The complexity of logic-based abduction
Journal of the ACM (JACM)
Understanding software operations support expertise: a revealed causal mapping approach
MIS Quarterly - Special issue on Intensive research in information systems: using qualitative, interpretive, and case methods to study information technology—third installment
Emancipating instances from the tyranny of classes in information modeling
ACM Transactions on Database Systems (TODS)
Revealed Causal Mapping as an Evocative Method for Information Systems Research
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 7 - Volume 7
The SACSO methodology for troubleshooting complex systems
Artificial Intelligence for Engineering Design, Analysis and Manufacturing
On the theory of system administration
Science of Computer Programming
It's Elementary, Dear Watson: Applying Logic Programming To Convergent System Management Processes
LISA '99 Proceedings of the 13th USENIX conference on System administration
The Maelstrom: Network Service Debugging via "Ineffective Procedures"
LISA '01 Proceedings of the 15th USENIX conference on System administration
Seeking Closure in an Open World: A Behavioral Agent Approach to Configuration Management
LISA '03 Proceedings of the 17th USENIX conference on System administration
STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support
LISA '03 Proceedings of the 17th USENIX conference on System administration
Compilability of propositional abduction
ACM Transactions on Computational Logic (TOCL)
Toward a cost model for system administration
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
Snitch: interactive decision trees for troubleshooting misconfigurations
SYSML'07 Proceedings of the 2nd USENIX workshop on Tackling computer systems problems with machine learning techniques
What makes propositional abduction tractable
Artificial Intelligence
Knowledge Management and Promises
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
An approach to understanding policy based on autonomy and voluntary cooperation
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Hi-index | 0.00 |
In troubleshooting a complex system, hidden dependencies manifest in unexpected ways. We present a methodology for uncovering dependencies between behavior and configuration by exploiting what we call "weak transitive relationships" in the architecture of a system. The user specifies known architectural relationships between components, plus a set of inference rules for discovering new ones. A software system uses these to infer new relationships and suggest culprits that might cause a specific behavior. This serves both as a memory aid and to quickly enumerate potential causes of symptoms. Architectural descriptions, including selected data from Configuration Management Databases (CMDB) contain most of the information needed to perform this analysis. Thus the user can obtain valuable information from such a database with little effort.