skip to main content
10.1145/2380356.2380366acmconferencesArticle/Chapter ViewAbstractPublication PagesesweekConference Proceedingsconference-collections
research-article

Debugging embedded multimedia application traces through periodic pattern mining

Published: 07 October 2012 Publication History

Abstract

Increasing complexity in both the software and the underlying hardware, and ever tighter time-to-market pressures are some of the key challenges faced when designing multimedia embedded systems. Optimizing the debugging phase can help to reduce development time significantly. A powerful approach used extensively during this phase is the analysis of execution traces. However, huge trace volumes make manual trace analysis unmanageable. In such situations, Data Mining can help by automatically discovering interesting patterns in large amounts of data. In this paper, we are interested in discovering periodic behaviors in multimedia applications. Therefore, we propose a new pattern mining approach for automatically discovering all periodic patterns occurring in a multimedia application execution trace.
Furthermore, gaps in the periodicity are of special interest since they can correspond to cracks or drop-outs in the stream. Existing periodic pattern definitions are too restrictive regarding the size of the gaps in the periodicity. So, in this paper, we specify a new definition of frequent periodic patterns that removes this limitation. Moreover, in order to simplify the analysis of the set of frequent periodic patterns we propose two complementary approaches: (a) a lossless representation that reduces the size of the set and facilitates its analysis, and (b) a tool to identify pairs of "competitors" where a pattern breaks the periodicity of another pattern. Several experiments were carried out on embedded video and audio decoding application traces, demonstrating that using these new patterns it is possible to identify abnormal behaviors.

References

[1]
R. Agrawal and R. Srikant. Fast algorithms for mining association rules in large databases. In VLDB, pages 487--499, San Francisco, CA, USA, 1994.
[2]
S. Ayouni, A. Laurent, S. B. Yahia, and P. Poncelet. Mining closed gradual patterns. In ICAISC, pages 267--274, 2010.
[3]
L. Cerf, J. Besson, C. Robardet, and J.-F. Boulicaut. Closed patterns meet n-ary relations. TKDD, 2009.
[4]
P.-H. Chang and L.-C. Wang. Automatic assertion extraction via sequential data mining of simulation traces. In ASPDAC, pages 607--612, 2010.
[5]
J. Han. Efficient mining of partial periodic patterns in time series database. In ICDE, pages 106--115, 1999.
[6]
J. Han, W. Gong, and Y. Yin. Mining segment-wise periodic patterns in time-related databases. In KDD, pages 214--218, 1998.
[7]
R. Jaschke, A. Hotho, C. Schmitz, B. Ganter, and G. Stumme. TRIAS An algorithm for mining iceberg tri-lattices. In ICDM, pages 907--911, 2006.
[8]
R. Krishnakumar. Kernel korner: KProbes-A kernel debugger. Linux J., 2005.
[9]
C. LaRosa, L. Xiong, and K. Mandelberg. Frequent pattern mining for kernel trace data. In SAC, pages 880--885, 2008.
[10]
F. Lehmann and R. Wille. A triadic approach to formal concept analysis. In Conceptual Structures: Applications, Implementation and Theory, volume 954 of Lecture Notes in Computer Science, pages 32--43. Springer Berlin / Heidelberg, 1995.
[11]
Z. Li, Z. Chen, S. M. Srinivasan, and Y. Zhou. C-Miner: Mining block correlations in storage systems. In FAST, pages 173--186, 2004.
[12]
Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: Finding copy-paste and related bugs in large-scale software code. TSE, pages 176--192, 2006.
[13]
Z. Li and Y. Zhou. PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code. In ESEC/FSE, 2005.
[14]
D. Lo, H. Cheng, J. Han, S.-C. Khoo, and C. Sun. Classification of software behaviors for failure detection: a discriminative pattern mining approach. In KDD, pages 557--566, 2009.
[15]
S. Ma and J. Hellerstein. Mining partially periodic event patterns with unknown periods. In ICDE, pages 205--214, 2001.
[16]
R. Mijat. Better trace for better software. White paper, ARM, 2010. http://www.arm.com/products/system-ip/debug-trace/index.php.
[17]
B. Ozden, S. Ramaswamy, and A. Silberschatz. Cyclic association rules. In ICDE, pages 412--421, Feb 1998.
[18]
N. Pasquier, Y. Bastide, R. Taouil, and L. Lakhal. Efficient mining of association rules using closed itemset lattices. Inf. Syst., 24(1):25--46, Mar. 1999.
[19]
C. Prada-Rojas, V. Marangozova-Martin, K. Georgiev, J.-F. Mehaut, and M. Santana. Towards a Component-Based Observation of MPSoC. In ICPPW, pages 542--549, 2009.
[20]
STMicroelectronics. Orly SoC. http://bit.ly/wUmu5Y.
[21]
STMicroelectronics. STi7200-MBoard platform. http://bit.ly/z81nho.
[22]
R. Wille. The basic theorem of triadic concept analysis. Order, 12:149--158, 1995.
[23]
J. Zou, J. Xiao, R. Hou, and Y. Wang. Frequent instruction sequential pattern mining in hardware sample data. In ICDM, pages 1205--1210, 2010.

Cited By

View all
  • (2023)Sky-signatures: detecting and characterizing recurrent behavior in sequential dataData Mining and Knowledge Discovery10.1007/s10618-023-00949-138:2(372-419)Online publication date: 29-Aug-2023
  • (2023)Software Vulnerabilities Detection Using a Trace-Based Analysis ModelTowards new e-Infrastructure and e-Services for Developing Countries10.1007/978-3-031-34896-9_27(446-457)Online publication date: 30-Jun-2023
  • (2021)Automated Generation of Model-Based Constraints for Common Multi-core and Real-Time Applications Using Execution TracingInternational Journal of Parallel Programming10.1007/s10766-020-00689-5Online publication date: 1-Jan-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
EMSOFT '12: Proceedings of the tenth ACM international conference on Embedded software
October 2012
266 pages
ISBN:9781450314251
DOI:10.1145/2380356
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 October 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. debugging
  2. embedded systems
  3. multimedia applications
  4. periodic pattern mining

Qualifiers

  • Research-article

Conference

ESWEEK'12
ESWEEK'12: Eighth Embedded System Week
October 7 - 12, 2012
Tampere, Finland

Acceptance Rates

Overall Acceptance Rate 60 of 203 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Sky-signatures: detecting and characterizing recurrent behavior in sequential dataData Mining and Knowledge Discovery10.1007/s10618-023-00949-138:2(372-419)Online publication date: 29-Aug-2023
  • (2023)Software Vulnerabilities Detection Using a Trace-Based Analysis ModelTowards new e-Infrastructure and e-Services for Developing Countries10.1007/978-3-031-34896-9_27(446-457)Online publication date: 30-Jun-2023
  • (2021)Automated Generation of Model-Based Constraints for Common Multi-core and Real-Time Applications Using Execution TracingInternational Journal of Parallel Programming10.1007/s10766-020-00689-5Online publication date: 1-Jan-2021
  • (2020)Extracting method of packet dependence from NoC simulation traces using association rule miningAnalog Integrated Circuits and Signal Processing10.1007/s10470-020-01645-6Online publication date: 23-Apr-2020
  • (2019)Mining Periodic Patterns with a MDL CriterionMachine Learning and Knowledge Discovery in Databases10.1007/978-3-030-10928-8_32(535-551)Online publication date: 23-Jan-2019
  • (2017)Periodic Task Mining in Embedded System Traces2017 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS)10.1109/RTAS.2017.5(331-340)Online publication date: Apr-2017
  • (2016)Towards Visualizing Hidden Structures2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)10.1109/ICDMW.2016.0171(1183-1190)Online publication date: Dec-2016
  • (2016)Steady Patterns2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)10.1109/ICDMW.2016.0103(692-699)Online publication date: Dec-2016
  • (2015)Data mining approach to temporal debugging of embedded streaming applicationsProceedings of the 12th International Conference on Embedded Software10.5555/2830865.2830884(167-176)Online publication date: 4-Oct-2015
  • (2015)Selecting Points of Interest in Traces Using Patterns of EventsProceedings of the 2015 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing10.1109/PDP.2015.30(70-77)Online publication date: 4-Mar-2015
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media