.google.com. Accessed April 2001.
[12]
Go!Zilla download manager. URL: http://www.gozilla.com. Accessed April 2001.
[13]
Rulequest. GritBot, autonomous data quality auditor. URL: http://www.rulequest.com/gritbot-info.html. Accessed January 2002.
[14]
S. Hofmeyr and S. Forrest. Architecture for an artifi cial immune system. In Evolutionary Computation Journal, 2000.
[15]
C. Knoblock, K. Lerman, S. Minton, and I. Muslea. Accurately and reliably extracting data from the web. In Data Engineering Bulletin, 1999.
[16]
N. Kushmerick. Regression testing for wrapper maintenance. In AAAI, 1999.
[17]
T. Lane and C. E. Brodley. Approaches to online learning and concept drift for user identifi cation in computer security. In KDD, 1998.
[18]
P. Langley. The computational support of scientific discovery. Human-Computer Studies, 2000.
[19]
K. Lerman and S. Minton. Learning the common structure of data. In AAAI, 2000.
[20]
R. Mackey, M. James, H. Park, and M. Zak. BEAM: Technology for autonomous self-analysis. In Aerospace Conference, 2001.
[21]
R. C. Miller and B. A. Myers. Outlier finding: Focusing user attention on possible errors. In UIST, 2001.
[22]
V. Raman and J. M. Hellerstein. Potters wheel: An interactive data cleaning system. In VLDB, 2001.
[23]
O. Raz, P. Koopman, and M. Shaw. Semantic anomaly detection in online data sources. In ICSE, 2002.
[24]
O. Raz and M. Shaw. An approach to preserving sufficient correctness in open resource coalitions. In IWSSD, 2000.
[25]
M. Shaw. Sufficient correctness and homeostasis in open resource coalitions. In ISAW, 2000.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WOSS '02: Proceedings of the first workshop on Self-healing systems
November 2002
120 pages
ISBN:1581136099
DOI:10.1145/582128
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 November 2002

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

WOSS02
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2017)A Survey about Self-Healing Systems (Desktop and Web Application)Communications and Network10.4236/cn.2017.9100409:01(71-88)Online publication date: 2017
  • (2010)Next-Generation Security Application DevelopmentEncyclopedia of Information Assurance10.1081/E-EIA-120046734(2015-2021)Online publication date: 20-Dec-2010
  • (2010)Intelligent Agents: Network SecurityEncyclopedia of Information Assurance10.1081/E-EIA-120046294(1647-1652)Online publication date: 20-Dec-2010
  • (2010)Adaptable Protocol FrameworkEncyclopedia of Information Assurance10.1081/E-EIA-120046274(26-32)Online publication date: 20-Dec-2010
  • (2009)Maintaining Network SecurityInformation Security Management Handbook, Sixth Edition10.1201/9781439833032.ch129(1721-1730)Online publication date: 4-Dec-2009
  • (2009)Network Security Utilizing an Adaptable Protocol FrameworkInformation Security Management Handbook, Sixth Edition10.1201/9781439833032.ch127(1699-1708)Online publication date: 4-Dec-2009
  • (2009)AdaptationInformation Security Management Handbook, Sixth Edition, Volume 210.1201/9781420067101.ch26(349-359)Online publication date: 3-Dec-2009
  • (2009)Maintaining Network SecurityInformation Security Management Handbook, Fifth Edition, Volume 310.1201/9781420003406.ch8(131-138)Online publication date: 24-Nov-2009
  • (2008)Prompt damage identification for system survivabilityInternational Journal of Information and Computer Security10.1504/IJICS.2008.0224902:4(411-433)Online publication date: 1-Jan-2008
  • (2007)Self-healing systems - survey and synthesisDecision Support Systems10.1016/j.dss.2006.06.01142:4(2164-2185)Online publication date: 1-Jan-2007
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media