State Estimation of Non-monotonic, Partially Non-deterministic Software with Sparse Probing using an Unscented Kalman Filter combined with Logic Reasoning
MetadataShow full item record
This report describes a technique for assessing the state of a general-purpose system using partial probing. The technique utilizes an Unscented Kalman Filter (UKF) combined with in-process and post-process reasoning. While Kalman Filters (KF) Extended Kalman Filres (EKF), and UKF are typically applied to state-space systems, where an underlying theory provides the a-priori knowledge, this report suggests the application of UKF to monitor general-purpose software systems that do not have an underlying first-principles theory. The suggested technique uses a reasoning component compute the a-priori evaluation. An important aspect differentiating state-space systems from general-purpose software is that the latter is often concurrent, with a plurality or concurrently executing threads, processes, or devices. As a result, relative execution time of these components (and the derivative state space) is for all intents and purposes non-deterministic. In addition, the suggested technique enables monitoring with probing that is sparse in time and space namely, probing that occurs only one in n cycles or probing that only probes a subset of the software-systems state-space
NPS Report NumberNPS-CS-13-004
Showing items related by title, author, creator and subject.
Beverly, R.; Berger, A.; Xie, Geoffrey (2010-11);Current large-scale topology mapping systems require multiple days to characterize the Internet due to the large amount of probing traffic they incur. The accuracy of maps from existing systems is unknown, yet empirical ...
Arthur Berger; Nicholas Weaver; Beverly, Robert; Larry Campbell (2013);The modern Domain Name System (DNS) provides not only resolution, but also enables intelligent client routing, \eg for Content Distribution Networks (CDNs). The adoption of IPv6 presents CDNs the opportunity to utilize ...
Hughes, Jason J. (Monterey, California: Naval Postgraduate School, 2014-03);Computer networks are constantly being actively probed in attempts to build topological maps of intermediate nodes and discover endpoints, either for academic research or nefarious schemes. While some networks employ ...