Replication-based Cyber Foraging and Automated Configuration Management.
dc.contributor.author | Su, Ya-Yunn | en_US |
dc.date.accessioned | 2009-05-15T15:20:33Z | |
dc.date.available | NO_RESTRICTION | en_US |
dc.date.available | 2009-05-15T15:20:33Z | |
dc.date.issued | 2009 | en_US |
dc.date.submitted | en_US | |
dc.identifier.uri | https://hdl.handle.net/2027.42/62372 | |
dc.description.abstract | This thesis addresses two research problems. The first problem is how to run demanding applications on mobile computers. Mobile computers, such as smart phones and personal digital assistants, have recently become more prevalent. However, the size of these mobile computers constrain the processing power, battery capacity, and memory they can carry. Therefore, it is difficult to run resource-intensive applications on these computers. This thesis explores utilizing publicly-available compute servers, which we call surrogates, to augment mobile computers to remotely execute resource-intensive applications. I built a software system named Slingshot to demonstrate this concept. Slingshot replicates application state on surrogates and the user's home machine by encapsulating the application state in a virtual machine. The replica on the surrogate provides good response time as it is co-located with the mobile computer, and the replica on the home machine can provide data safety if a surrogate fails. The second problem this thesis addresses is how to make configuration management easier for users. Software applications provide many configuration options that allow users to customizing them. However, software applications depend on shared libraries and configuration data and interact with other software applications through various communication channels. Such complex software dependencies make it difficult to configure software applications correctly. I built a software system named AutoBash to automate many configuration management tasks for users, such as troubleshooting misconfigurations and running regression tests. AutoBash automatically finds a solution that transforms the system into a healthy state by using a set of predicates that test the system state to verify each solution. AutoBash leverages OS-level speculative execution to try many solutions and causal information tracking to reduce the time to run regression tests. To reduce the user-effort required to write predicates in AutoBash, this thesis explores automatically generating predicates by observing the actions of ordinary users fixing configuration problems. The main results were that: (1) my method can infer predicates for all configuration bugs studied with very few false positives, (2) the majority is usually right, so using multiple traces can improve results. | en_US |
dc.format.extent | 990359 bytes | |
dc.format.extent | 1373 bytes | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | text/plain | |
dc.language.iso | en_US | en_US |
dc.subject | Mobile Service | en_US |
dc.subject | Cyber Foraging | en_US |
dc.subject | Configuration Management | en_US |
dc.subject | Speculative Execution | en_US |
dc.subject | Automated Software Configuration Testing | en_US |
dc.title | Replication-based Cyber Foraging and Automated Configuration Management. | en_US |
dc.type | Thesis | en_US |
dc.description.thesisdegreename | PhD | en_US |
dc.description.thesisdegreediscipline | Computer Science & Engineering | en_US |
dc.description.thesisdegreegrantor | University of Michigan, Horace H. Rackham School of Graduate Studies | en_US |
dc.contributor.committeemember | Flinn, Jason Nelson | en_US |
dc.contributor.committeemember | Chen, Peter M. | en_US |
dc.contributor.committeemember | Mao, Zhuoqing | en_US |
dc.contributor.committeemember | Scott, Clayton D. | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/62372/1/yysu_1.pdf | |
dc.owningcollname | Dissertations and Theses (Ph.D. and Master's) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.