Show simple item record

Replication-based Cyber Foraging and Automated Configuration Management.

dc.contributor.authorSu, Ya-Yunnen_US
dc.date.accessioned2009-05-15T15:20:33Z
dc.date.availableNO_RESTRICTIONen_US
dc.date.available2009-05-15T15:20:33Z
dc.date.issued2009en_US
dc.date.submitteden_US
dc.identifier.urihttps://hdl.handle.net/2027.42/62372
dc.description.abstractThis thesis addresses two research problems. The first problem is how to run demanding applications on mobile computers. Mobile computers, such as smart phones and personal digital assistants, have recently become more prevalent. However, the size of these mobile computers constrain the processing power, battery capacity, and memory they can carry. Therefore, it is difficult to run resource-intensive applications on these computers. This thesis explores utilizing publicly-available compute servers, which we call surrogates, to augment mobile computers to remotely execute resource-intensive applications. I built a software system named Slingshot to demonstrate this concept. Slingshot replicates application state on surrogates and the user's home machine by encapsulating the application state in a virtual machine. The replica on the surrogate provides good response time as it is co-located with the mobile computer, and the replica on the home machine can provide data safety if a surrogate fails. The second problem this thesis addresses is how to make configuration management easier for users. Software applications provide many configuration options that allow users to customizing them. However, software applications depend on shared libraries and configuration data and interact with other software applications through various communication channels. Such complex software dependencies make it difficult to configure software applications correctly. I built a software system named AutoBash to automate many configuration management tasks for users, such as troubleshooting misconfigurations and running regression tests. AutoBash automatically finds a solution that transforms the system into a healthy state by using a set of predicates that test the system state to verify each solution. AutoBash leverages OS-level speculative execution to try many solutions and causal information tracking to reduce the time to run regression tests. To reduce the user-effort required to write predicates in AutoBash, this thesis explores automatically generating predicates by observing the actions of ordinary users fixing configuration problems. The main results were that: (1) my method can infer predicates for all configuration bugs studied with very few false positives, (2) the majority is usually right, so using multiple traces can improve results.en_US
dc.format.extent990359 bytes
dc.format.extent1373 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypetext/plain
dc.language.isoen_USen_US
dc.subjectMobile Serviceen_US
dc.subjectCyber Foragingen_US
dc.subjectConfiguration Managementen_US
dc.subjectSpeculative Executionen_US
dc.subjectAutomated Software Configuration Testingen_US
dc.titleReplication-based Cyber Foraging and Automated Configuration Management.en_US
dc.typeThesisen_US
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplineComputer Science & Engineeringen_US
dc.description.thesisdegreegrantorUniversity of Michigan, Horace H. Rackham School of Graduate Studiesen_US
dc.contributor.committeememberFlinn, Jason Nelsonen_US
dc.contributor.committeememberChen, Peter M.en_US
dc.contributor.committeememberMao, Zhuoqingen_US
dc.contributor.committeememberScott, Clayton D.en_US
dc.subject.hlbsecondlevelComputer Scienceen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/62372/1/yysu_1.pdf
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.