SPADE on Android

Slides:



Advertisements
Similar presentations
Provenance-Aware Storage Systems Margo Seltzer April 29, 2005.
Advertisements

Dynamic Data Partitioning for Distributed Graph Databases Xavier Martínez Palau David Domínguez Sal Josep Lluís Larriba Pey.
PROVENANCE FOR THE CLOUD (USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES(FAST `10)) Kiran-Kumar Muniswamy-Reddy, Peter Macko, and Margo Seltzer Harvard.
ASCR Data Science Centers Infrastructure Demonstration S. Canon, N. Desai, M. Ernst, K. Kleese-Van Dam, G. Shipman, B. Tierney.
Insider for Oracle The Art Of Performance Tuning.
Project Overview Goal: Instrumentation and Measurement capabilities for GENI experimenters and operations Outcomes: Software to perform centralized and.
SPICE! An Ontology Based Web Application By Angela Maduko and Felicia Jones Final Presentation For CSCI8350: Enterprise Integration.
Using Provenance to Support Real-Time Collaborative Design of Workflows Workflow evolution provenance and OPM Tommy Ellkvist and Juliana Freire.
Vlad: A Visual Annotation Display Tool Joel Richardson Mouse Genome Informatics The Jackson Laboratory.
Comparing path-based and vertically-partitioned RDF databases Preetha Lakshmi & Chris Mueller 12/10/2007 CSCI 8715 Shashi Shekhar.
Welcome!. Jay Lepreau 1952–2008 “[An] archive will allow published research to be connected to its sources in ways that support new analyses and new.
CRM Chapter 3 Data-Driven CRM vs. Process- Driven CRM.
Progress Report 11/1/01 Matt Bridges. Overview Data collection and analysis tool for web site traffic Lets website administrators know who is on their.
Comparing path-based and vertically-partitioned RDF databases Preetha Lakshmi & Chris Mueller 12/10/2007 CSCI 8715 Shashi Shekhar.
What Can You do With BTM? Business Transaction Management touches the following disciplines:  Performance Management  Application Management  Capacity.
What are the functions of an operating system? The operating system is the core software component of your computer. It performs many functions and is,
Capabilities Briefing
Rainbow Facilitating Restorative Functionality Within Distributed Autonomic Systems Philip Miseldine, Prof. Taleb-Bendiab Liverpool John Moores University.
Provenance-aware Storage Systems Kiran-Kumar Muniswamy-Reddy David A. Holland Uri Braun Margo Seltzer Harvard University.
Cracow Grid Workshop 2003 Institute of Computer Science AGH A Concept of a Monitoring Infrastructure for Workflow-Based Grid Applications Bartosz Baliś,
Testing Tools. Categories of testing tools Black box testing, or functional testing Testing performed via GUI. The tool helps in emulating end-user actions.
DCS Overview MCS/DCS Technical Interchange Meeting August, 2000.
UI and Data Entry UI and Data Entry Front-End Business Logic Mid-Tier Data Store Back-End.
© 2010 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Adobe Flash Catalyst for Agile Interaction Design Harish Sivaramakrishnan |
Usage of `provenance’: A Tower of Babel Luc Moreau.
How to solve a SQL performance problem Paul Zgondea.
Android for Java Developers Denver Java Users Group Jan 11, Mike
EGrid Software Packages Overview. EGrid Introduction Egrid Introduction : A description of the main software packages EGrid Inside : A detailed description.
INFSO-RI Enabling Grids for E-sciencE Logging and Bookkeeping and Job Provenance Services Ludek Matyska (CESNET) on behalf of the.
The iPlant Collaborative Community Cyberinfrastructure for Life Science Tools and Services Workshop Objectives.
Work Flow Control and Documentation Name: J. Douglas Wells Sponsor: Molded Plastic Ventures (MPV)
1 Software Reliability Assurance for Real-time Systems Joel Henry, Ph.D. University of Montana NASA Software Assurance Symposium September 4, 2002.
Roberto Paleari,Universit`a degli Studi di Milano Lorenzo Martignoni,Universit`a degli Studi di Udine Emanuele Passerini,Universit`a degli Studi di Milano.
GIS-Tranplan Interface Sponsored by: Iowa DOT Project Team Members: Jerry Shadewald Richard Storm.
Data storage management and user profiling with AI methods W. Funika, F.Szura, J.Kitowski KUKDM 2015, Zakopane.
1 © 1999 Microsoft Corp.. Microsoft Repository Phil Bernstein Microsoft Corp.
1 Program Slicing Amir Saeidi PhD Student UTRECHT UNIVERSITY.
Large Scale Nuclear Physics Calculations in a Workflow Environment and Data Provenance Capturing Fang Liu and Masha Sosonkina Scalable Computing Lab, USDOE.
Prepared By Aakanksha Agrawal & Richa Pandey Mtech CSE 3 rd SEM.
1 COMS 161 Introduction to Computing Title: Computing Basics Date: September 17, 2004 Lecture Number: 11.
Debugging parallel programs. Breakpoint debugging Probably the most widely familiar method of debugging programs is breakpoint debugging. In this method,
Introduction to UML CS A470. What is UML? Unified Modeling Language –OMG Standard, Object Management Group –Based on work from Booch, Rumbaugh, Jacobson.
1 Software Reliability Analysis Tools Joel Henry, Ph.D. University of Montana.
Text Mining Application Programming Chapter 1 Introduction Manu Konchady, 2006.
Copyright 2007, Information Builders. Slide 1 Machine Sizing and Scalability Mark Nesson, Vashti Ragoonath June 2008.
Andree Toonk - SARA High Performance Networking1 Practical demonstration of Network Descriptions February 08, 2006 GLIF meeting, Albuquerque.
Analysis of Prescription Drug Regimen Compliance Charles Mason Computer Applications in Medicine REU 2006 University of Virginia.
Concepts and Realization of a Diagram Editor Generator Based on Hypergraph Transformation Author: Mark Minas Presenter: Song Gu.
Square Root Function Graphs Do You remember the parent function? D: [0, ∞) R: [0, ∞) What causes the square root graph to transform? a > 1 stretches vertically,
Tree - in “math speak” An ________ graph is a set of vertices/nodes and a set of edges, each edge connects two vertices. Any undirected graph in which.
Database Overview What is a database? What types of databases are there? How are databases more powerful than spreadsheets?
Presented by V.Kokila I.Nancy. Telemetry & monitoring A system that reliably and transparently conveys measurement information from a remotely located.
Introduction of An Engineering Project for KOREN/APII Seung-Joon Seok Korea University.
Kernel Modules – Introduction CSC/ECE 573, Sections 001 Fall, 2012.
September 2003, 7 th EDG Conference, Heidelberg – Roberta Faggian, CERN/IT CERN – European Organization for Nuclear Research The GRACE Project GRid enabled.
IPlant Collaborative Tools and Services Workshop iPlant Collaborative Tools and Services Workshop Overview of Atmosphere.
IFS310: Module 10 Database Design - Physical design of files and databases.
What’s New for the MES Product Suite Tom Hechtman & Jason Coope.
Tools for Performance, Load Testing, Stress Testing Using Telerik Test Studio Pavel Pankov QA Lead Automated Testing Team Telerik QA Academy.
“Measurement and Image Analysis of Circular Objects to Build Graphing Skills.” Summary: In this activity students will use image processing tools and spreadsheet.
Empirical Project Monitor and Results from 100 OSS Development Projects Masao Ohira Empirical Software Engineering Research Laboratory, Nara Institute.
Associative Query Answering via Query Feature Similarity
Rational Functions and Their Graphs
Chapter 2: Database System Concepts and Architecture
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
SDM workshop Strawman report History and Progress and Goal.
HW2: A prime path generator (Due Oct 6th 23:59)
Text Mining Application Programming Chapter 1 Introduction
Overview of Computer system
A framework for ontology Learning FROM Big Data
Presentation transcript:

SPADE on Android

What is Provenance? Origin or history of objects. In computing terms, data provenance  history of data or computation. Represented as a graph, modeled using OPM 1. Vertices show objects (data, users, processes). Edges show transformations or relationships between objects. [1] Open Provenance Model –

Provenance – Uses Analyze, debug applications Optimize, re-execute workflows Intrusion detection Malware analysis

SPADE – Overview Software infrastructure for collection, management, analysis of data provenance. Cross-platform with a domain agnostic kernel. Extendible, can dynamically load modules for particular environments or needs.

SPADE – Android Reporting: strace – system calls used to generate data provenance. Monitor zygote, DalvikVM, radio, system processes. Storage: Graphviz DOT format.

Provenance Graph

Analysis of Captured Provenance Import graph inside query tool. Ability to ask for the following information using query commands: – Vertices that match a given expression – Lineage (ancestors or descendants) – Paths between vertices

Demo

Questions?