464 research outputs found

    Assessing Data Usefulness for Failure Analysis in Anonymized System Logs

    Full text link
    System logs are a valuable source of information for the analysis and understanding of systems behavior for the purpose of improving their performance. Such logs contain various types of information, including sensitive information. Information deemed sensitive can either directly be extracted from system log entries by correlation of several log entries, or can be inferred from the combination of the (non-sensitive) information contained within system logs with other logs and/or additional datasets. The analysis of system logs containing sensitive information compromises data privacy. Therefore, various anonymization techniques, such as generalization and suppression have been employed, over the years, by data and computing centers to protect the privacy of their users, their data, and the system as a whole. Privacy-preserving data resulting from anonymization via generalization and suppression may lead to significantly decreased data usefulness, thus, hindering the intended analysis for understanding the system behavior. Maintaining a balance between data usefulness and privacy preservation, therefore, remains an open and important challenge. Irreversible encoding of system logs using collision-resistant hashing algorithms, such as SHAKE-128, is a novel approach previously introduced by the authors to mitigate data privacy concerns. The present work describes a study of the applicability of the encoding approach from earlier work on the system logs of a production high performance computing system. Moreover, a metric is introduced to assess the data usefulness of the anonymized system logs to detect and identify the failures encountered in the system.Comment: 11 pages, 3 figures, submitted to 17th IEEE International Symposium on Parallel and Distributed Computin

    Hall viscosity, spin density, and torsion

    Full text link
    We investigate the relationship between Hall viscosity, spin density and response to geometric torsion. For the most general effective action for relativistic gapped systems, the presence of non-universal terms implies that there is no relationship between torsion response and Hall viscosity. We also consider free relativistic and non-relativistic microscopic actions and again verify the existence of analogous non-universal couplings. Explicit examples demonstrate that torsion response is unrelated to both Hall viscosity and spin density. We also argue that relativistic gapped theories must have vanishing Hall viscosity in Lorentz invariant vacuums.Comment: 15 pages, 1 figur

    Effective Field Theory of Relativistic Quantum Hall Systems

    Full text link
    Motivated by the observation of the fractional quantum Hall effect in graphene, we consider the effective field theory of relativistic quantum Hall states. We find that, beside the Chern-Simons term, the effective action also contains a term of topological nature, which couples the electromagnetic field with a topologically conserved current of 2+12+1 dimensional relativistic fluid. In contrast to the Chern-Simons term, the new term involves the spacetime metric in a nontrivial way. We extract the predictions of the effective theory for linear electromagnetic and gravitational responses. For fractional quantum Hall states at the zeroth Landau level, additional holomorphic constraints allow one to express the results in terms of two dimensionless constants of topological nature.Comment: 4 page

    The Euler current and relativistic parity odd transport

    Get PDF
    For a spacetime of odd dimensions endowed with a unit vector field, we introduce a new topological current that is identically conserved and whose charge is equal to the Euler character of the even dimensional spacelike foliations. The existence of this current allows us to introduce new Chern-Simons-type terms in the effective field theories describing relativistic quantum Hall states and (2+1) dimensional superfluids. Using effective field theory, we calculate various correlation functions and identify transport coefficients. In the quantum Hall case, this current provides the natural relativistic generalization of the Wen-Zee term, required to characterize the shift and Hall viscosity in quantum Hall systems. For the superfluid case this term is required to have nonzero Hall viscosity and to describe superfluids with non s-wave pairing.Comment: 24 pages. v2: added citations, corrected minor typos in appendi

    Designing Precoding and Receive Matrices for Interference Alignment in MIMO Interference Channels

    Get PDF
    Interference is a key bottleneck in wireless communication systems. Interference alignment is a management technique that align interference from other transmitters in the least possibly dimension subspace at each receiver and provides the remaining dimensions for free interference signal. An uncoordinated interference is an example of interference which cannot be aligned coordinately with interference from coordinated part; consequently, the performance of interference alignment approaches are degraded. In this paper, we propose a rank minimization method to enhance the performance of interference alignment in the presence of uncoordinated interference sources. Firstly, to obtain higher multiplexing gain, a new rank minimization based optimization problem is proposed; then, a new class of convex relaxation is introduced which can reduce the optimal value of the problem and obtain lower rank solutions by expanding the feasibility set. Simulation results show that our proposed method can obtain considerably higher multiplexing gain and sum rate than other approaches in the interference alignment framework

    Event Pattern Identification in Anonymized System Logs

    Get PDF
    The size of computing systems and the number of their components steadily increase. The volume of generated system logs is in proportion to this increase. Storing system logs for analyzing and diagnosing systems behavior in large computing systems, requires a high amount of storage capacity. Sensitive data in system logs raise significant concerns about their sharing and publishing. The use of anonymization methods to cleanse sensitive data in system logs before publication reduces the usability of anonymized system logs for further analysis. After a certain level of anonymization, the cleansed system logs lose their semantic and only remain useful for certain statistical analyses. In this work, we address this tradeoff between anonymization and the usefulness of anonymized system logs. This way, full system logs anonymization is guaranteed, minimum storage space is required, and the cleansed system logs remain usable for general statistical analyses. To address the above tradeoff: (1) All variables -of every log entry- need to be replaced with defined constant values. (2) Each log entry maps to a hash-key via a hash function that is resistant to hash-key collisions. (3) The frequency of each hash-key is calculated. (4) The hash-keys are optimized based on their frequency of appearance. Additionally, based on the hash-keys frequency, the non-informative hash-keys will be eliminated. Preliminary results of analyzing system logs from a production system via the proposed method, show up to 95% reduction in required storage capacity, while the precision of the statistical analysis remains unchanged and full anonymity is guaranteed
    • …
    corecore