14th International Conference on Distributed Computing Systems
DOI: 10.1109/icdcs.1994.302445
|View full text |Cite
|
Sign up to set email alerts
|

Using perturbation tracking to compensate for intrusion in message-passing systems

Abstract: Execution monitoring plays a central role in most software development tools for parallel and distributed computer systems. However, such monitoring may induce delays that corrupt event timing. If this corruption can be quantified it may be possible to determine the intrusion-free behavior. In this paper we describe an algorithm that, given a safe timed Petri net model of the monitored software, can determine the uncorrupted timestamp values, i.e., those that would have been observed had the delays not been pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…First, instrumentation is necessary in either the application itself or a library that the application calls. Second, the perturbation introduced by tracing can change the results of the analysis [7]. Third, tracing generates a tremendous volume of data.…”
Section: Tracing Mpi Applicationsmentioning
confidence: 99%
“…First, instrumentation is necessary in either the application itself or a library that the application calls. Second, the perturbation introduced by tracing can change the results of the analysis [7]. Third, tracing generates a tremendous volume of data.…”
Section: Tracing Mpi Applicationsmentioning
confidence: 99%
“…Several researchers have developed techniques to attempt to remove overheads from the reported data [14,20,69,72,76]. Yan and Listgarten [76] specifically addressed the overhead of writing the trace buffer to disk in AIMS by generating an event marker for these write operations and removing the overhead in a postprocessing step.…”
Section: Perturbationmentioning
confidence: 99%
“…If we choose a threshold of 0.2, then the highest the computed distance can be for a match is 10.2, so s2 and sl will not match using any of the Minkowski distances. When we compare sO, (50,1,20,21,49), with s2, we get distances of 8, 4.5, and 3. The maximum value in the two vectors is 50, so the highest the distances can be for a match is 10.…”
Section: Minkowski Distancementioning
confidence: 99%
“…Postprocessing of the traces is carried out to compensate for intrusive effects of monitoring. Such techniques have been explored by Malony et al [7,91 and Casavant et al [4]. Models of perturbation in execution have been developed and used to process traces for predicting true performance.…”
Section: Introductionmentioning
confidence: 99%