Databases Reference
In-Depth Information
TABLE 9.2:
Transactions Associated with Calls to readbuf Shown in
Figure 9.8
Variables
Transactions
c1
c2
packets
f(>, 0)g
f(>, 0)g
packflag
f(:=,
true
)g
size
f(:=,
MAXSIZE
), f(:=,
MINSIZE
),
(arg(1),
allocbuf
), (arg(1),
allocbuf
),
(arg(2),
readbuf
)g (arg(2),
readbuf
)g
buf
f(:=,res(
allocbuf
)), f(:=,res(
allocbuf
)), (6=, 0),
(arg(1),
readbuf
)g (arg(1),
lock
),
(arg(1),
readbuf
)g
f(=, 0), (:=,res(
lock
))g
l
i
Variables Transactions
c3 c4
packets
f(>, 0)g f(>, 0)g
packflag
f(:=,true)g
size
f(:=,
MINSIZE
), f(:=,
MAXSIZE
),
(arg(1),
allocbuf
), (arg(1),
allocbuf
),
(arg(2),
readbuf
)g (arg(2),
readbuf
)g
buf
f(:=,res(
allocbuf
)), (6=, 0), f(:=,res(
allocbuf
)), (6=, 0),
(arg(1),
lock
),
(arg(1),
lock
),
(arg(1),
readbuf
)g
(arg(1),
readbuf
)g
l
f(=, 0), (:=,res(
lock
))g
f(=, 0), (:=,res(lock))g
if
f(:= 0)g
f(:= 0)g
size
: f(arg(1),
allocbuf
), (arg(2),
readbuf
)g
l
: f(=,0), (:=,res(
lock
))g
buf
: f(arg(1),
lock
), (arg(1),
readbuf
),
(6=,0), (:=,res(
allocbuf
))g
Depending upon on the level of precision required by the user, the above
mining technique can be easily translated into the more restrictive intersection
technique by simply fixing n to be the total number of call-sites (confidence
= 100%).
Sequence Mining. For control-flow predicates, frequent itemset mining
does not suce since the order of elements in the transaction is not con-
sidered. For deriving precedence relations [37], we use sequence mining [2]. A
sequence mining algorithm takes as input a set of sequences (I), a user-defined
confidence threshold, and outputs a set (S) of sequences that occur as subse-
quences in a minimum fraction (as specified by the confidence threshold) of
input sequences. Observe that if a subsequence s is frequently occurring, all
subsequences of s also occur at least as frequently as s. Therefore, we consider
Search WWH ::
Custom Search