2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR) 2021
DOI: 10.1109/msr52588.2021.00013
|View full text |Cite
|
Sign up to set email alerts
|

Mining Workflows for Anomalous Data Transfers

Abstract: Modern scientific workflows are data-driven and are often executed on distributed, heterogeneous, high-performance computing infrastructures. Anomalies and failures in the workflow execution cause loss of scientific productivity and inefficient use of the infrastructure. Hence, detecting, diagnosing, and mitigating these anomalies are immensely important for reliable and performant scientific workflows. Since these workflows rely heavily on high-performance network transfers that require strict QoS constraints… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 50 publications
0
6
0
1
Order By: Relevance
“…More specifically, Scott-Knott recursively partitions the list of candidates (c) into two sub-lists (c 1 and c 2 ) which the expected mean value before and after the division should be maximized [55], [56], [57]:…”
Section: Discussionmentioning
confidence: 99%
“…More specifically, Scott-Knott recursively partitions the list of candidates (c) into two sub-lists (c 1 and c 2 ) which the expected mean value before and after the division should be maximized [55], [56], [57]:…”
Section: Discussionmentioning
confidence: 99%
“…After that, Scott-Knott will declare the one of the split as the best split. The best split should maximize the difference 𝐸 (Δ) in the expected mean value before and after the split [40,46]:…”
Section: Discussionmentioning
confidence: 99%
“…Therefore, our observation may differ when different parameters are used. We would consider hyper-parameter tuning [39,40] in future work to mitigate this threat.…”
Section: Threats To Validitymentioning
confidence: 99%
“…To satisfy Sarro et al, we explored hyperparameter optimization. A common result in software analytics [1-3, 23, 24, 59, 60, 74, 76] (and other domains outside of SE [5,10,17,43,58,62]) is that automatic hyperparameter optimization algorithms can find good configuration settings. But for small data sets, these methods are highly error prone.…”
Section: Introductionmentioning
confidence: 99%