Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering 2015
DOI: 10.1145/2786805.2786852
|View full text |Cite
|
Sign up to set email alerts
|

Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system software

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
98
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 142 publications
(100 citation statements)
references
References 50 publications
2
98
0
Order By: Relevance
“…With container image repositories, the usage statistics of configuration parameters can be collected by analyzing the configuration files in the image repositories built for the same piece of software. For popular software (e.g., those studied in [25]), there are typically thousands of image repositories made for different use cases and scenarios, containing a diverse set of configuration settings. 4 Moreover, as image repositories contain different versions of the target software and the configurations working for each version, mining these repositories enables the opportunities to understand software configuration with software evolution in depth.…”
Section: Opportunitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…With container image repositories, the usage statistics of configuration parameters can be collected by analyzing the configuration files in the image repositories built for the same piece of software. For popular software (e.g., those studied in [25]), there are typically thousands of image repositories made for different use cases and scenarios, containing a diverse set of configuration settings. 4 Moreover, as image repositories contain different versions of the target software and the configurations working for each version, mining these repositories enables the opportunities to understand software configuration with software evolution in depth.…”
Section: Opportunitiesmentioning
confidence: 99%
“…Historically, studying field configurations used ethnographic methods [3,8] and manual data collection from second-hand data sources [25,27]. For example, a study of how software is configured in the field [25] took six person-month to collect configuration files attached in issue reports on mailing lists and online forums. However, this dataset, despite the only one of its kind, is highly biased to misconfiguration cases and is incomplete-it is hard to determine the values referencing to execution context (e.g., environment variables and file content).…”
Section: Introductionmentioning
confidence: 99%
“…Here, |N | is the number of configuration options available in the software system. If the options for each configuration is binary, then there can be as much as 2 |N | possible configurations for a given system 1 configurations, we measure the performance of a subset of the 2 |N | samples, this subset is denoted by |C|. The performance of each of the |C| configurations are measured under different hardware (H), workloads (W ), and software versions (V ).…”
Section: Subject Systemsmentioning
confidence: 99%
“…1: Traditional Transfer Learning compared with using bellwethers to discover near optimal configurations. by other state-of-the-art transfer learners while requiring only 1 7 -th of the measurements needed by those other methods. Reducing the number of measurements is an important consideration since collecting data in this domain can be computationally and monetarily expensive.…”
Section: Introductionmentioning
confidence: 99%
“…For example, the scitkit-learn toolkit lists over a dozen configuration options for Logistic Regression 4 . This is an important point since recent research shows that the more settings we add to software, the harder it becomes for humans to use that software [105]. -Manually fine-tuning these parameters to obtain best results for a new data set, is not only tedious, but also can be biased by a human's (mis-)understanding of the inner workings of the data miner.…”
Section: Claim2: Optimizers Can Greatly Improve Data Minersmentioning
confidence: 99%