ISSC 2014 / CIICT 2014, Limerick, June 26-27

Pattern Mining Model for Automatic Network Monitoring in Heterogeneous Wireless Communication Networks Zhiguo Qu1,2, Jie Deng1, John Keeney3, Sven van der Meer3, Xiaojun Wang1, Conor McArdle1 1 Dublin City University, The Rince Institute, Dublin, Ireland Email: (zhiguo.qu, xiaojun.wang)@dcu.ie, [email protected] and [email protected] 2 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing, China 3 Ericsson, Network Management Lab, Athlone, Ireland Email: (john.keeney, sven.van.der.meer)@ericsson.com

Abstract—The rapid development of network technology and its evolution towards heterogeneous networks has increased the demand for more efficient network monitoring and management capabilities in providing high quality communication services. Current research aims to support automatic monitoring and management of heterogeneous wireless communication networks. In this work sequential pattern mining is used to extract interesting event sequence patterns from Telecom Network Monitoring data, driven by the need to support ever increasing volumes of management data. In this paper, a novel model of pattern discovery is proposed. Existing algorithms (PrefixSpan and HTPM) are extended and integrated into the model for discovering interesting sequential patterns. Evaluations show that these algorithms are suitable as part of an architecture to support automatic network monitoring. Keywords –Automatic network monitoring, Sequential pattern mining, Episode discovery. ______________________________________________________________________________________

I

INTRODUCTION Recent advances in telecommunication network technologies and their evolution to heterogeneous networks have exacerbated the need for more efficient network monitoring and management capabilities in providing high performance communications services. In support of automatic management of heterogeneous networks, new techniques are required for analyzing the huge volumes of monitoring data being streamed into modern OSS (Operation Support System) platforms. Pattern discovery techniques and approaches for identifying anomalous events and event sequences are candidates for achieving this goal, especially in the context of ever increasing management data volume. Considering the complex environment of heterogeneous networks, there are at least two main issues to consider: 1) Huge amounts of data with high data dimension; 2) Huge number of protocols or use cases with complex contexts. To handle high volume and high dimensionality in data, potential algorithms must achieve high time and memory efficiencies to fit off-the-shelf hardware configurations. On one hand it is next to impossible to enumerate and model all the possible contexts and use cases in heterogeneous networks, while on the

other hand drive towards automatic network monitoring which aims to greatly reduce or remove the need for human input in the processing part of network monitoring. To operate in an automatic manner, and without expert domain knowledge input, there remains a requirement for general purpose algorithms for discovering potentially interesting patterns and contexts. The most appropriate techniques are based in the domain of sequential data mining and association rule discovery. In this paper, a novel sequential pattern mining model is proposed. This generic model can efficiently achieve pattern mining for heterogeneous network monitoring data, and discover potentially interesting sequential patterns by integrating sequential pattern mining techniques and association rule discovery techniques. II RELATED WORK Sequential data mining attempts to extract useful knowledge from traditional static databases. The outputs of the pattern discovery can help to make decisions of recommended management actions and predict future incidents [2, 15]. This work aims to leverage such techniques for automated monitoring of heterogeneous telecommunications networks.

According to the classification scheme proposed by Wu and Chen [13], techniques for temporal pattern mining in sequential data can be classified into four categories: point-based techniques, interval-based techniques, hybrid-based techniques and multi-label event techniques. Among them, point-based event assumes that the events always occur at instantaneous time points, which is the common assumption adopted by most previous studies of pattern mining in sequential data. The related achievements include [1, 3-6] which are all based on Apriori Theory [1]. Research on mining patterns from point-based events attempts to find the temporal relationships between these point events. In many applications, however, events cannot be simply represented as a point. Therefore, some previous research extended pattern mining in sequential data to the situations that include interval-based events [710]. An interval-based event can be described by three major characteristics: event ID, event starting time, and event ending time. Research on mining temporal patterns from interval-based events attempts to find the temporal relationships between these interval events. In some applications, however, events are neither purely point-based nor purely interval-based; they are hybrid events. Correspondingly, a pattern consisting of point-based and interval-based events is referred as a hybrid temporal pattern. Research [11-13] on mining temporal patterns from hybrid events attempts to find the temporal relationships between these hybrid events. Recent research [14] has extended hybrid events to be multi-label events, because an event can have changing statuses in specific applications and contexts. When events are multi-label, an event can be described with more major characteristics: event ID, event's first label time, event's second label time, …, event's final label time. Therefore, the research on mining temporal patterns from multilabel events attempts to find the temporal relationships between these multi-label events. Usually, association rule mining techniques can be viewed as an extension of sequential pattern mining whereby reliable and interesting predictive patterns are viewed as prediction rules and are augmented in terms of some mathematical methods, such as Confidence and Lift [16]. Confidence denotes whether association rules exist in discovered frequent patterns, and Lift represents whether one event or event sequence occurrence will cause or predict another event or event sequence occurrence. Correspondingly, if a pattern occurs (is supported) by at least Min-Sup percentage of sequences in a given dataset, it is said that the pattern is a frequent sequential pattern. If its Confidence and Lift are greater than their corresponding user-defined thresholds, the pattern will be regarded as a frequent reliable or interesting sequential pattern.

III CONTEXT OF THIS WORK This paper presents work done in the context of a larger project, which aims to support automatic monitoring and management of heterogeneous telecommunications networks. To achieve this goal, a “Pattern Discovery” work-package strives to extract sequential event patterns from network monitoring data, especially in the context of ever increasing management data volumes, the subject of this paper. a) Overall Project Architecture The overall project architecture is shown in Figure 1. The architecture is mainly made up of five modules including a Dimension Reduction Module (DRM), an Episode Discovery Module (EDM), an Episode Classification Module (ECM), Pattern Matching & Prediction Module (PMM) and a Recommender System Module (RSM). This architecture indicates how these required modules carry out their specific tasks or take responsibilities in the workflow as a whole. The DRM (Dimension Reduction Module) module aims to greatly reduce dimensionality of the data, and filter out most of the noisy events in the data stream for reducing the computation complexity of EDM and PMM. (Usually, management data will be recorded into trace files or transformed as trace event stream before being processed. So, for simplicity, the data stream is also called the tracestream.) The main goal of EDM (Episode Discovery Module) is to discover and identify episodes/sequential patterns from the dimension reduced trace-stream, while importing the episodes/sequential patterns into the PML (Pattern Model Library) and updating the episodes/sequential patterns for PMM and RSM. The ECM (Episode Classification Module) further indentifies and classifies the episodes/sequential patterns. Feedback from the ECM can help the DRM and the EDM optimize their parameter settings (such as transaction length and window size, etc.), for better performance. The identified patterns called pattern models are outputted into pattern model library, which serves PMM and RSM. After receiving the pattern models from PML, the PMM (Pattern Matching & Prediction Module) scans the trace-stream and matches the partial pattern models for predicting impending pattern models. Its predictions will be exported to the RSM. In response to matches of pattern prediction rules the RSM (Recommender System Module) ranks of suggestions to avert, alleviate or mitigate against the effect of predicted issues, based on previous expert judgements or historic actions and experience of network administrators.

Figure 1: The overall system architecture.

b) Episode Discovery Module (EDM) The task of the EDM (Episode Discovery Module) is to constantly mine episodes (pattern candidates) from dimension reduced data streams. From the perspective of specific processing steps, the episode discovery module receives the output of the DRM as its input and sends its output to the PML. During this process, the EDM continuously discovers new or evolving episodes, identifies new pattern models and exports those pattern models to the PML. Simultaneously, based on ongoing feedback from the DRM and the ECM, the EDM dynamically adjusts its core parameter settings to improve its performance. Candidate parameters include: Min-Sup (the minimum frequency a pattern must occur before being considered frequent); transaction length and sliding window size (the size and characteristics of the view of the data stream from which to learn patterns). The performance of the system is based on metrics such as time efficiency, memory efficiency, and accuracy of discovered pattern models, etc. The EDM is made up of five sub-modules: Data Analyser, Mining Controller, Data Miner, Combiner, and Episode Analyser. These five submodules cooperate with each other to accomplish the job of the EDM by fulfilling their functions in turn. The flowchart of the EDM is presented in Figure 2. 1. Data Analyser: performance of pattern mining algorithms is directly dependent on proper parameter settings, such as Min-Sup, transaction length and sliding window size. To determine appropriate parameter settings is challenging task, especially for high-dimension context-heavy network monitoring data. Transaction length denotes the number of events in each transaction (set of events to be considered together). In some cases, in order to improve time efficiency of the algorithm, trace substreams can be further divided into subgroups for parallel processing. To enable parallel processing, sliding window size is defined by the number of transactions contained in the view of each sub-stream or sub-group to be considered at one time. 2. Mining Controller: After obtaining configuration information from the Data Analyser, the Mining Controller splits the reduced trace-stream into sub-streams or sub-groups and then assigns computation resources according to the configuration settings, such as I/O, memory and CPU, to each sub-

stream or sub-group of the data. Next, the Mining Controller recursively calls the Data Miner to process the dataset in different sliding window views over sub-streams or subgroups in order to discover frequent episodes based on parameter settings provided by the Data Analyser. 3. Data Miner: As the core sub-module of the Episode Discovery Module, the Data Miner is called recursively to discover episodes from each sliding window view following a specific approach according to its corresponding parameter settings. In this model, both PrefixSpan [5] and HTPM [13] algorithm implementations can be selected to handle this Data Miner task. 4. Combiner: After discovering new episodes from different sliding windows, the Combiner combines these episode sets to form an overall episode set for each sub-stream.

Figure 2: The flowchart of the EDM.

5. Episode Analyser: Finally, the Episode Analyser sub-module adopts an association rule mining approach to further identify episodes by analysing the results to filter out most of the redundant episodes that have little no context or importance for the given use case. The identified episodes will be output and stored into the Pattern Model Library (PML) as pattern models. IV

PATTERN DISCOVERY IMPLEMENTATION In order to achieve the target of pattern discovery, one significant step is to discover frequent sequential patterns and identify interesting pattern models from a network monitoring dataset in order to build the PML. Sequential pattern mining is a rich and varied research domain, where many of the fundamental advances were proposed from 1995 to 2007 [17]. In the literature, classic algorithms are generic with

respect to application domain type, with little requirement for a priori expert domain knowledge about the dataset (once the dataset has been adequately filtered and prepared). Two such algorithms are PrefixSpan [5] and HTPM [13]. By contrast, more recent research in sequential pattern mining has focussed more on incorporating constraints or application requirements in the mining process for better performance, driven by specific a priori domain expert knowledge about the data [17]. However, as mentioned in Section 1, the management dataset in heterogeneous networks usually involves many communication protocols and consists of numerous different types of the data (e.g. netFlow data, routing data, latency, throughput, syslog data, trouble ticket, traffic traces, event-based statistics, etc,), where the goal is to find complex correlations in data from these diverse data sources. As such it is very difficult to obtain a priori knowledge covering all candidate data sources in order to accurately steer mining of sequential patterns. For this reason a generic type of sequential pattern mining algorithm is a good initial option of pattern discovery in this work. For this work PrefixSpan and HTPM were selected and implemented as our candidate algorithms in the model.

For convenience, an integration GUI (Graphical User Interface) is provided to users based on the implementations of PrefixSpan and HTPM. In this Graphical Interface shown as Figure 3 and Figure 4, two parameters are needed as input before running the algorithms over a dataset: window size of transaction (Transaction length) and Min-Sup (Minimum Support). These two parameters can significantly influence the final output. Specifically, Min-Sup has a major effect on the number of the discovered patterns and time, memory and processing overhead. Meanwhile, transaction length not only greatly affects the number of discovered patterns and resource consumption (especially time requirements), but also directly influences the support value and maximal length of each discovered pattern in the output. After inputting the parameters, selecting the algorithm and choosing one specific dataset, the discovered pattern set and its relevant analysis result consisting of Support, Confidence and Lift with a specific format can be determined. The final outputs of algorithms are shown in Figure 5.

(a)The discovered patterns

(b) The relevant analysis

Figure 5: The output of the Episode Discovery Module.

V EXPERIMENTS In this section, the performance of PrefixSpan is presented and compared with HTPM based on two different synthetic dataset. PrefixSpan and HTPM are implemented in Java. All the experiments are performed on a 2.5GHz Inter(R) Core(TM) i53210M PC machine with 8 GB main memory, running Microsoft Windows 7.

Figure 3: Graphical Interface for PrefixSpan and HTPM.

a) The testing dataset The testing dataset used in our experiment is generated by a synthetic data generator developed in house, which aims to synthesize complex eventbased pattern data by setting some pattern specifications as inputs. Table 1: The configuration of “PG_Syn” dataset.

Figure 4: Graphical Interface for PrefixSpan and HTPM.

Parameters

Values

Number of patterns Average pattern generation rate Average number of events in patterns Number of event noise types Average event noise generation rate Total number of events

3 0.2 4.3 500 0.05 100K

For any generated dataset, the pattern specification defines how events within a pattern are

correlated to each other on the timeline, by way of specifying the probability distribution of times between constituent events in each pattern type. Additionally, random noise events can be merged into the data stream along with the patterns. These inserted noisy events are not correlated to each other nor with events in the patterns. The relative proportion of noise to the rate of pattern generation can be controlled by a user specified parameter setting. For clarity, this dataset is referred to “PG_Syn” and its configuration is listed in Table 1. There are a total of 500 + 12 different types of events, incorporating 500 noise event types {100 … 599} and 12 information event types for use in patterns {0 … 11}. Three candidate sequence patterns are manually pre-defined for inclusion in the synthetically generated dataset: {0→1→2→3→4→5}, {5→6→7→8} and {9→10→11}. b) Performance evaluation PrefixSpan and HTPM are tested for performance comparison using the synthetically generated dataset (“PG_Syn”), where the synthetically generated events are considered as hybrid-based events. Time consumption is one of the main evaluation criteria as shown in Figure 6. For simplicity, the Min-Sup is incrementally set from 0.35 to 0.8 (35%-80%) while transaction length is fixed to 20. In the presented results it can be seen that as the Min-Sup decreases, then more candidate sequences are considered “frequent”, and so must be completely analysed, thereby increasing the resource requirements of for the system.

Figure 6: Time consumption comparison between PrefixSpan and HTPM (Min-Sup).

Figure 7 shows the transaction length increased from 20 to 50, where Min_Sup is fixed at 0.8. This increase of the resource usage as the transaction length increases is due to the situation where a longer transaction is more likely to contain more candidate patterns than a short transaction. Figure 6 and Figure 7, demonstrates that there is a big gap between the performances of PrefixSpan and HTPM, with PrefixSpan scaling more favourably that HTPM.

Figure 7: Time consumption comparison between PrefixSpan and HTPM (Transaction Length).

In addition to the resource usage comparisons of PrefixSpan and HTPM, it is noted that both algorithms effectively and accurately found all simulated patterns in the synthetically generated dataset for correctly set Min-Sup values. c) Analysis The experiments show that PrefixSpan and HTPM can effectively discover the patterns from datasets similar to the synthetically generated dataset (“PG_Syn”). However, compared to PrefixSpan, the time consumption of HTPM is much higher. After investigating the specific processing steps of PrefixSpan and HTPM in-depth, it can be recognized that the gap between their time requirements is mainly caused by their different internal approaches to “learn” or “grow” pattern candidates, where this learning process is the most significant and resource intensive processing step for PrefixSpan and HTPM. Typically, 70% to 80% CPU and Memory resources are assigned to perform this step. VI CONCLUSIONS Pattern discovery in this project requires a practical and powerful algorithm for discovering significant sequential event patterns from Telecom network management datasets. In order to achieve this goal, a novel pattern discovery model was proposed in this paper. This model is composed of five sub-modules including Data Analyser, Mining Controller, Data Miner, Combiner and Episode Analyser. These five sub-modules cooperate with each other and accomplish the job of episode discovery by fulfilling their functions in turn. After reviewing appropriate state-of-the-art data mining techniques, PrefixSpan and HTPM were selected as good candidates of the Data Miner sub-module. Either algorithm can be considered as a generic algorithm suitable for complex heterogeneous network circumstances. Their performance was compared in terms of different parameter settings by running algorithms over a synthetically generated test dataset. In this work the dataset is streamed from the Dimension Reduction Module (DRM) and

exports discovered pattern models into the Pattern Model Library (PML) database. This PML is in turn used by the Pattern Matching & Prediction Module (PMM) to drive the adaptive action recommendation module (RSM). Together these modules will form an end-to-end automated network management system.

ACKNOWLEDGEMENTS This work was funded by Enterprise Ireland Innovation Partnership Programme with Ericsson Ireland under grant agreement IP/2011/0135.

REFERENCES [1] R. Agrawal, R. Srikant, “Mining sequential patterns, ” In: Proceedings of Eleventh International Conference on Data Engineering, IEEE Computer Society Press, Taipei, Taiwan, 1995, pp 3-14. [2] F. Masseglia, M. Teisseire, P. Poncelet, “Sequential pattern mining: a survey on issues and approaches, ” In: Encyclopedia of Data Warehousing and Mining. Information Science Publishing, 2005, pp 1028-1032. [3] R. Srikant, R. Agrawal, “Mining sequential patterns: generalizations and performance improvements, ” In: Proceedings of the 5th International Conference on Extending Database Technology, Avignon, France, 1996, pp 3-17. [4] J. Han, J. Pei, B. Mortazavi-Asl, Q. Chen,U. Dayal, and M.-C. Hsu. “Freespan: Frequent pattern-projected sequential pattern mining, ” In: Proceedings of 2000 International Conference on Knowledge Discovery and Data Mining (KDD’00), Boston, MA, 2000, pp 355-359. [5] J. Pei, J. Han, B. Mortazavi-Asl, H. Pinto, Q. Chen, U. Dayal and M.C. Hsu, “PrefixSpan: mining sequential patterns efficiently by prefix projected pattern growth, ” In: Proceedings of the 17th International Conference on Data Engineering, Heidelberg, Germany, 2001, pp 215-226. [6] M.J. Zaki, “SPADE: an efficient algorithm for mining frequent sequences, ” Machine Learning, vol. 42, no. 1, 2001, pp 31–60. [7] T.P. Hong, K.Y. Lin and S.L. Wang, “Mining fuzzy sequential patterns from multipleitem transactions, ” In: Proceedings of IFSA World Congress and 20th NAFIPS International

Conference, Vancouver, BC, Canada, 2001, pp 13171321. [8] S.Y. Wu and Y.L. Chen, “Mining nonambiguous temporal patterns for interval-based events, ” IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 6, 2007, pp 742-758. [9] F. Hoppner, “Knowledge Discovery from Sequential Data, ” Ph.D. Thesis, Technical University of Braunschweig, Germany, 2003. [10] P.S. Kam and A.W.C. Fu, “Discovering temporal patterns for interval-based events, ” In: Proceedings of Second International Conference on Data Warehousing and Knowledge Discovery, Springer, London, UK, 2000, pp 317-326. [11] S. de Amo, W.P. Junior and A. Giacometti, “MILPRIT*: a constraint-based algorithm for mining temporal relational patterns, ” International Journal of Data Warehousing and Mining, vol. 4, no. 4, 2008, pp 42–61. [12] S. de Amo, W.P. Junior, A. Giacometti and T.G. Clemente, “Mining temporal relational patterns over databases with hybrid time domains, ” In: 22nd Brazilian Symposium on Data Base (SBBD), João Pessoa, PB, Brazil, 2007, pp 347-361. [13] S.Y. Wu and Y.L. Chen, “Discovering hybrid temporal patterns from sequences consisting of point- and interval-based events,” Data and Knowledge Engineering, vol. 68, no. 11, 2009, pp 1309-1330. [14] Y.L. Chen, S.Y. Wu and Y.C. Wang, etc, “Discovering multi-label temporal patterns in sequence database, ” Information Sciences, vol. 181, no. 3, 2011, pp 398-418. [15] J. Han, M. Kamber, “Mining Sequence Patterns in Transactional Databases, ” In: Data Mining: Concepts and Techniques, Morgan Kaufmann, 2006. [16] S. Brin, R. Motwani and C. Silverstein, “Beyond market baskets: generalizing association rules to correlations, ” In: Proceedings of the 1997 ACM SIGMOD international conference on Management of data (SIGMOD 1997), New York, NY, USA, 1997, pp 265-276. [17] C. H. Mooney and J. F. Roddick, “Sequential Pattern Mining – Approaches and Algorithms, ” ACM Computing Surveys, vol. 45, no. 2, 2013, pp 1-19.

Pattern Mining Model for Automatic Network Monitoring ...

Email: (zhiguo.qu, xiaojun.wang)@dcu.ie, [email protected] and mcardlec@eeng.dcu.ie ... Keywords –Automatic network monitoring, Sequential pattern mining, Episode discovery. .... In response to matches of pattern prediction.

471KB Sizes 1 Downloads 245 Views

Recommend Documents

Trajectory Pattern Mining - Springer Link
In addition, Internet map services (e.g. ... t1 t2 t3 t4 o1 ↗↗↘→ o2 ↗→→→ o3 ↗↘↗→. (a) raw trajectories ... move with the same motion azimuth ↗ at time t1.

Statistical Pattern Recognition for Automatic Writer ...
combining tools from fuzzy logic and genetic algorithms, which allow for ... A writer identification system performs a one-to-many search in a large ...... and extracted from the total of 500 pages (notice that the experimental data contains ..... in

Pattern recognition techniques for automatic detection of ... - CiteSeerX
Computer-aided diagnosis;. Machine learning. Summary We have employed two pattern recognition methods used commonly for face recognition in order to analyse digital mammograms. ..... should have values near 1.0 on the main diagonal,. i.e., for true .

Statistical Pattern Recognition for Automatic Writer ...
Statistical Pattern Recognition for Automatic. Writer Identification ... 2.2 Experimental data . .... applicability in the forensic and historic document analysis fields.

Pattern recognition techniques for automatic detection of ... - CiteSeerX
Moreover, it is com- mon for a cluster of micro–calcifications to reveal morphological features that cannot be clearly clas- sified as being benign or malignant. Other important breast .... mammography will be created because of the data deluge to

Weather Monitoring Model
obtained from Internet in the form raw data which specific format data. Specific format data refers to ..... Rogers, R.R. 1983. A short course in Cloud Physics.

Sequential Pattern Mining for Moving Objects in Sptio ...
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 5, May 2013, ... 2 Head of the Computer Department, U.V.Patel College of Engineering, ... Given such a spatio-temporal series, we study the problem of discovering ....

Mining Health Models for Performance Monitoring of ...
2Microsoft Center for Software Excellence, One Microsoft Way, Redmond, WA, ... database servers). ... two real system – Microsoft's SQL Server 2005 and IIS 7.0.

Sequential Pattern Mining for Moving Objects in Sptio ...
Spatial-temporal data mining (STDM) is the process of discovering interesting, useful and non-trivial patterns from large spatial or spatial-temporal datasets. For example, analysis of crime datasets may reveal frequent patterns such as partially ord

Activity Recognition Using Correlated Pattern Mining for ...
istics of the data, many existing activity recognition systems. [3], [4], [5], [6] ..... [14] L. J. Bain and M. Englehardt, Statistical Analysis of Reliability and. Life-testing ...

D2PM: Domain Driven Pattern Mining
Feb 28, 2011 - between discovered information and user expectations, trying to adapt ... The D2PM (Domain Driven Pattern Mining) project aims to extend that ...

4. Model Design of Weather Monitoring Model
model are AVHRR – LAC (Advanced Very. High Resolution Radiometer – Local Area. Coverage) type. Description about it could be seen in chapter 2.2.3. Actually, it has spatial resolution is 1,1 x 1,1 kilometers square and temporal resolution is one

Feature LDA: a Supervised Topic Model for Automatic ...
Knowledge Media Institute, The Open University. Milton Keynes, MK7 6AA, ... Web API is highly heterogeneous, so as its content and level of details [10]. Therefore, a ... haps the most popular directory of Web APIs is ProgrammableWeb which, as of. Ju

Development of Spoken Language Model for Automatic ...
from the sentences with respect to the context using the language model. This has various applications in various situations like for say if you want to certain ...

A Revisit of Generative Model for Automatic Image ...
visit the generative model by addressing the learning of se- ... [15] proposed an asymmetrical support vector machine for region-based .... site i for the kth image.

Language Model Verbalization for Automatic ... - Research at Google
this utterance for a voice-search-enabled maps application may be as follows: ..... interpolates the individual models using a development set to opti- mize the ...

Towards Automatic Model Synchronization from Model ...
School of Electronics Engineering and Computer Science ...... quate to support synchronization because the transforma- .... engineering, pages 362–365.

Automatic Model Construction with Gaussian Processes - GitHub
just an inference engine, but also a way to construct new models and a way to check ... 3. A model comparison procedure. Search strategies requires an objective to ... We call this system the automatic Bayesian covariance discovery (ABCD).

Automatic Campus Network Management using GPS.pdf ...
Automatic Campus Network Management using GPS.pdf. Automatic Campus Network Management using GPS.pdf. Open. Extract. Open with. Sign In.

Automatic Model Construction with Gaussian Processes - GitHub
One can multiply any number of kernels together in this way to produce kernels combining several ... Figure 1.3 illustrates the SE-ARD kernel in two dimensions. ×. = → ...... We'll call a kernel which enforces these symmetries a Möbius kernel.

AutoMOTGen: Automatic Model Oriented Test ...
AutoMOTGen architecture. Fig. 2. AutoMOTGen back-end flow. 4 AutoMOTGen Implementation. The current implementation of AutoMOTGen uses SAL as an intermediate lan- guage. This enables use of associated tools such as sal-atg, sal-bmc, sal-smc, etc. The