Proceedings of the Tenth ACM International Conference on Embedded Software 2012
DOI: 10.1145/2380356.2380366
|View full text |Cite
|
Sign up to set email alerts
|

Debugging embedded multimedia application traces through periodic pattern mining

Abstract: Increasing complexity in both the software and the underlying hardware, and ever tighter time-to-market pressures are some of the key challenges faced when designing multimedia embedded systems. Optimizing the debugging phase can help to reduce development time significantly. A powerful approach used extensively during this phase is the analysis of execution traces. However, huge trace volumes make manual trace analysis unmanageable. In such situations, Data Mining can help by automatically discovering interes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…All of the above approaches are susceptible to producing a huge number of patterns, making the exploitation of their results difficult. The use of a condensed representation for periodic patterns [15] allows to significantly reduce the number of patterns output, without loss of information, but falls short of satisfactorily addressing the problem.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…All of the above approaches are susceptible to producing a huge number of patterns, making the exploitation of their results difficult. The use of a condensed representation for periodic patterns [15] allows to significantly reduce the number of patterns output, without loss of information, but falls short of satisfactorily addressing the problem.…”
Section: Related Workmentioning
confidence: 99%
“…They exhibit some resistance to noise, when it takes the form of slight variations in the inter-occurrence delay [2] or of the recurrence being limited to only a portion of the data [16]. However, such algorithms suffer from the traditional plague of pattern mining algorithms: they output too many patterns (up to several millions), even when relying on condensed representations [15].…”
Section: Introductionmentioning
confidence: 99%
“…Trace Analysis Flow : Dierent treatments are often needed to understand traces. Statistics provide general information about application behavior, while pattern recognition [9] or data mining algorithms [10] extract information and synthesize the trace representation. Besides, lters or noise elimination processes help to reduce the amount of information.…”
Section: Storage Of Big Traces : Execution Traces Of Embedded Systemsmentioning
confidence: 99%
“…By combining the analysis of application execution traces with machine learning techniques, we aim to enhance malware detection. Previous studies have emphasized the significance and utility of traces in monitoring computer system behavior [11], [12], [13], [14], [15].…”
Section: Introductionmentioning
confidence: 99%