2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE) 2016
DOI: 10.1109/issre.2016.45
|View full text |Cite
|
Sign up to set email alerts
|

Cause Points Analysis for Effective Handling of Alarms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…Semi-automic diagnosis [14,54,148,149,189,193] Feedback-based [114,153] Checklists [8,140] UI & navigation tools [5,21,33,70,79,138] Alarm-relevant queries [42,80,127,190] Automated repair [12,15,115,116,179] Others [6,112,119,121,133,136,144] Fig. 1.…”
Section: Overview Of the Extracted Datamentioning
confidence: 99%
“…Semi-automic diagnosis [14,54,148,149,189,193] Feedback-based [114,153] Checklists [8,140] UI & navigation tools [5,21,33,70,79,138] Alarm-relevant queries [42,80,127,190] Automated repair [12,15,115,116,179] Others [6,112,119,121,133,136,144] Fig. 1.…”
Section: Overview Of the Extracted Datamentioning
confidence: 99%
“…Then they use a different technique for each identified root cause to eliminate any generated alert. Authors [26] aims to reduce false alerts by reporting to the SAT user the alarm root causes to be inspected instead of the alarm itself. Also, they ask the user to answer questions related to the root causes to fix the error until no more alarm is triggered.…”
Section: B Root Causes Based Approachesmentioning
confidence: 99%
“…On the similar lines to alarms repositioning, Cousot et al [8] have proposed hoisting necessary preconditions for providing the preconditions required by the Design by Contract [23]. Furthermore, Muske et al [25] have proposed grouping the related/similar alarms based on similarity of modification points. In their approach [24], as the grouped alarms are inspected using values at the modification points of alarm variables, the inspection often finds spurious errors when the alarms are actually false positives solely due to their transitive control dependencies (ICDs).…”
Section: Related Workmentioning
confidence: 99%
“…In their approach [24], as the grouped alarms are inspected using values at the modification points of alarm variables, the inspection often finds spurious errors when the alarms are actually false positives solely due to their transitive control dependencies (ICDs). However, none of these techniques [8,24,25] identifies the conditional statements (control dependencies) that are non-impacting to the similar alarms.…”
Section: Related Workmentioning
confidence: 99%