publications_frank_eichinger.bib

@incollection{eichinger10software,
  title = {{S}oftware-{B}ug {L}ocalization with {G}raph {M}ining},
  author = {Frank Eichinger and Klemens B{\"o}hm},
  booktitle = {{M}anaging and {M}ining {G}raph {D}ata},
  publisher = {Springer},
  year = {2010},
  chapter = {17},
  editor = {Charu C. Aggarwal and Haixun Wang},
  pages = {515--546},
  series = {Advances in Database Systems},
  volume = {40},
  abstract = {In the recent past, a number of frequent subgraph mining algorithms has been proposed. They allow for analyses in domains where data is naturally graph-structured. However, caused by scalability problems when dealing with large graphs, the application of graph mining has been limited to only a few domains. In software engineering, debugging is an important issue. It is most challenging to localize bugs automatically, as this is expensive to be done manually. Several approaches have been investigated, some of which analyze traces of repeated program executions. These traces can be represented as call graphs. Such graphs describe the invocations of methods during an execution. This chapter is a survey of graph mining approaches for bug localization based on the analysis of dynamic call graphs. In particular, this chapter first introduces the subproblem of reducing the size of call graphs, before the different approaches to localize bugs based on such reduced graphs are discussed. Finally, we compare selected techniques experimentally and provide an outlook on future issues.},
  doi = {10.1007/978-1-4419-6045-0_17},
  isbn = {978-1-4419-6044-3},
  url = {https://link.springer.com/chapter/10.1007/978-1-4419-6045-0_17}
}
@incollection{eichinger13data,
  author = {Frank Eichinger and Daniel Pathmaperuma and Harald Vogt and Emmanuel M{\"u}ller},
  booktitle = {{C}omputational {I}ntelligent {D}ata {A}nalysis for {S}ustainable {D}evelopment},
  title = {{D}ata {A}nalysis {C}hallenges in the {F}uture {E}nergy {D}omain},
  chapter = {7},
  doi = {10.1201/b14799-11},
  editor = {Ting Yu and Nitesh Chawla and Simeon Simoff},
  isbn = {978-1439895948},
  pages = {181--242},
  publisher = {Chapman and Hall/CRC},
  series = {Data Mining and Knowledge Discovery Series},
  url = {https://doi.org/10.5445/IR/1000034312},
  year = {2013}
}
@article{briguglio13marketplaces,
  author = {Luigi Briguglio and Frank Eichinger and Massimiliano Nigrelli and Javier Lucio Ruiz-Andino},
  title = {{M}arketplaces for {E}nergy {D}emand-{S}ide {M}anagement based on {F}uture-{I}nternet {T}echnology},
  doi = {10.48550/arXiv.1304.5346},
  url = {https://arxiv.org/abs/1304.5346},
  volume = {abs/1304.5346},
  abstract = {Renewable energies become more important, and they contribute to the EU’s goals for greenhouse-gas reduction. However, their fluctuating nature calls for demand-side-management techniques, which balance energy generation and consumption. Such techniques are currently not broadly deployed. This paper describes the latest results from the FINSENY project on how Future-Internet enablers and market mechanisms can be used to realise such systems.},
  journal = {Computing Research Repository (CoRR) in arXiv},
  pdf = {https://arxiv.org/ftp/arxiv/papers/1304/1304.5346.pdf},
  year = {2013}
}
@article{briguglio13marketplace,
  title = {{A} {M}arketplace-{B}ased {A}pproach to {D}emand-{S}ide {M}anagement in the {S}mart {G}rid},
  author = {Luigi Briguglio and Massimiliano Nigrelli and Frank Eichinger and Javier Lucio Ruiz-Andino and Valter Bella},
  journal = {{ERCIM} {N}ews},
  year = {2013},
  number = {92},
  pages = {32--33},
  volume = {2013},
  abstract = {Market mechanisms facilitated by Future Internet technologies will help manage energy demand in the smart grid. New scenarios, stakeholders and services will need to be considered in the development of strategies to manage energy generation, distribution and consumption.},
  url = {https://ercim-news.ercim.eu/images/stories/EN92/EN92-web.pdf#page=32}
}
@phdthesis{eichinger11data-mining,
  author = {Frank Eichinger},
  title = {{D}ata-{M}ining {T}echniques for {C}all-{G}raph-{B}ased {S}oftware-{D}efect {L}ocalisation},
  doi = {10.5445/IR/1000023361},
  url = {https://dbis.ipd.kit.edu/download/eichi/eichinger11data-mining.pdf},
  abstract = {Defect localisation is an important problem in software engineering. This dissertation investigates call-graph-mining-based software defect localisation, which supports software developers by providing hints where defects might be located. It extends the state-of-the-art by proposing new graph representations and mining techniques for weighted graphs. This leads to a broader range of detectable defects, to an increased localisation precision and to enhanced scalability.},
  address = {Karlsruhe, Germany},
  school = {Department of Informatics, Karlsruhe Institute of Technology (KIT)},
  year = {2011}
}
@inproceedings{eichinger09selecting,
  author = {Frank Eichinger and Klemens B{\"o}hm},
  booktitle = {{I}nternational {S}ymposium on {I}ntelligent {D}ata {A}nalysis ({IDA})},
  title = {{S}electing {C}omputer {A}rchitectures by {M}eans of {C}ontrol-{F}low-{G}raph {M}ining},
  doi = {10.1007/978-3-642-03915-7},
  editor = {Niall Adams and Céline Robardet and Arno Siebes and Jean-Fran\c{c}ois Boulicaut},
  pages = {309--320},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  url = {https://dx.doi.org/10.5445/IR/1000012600},
  volume = {5772},
  abstract = {Deciding which computer architecture provides the best performance for a certain program is an important problem in hardware design and benchmarking. While previous approaches require expensive simulations or program executions, we propose an approach which solely relies on program analysis. We correlate substructures of the control-flow graphs representing the individual functions with the runtime on certain systems. This leads to a prediction framework based on graph mining, classification and classifier fusion. In our evaluation with the SPEC CPU 2000 and 2006 benchmarks, we predict the faster system out of two with high accuracy and achieve significant speedups in execution time.},
  comment = {The original publication is available at \url{https://link.springer.com/chapter/10.1007/978-3-642-03915-7_27}.},
  pdf = {https://dbis.ipd.kit.edu/download/eichi/eichinger09selecting.pdf},
  year = {2009}
}
@inproceedings{eichinger09towards,
  author = {Frank Eichinger and Klemens B{\"o}hm},
  booktitle = {{I}nternational {W}orkshop on {M}ining and {L}earning with {G}raphs ({MLG})},
  title = {{T}owards {S}calability of {G}raph-{M}ining {B}ased {B}ug {L}ocalisation},
  doi = {10.5445/IR/1000012601},
  editor = {Hendrik Blockeel and Karsten Borgwardt and Xifeng Yan},
  url = {https://dbis.ipd.kit.edu/download/eichi/eichinger09towards.pdf},
  abstract = {(Semi-)automated bug localisation is an important issue in software engineering. Recent techniques based on call graphs and graph mining can locate bugs in relatively small programs, but do not scale for real-world applications. In this paper we describe a bug-localisation approach based on graph mining that has this property, at least according to preliminary experiments. Our main contribution is the definition and analysis of class-level call graphs, with encouraging results.},
  address = {Leuven, Belgium},
  year = {2009}
}
@inproceedings{eichinger08kombiniertes,
  author = {Frank Eichinger and Klemens B{\"o}hm},
  booktitle = {{W}orkshop on {F}oundations of {D}atabases ({G}rundlagen von {D}atenbanken, {G}v{D})},
  title = {{K}ombiniertes {M}ining von strukturellen und relationalen {D}aten},
  doi = {10.5445/IR/1000008094},
  editor = {Hagen Höpfner and Friederike Klan},
  number = {01/2008},
  organization = {Gesellschaft für Informatik (GI)},
  pages = {121--125},
  publisher = {International University in Germany, Buchsal},
  series = {Technical Report},
  url = {https://dbis.ipd.kit.edu/download/eichi/eichinger08kombiniertes.pdf},
  abstract = {Data Mining Techniken wie Klassifikation, Regression und Clusteranalyse finden heutzutage eine weite Verbreitung. Entsprechende relationale Daten liegen in vielen Anwendungsdomänen vor, und effiziente Data Mining Algorithmen sind in kommerzielle Werkzeuge sowie in Datenbank Management Systeme integriert. In den letzten Jahren wurden aber auch verschiedene strukturelle Data Mining Techniken entwickelt, die z.B. mit Graph-basierten Daten arbeiten. Solche Techniken erschließen neue Anwendungsgebiete, bieten aber auch das Potential, bisherige Techniken zu ergänzen. Oft können durch Kombination bisherige Ergebnisse verbessert werden. In diesem Beitrag präsentieren wir Arbeiten aus dem Bereich der Vorhersage von Kundenverhalten und der Fehlersuche in Software, in denen strukturelle und relationale Data Mining Techniken erfolgreich kombiniert wurden. Schließlich geben wir einen Ausblick auf weitere Anwendungsgebiete und zukünftige Herausforderungen.},
  address = {Apolda, Germany},
  institution = {International University in Germany, Buchsal},
  year = {2008}
}
@inproceedings{eichinger08mining,
  author = {Frank Eichinger and Klemens B{\"o}hm and Matthias Huber},
  booktitle = {{E}uropean {C}onference on {M}achine {L}earning and {P}rinciples and {P}ractice of {K}nowledge {D}iscovery in {D}atabases ({ECML} {PKDD})},
  title = {{M}ining {E}dge-{W}eighted {C}all {G}raphs to {L}ocalise {S}oftware {B}ugs},
  year = {2008},
  editor = {Walter Daelemans and Bart Goethals and Katharina Morik},
  number = {I},
  pages = {333--348},
  publisher = {Springer},
  series = {Lecture Notes in Artificial Intelligence},
  volume = {5211},
  abstract = {An important problem in software engineering is the automated discovery of noncrashing occasional bugs. In this work we address this problem and show that mining of weighted call graphs of program executions is a promising technique. We mine weighted graphs with a combination of structural and numerical techniques. More specifically, we propose a novel reduction technique for call graphs which introduces edge weights. Then we present an analysis technique for such weighted call graphs based on graph mining and on traditional feature selection schemes. The technique generalises previous graph mining approaches as it allows for an analysis of weights. Our evaluation shows that our approach finds bugs which previous approaches cannot detect so far. Our technique also doubles the precision of finding bugs which existing techniques can already localise in principle.},
  comment = {The original publication is available at \url{https://link.springer.com/chapter/10.1007/978-3-540-87479-9_40}.

Experimental data: \url{https://dbis.ipd.kit.edu/download/eichi/eichinger08mining/}
Video: \url{https://videolectures.net/ecmlpkdd08_eichinger_mewc/}},
  doi = {10.1007/978-3-540-87479-9_40},
  isbn = {978-3-540-87478-2},
  pdf = {https://dbis.ipd.kit.edu/download/eichi/eichinger08mining.pdf},
  url = {https://dx.doi.org/10.5445/IR/1000009256}
}
@inproceedings{eichinger08improved,
  author = {Frank Eichinger and Klemens B{\"o}hm and Matthias Huber},
  booktitle = {{I}nternational {W}orkshop on {M}ining and {L}earning with {G}raphs ({MLG})},
  title = {{I}mproved {S}oftware {F}ault {D}etection with {G}raph {M}ining},
  doi = {10.5445/IR/1000008547},
  editor = {Samuel Kaski and S.V.N. Vishwanathan and Stefan Wrobel},
  url = {https://dbis.ipd.kit.edu/download/eichi/eichinger08improved.pdf},
  abstract = {This work addresses the problem of discovering bugs in software development. We investigate the utilisation of call graphs of program executions and graph mining algorithms to approach this problem. We propose a novel reduction technique for call graphs which introduces edge weights. Then, we present an analysis technique for such weighted call graphs based on graph mining and on traditional feature selection. Our new approach finds bugs which could not be detected so far. With regard to bugs which can already be localised, our technique also doubles the precision of finding them.},
  address = {Helsinki, Finnland},
  comment = {Video: \url{https://videolectures.net/mlg08_eichinger_isfd/}},
  year = {2008}
}
@article{eichinger15timeseries,
  author = {Frank Eichinger and Pavel Efros and Stamatis Karnouskos and Klemens B{\"o}hm},
  title = {{A} {T}ime-{S}eries {C}ompression {T}echnique and its {A}pplication to the {S}mart {G}rid},
  doi = {10.1007/s00778-014-0368-8},
  number = {2},
  pages = {193--218},
  url = {https://dx.doi.org/10.5445/IR/1000046491},
  volume = {24},
  abstract = {Time-series data is increasingly collected in many domains. One example is the smart electricity infrastructure, which generates huge volumes of such data from sources such as smart electricity meters. Although today this data is used for visualization and billing in mostly 15-min resolution, its original temporal resolution frequently is more fine-grained, e.g., seconds. This is useful for various analytical applications such as short-term forecasting, disaggregation and visualization. However, transmitting and storing huge amounts of such fine-grained data is prohibitively expensive in terms of storage space in many cases. In this article, we present a compression technique based on piecewise regression and two methods which describe the performance of the compression. Although our technique is a general approach for time-series compression, smart grids serve as our running example and as our evaluation scenario. Depending on the data and the use-case scenario, the technique compresses data by ratios of up to factor 5,000 while maintaining its usefulness for analytics. The proposed technique has outperformed related work and has been applied to three real-world energy datasets in different scenarios. Finally, we show that the proposed compression technique can be implemented in a state-of-the-art database management system.},
  comment = {The final publication is available at Springer via \url{https://dx.doi.org/10.1007/s00778-014-0368-8}.},
  journal = {{T}he {VLDB} {J}ournal},
  pdf = {https://dbis.ipd.kit.edu/download/eichi/eichinger15timeseries.pdf},
  year = {2015}
}
@inproceedings{eichinger10on,
  author = {Frank Eichinger and Matthias Huber and Klemens B{\"o}hm},
  booktitle = {{I}nternational {C}onference on {A}rtificial {I}ntelligence ({BCS} {AI})},
  title = {{O}n the {U}sefulness of {W}eight-{B}ased {C}onstraints in {F}requent {S}ubgraph {M}ining},
  year = {2010},
  editor = {Max Bramer and Miltos Petridis and Adrian Hopgood},
  organization = {BCS SGAI},
  pages = {65--78},
  publisher = {Springer},
  abstract = {Frequent subgraph mining is an important data-mining technique. In this paper we look at weighted graphs, which are ubiquitous in the real world. The analysis of weights in combination with mining for substructures might yield more precise results. In particular, we study frequent subgraph mining in the presence of weight-based constraints and explain how to integrate them into mining algorithms. While such constraints only yield approximate mining results in most cases, we demonstrate that such results are useful nevertheless and explain this effect. To do so, we both assess the completeness of the approximate result sets, and we carry out application-oriented studies with real-world data-analysis problems: software-defect localization and explorative mining in transportation logistics. Our results are that the runtime can improve by a factor of up to 3.5 in defect localization and 7 in explorative mining. At the same time, we obtain an even slightly increased defect-localization precision and obtain good explorative mining results.},
  comment = {Note that there is an extended version of this conference paper in a technical report available for download: \url{https://publikationen.bibliothek.kit.edu/1000017769}.

Experimental data: \url{https://dbis.ipd.kit.edu/download/eichi/eichinger10on/}
ParSeMiS Extensions: \url{https://sdqweb.ipd.kit.edu/wiki/ParSeMiS-Extensions}},
  doi = {10.1007/978-0-85729-130-1_5},
  isbn = {978-0-85729-129-5}
}
@techreport{tr-2010-10,
  author = {Frank Eichinger and Matthias Huber and Klemens B{\"o}hm},
  date = {2010},
  institution = {Department of Informatics, Karlsruhe Institute of Technology (KIT)},
  title = {{O}n the {U}sefulness of {W}eight-{B}ased {C}onstraints in {F}requent {S}ubgraph {M}ining},
  doi = {10.5445/IR/1000017769},
  number = {2010,10},
  type = {Karlsruhe Reports in Informatics},
  url = {https://publikationen.bibliothek.kit.edu/1000017769},
  abstract = {Frequent subgraph mining is an important data-mining technique. In this paper we look at weighted graphs, which are ubiquitous in the real world. The analysis of weights in combination with mining for substructures might yield more precise results. In particular, we study frequent subgraph mining in the presence of weight-based constraints and explain how to integrate them into mining algorithms. While such constraints only yield approximate mining results in most cases, we demonstrate that such results are useful nevertheless and explain this effect. To do so, we both assess the completeness of the approximate result sets, and we carry out application-oriented studies with real-world data-analysis problems: software-defect localization, weighted graph classification and explorative mining in logistics. Our results are that the runtime can improve by a factor of up to 3.5 in defect localization and classification and 7 in explorative mining. At the same time, we obtain an even slightly increased defect-localization precision, stable classification precision and obtain good explorative mining results.},
  address = {Karlsruhe, Germany},
  comment = {Note that there is a shorter conference version of this technical report: \url{https://dx.doi.org/10.1007/978-0-85729-130-1_5}.

Experimental data: \url{https://dbis.ipd.kit.edu/download/eichi/eichinger10on/}
ParSeMiS Extensions: \url{https://sdqweb.ipd.kit.edu/wiki/ParSeMiS-Extensions}},
  issn = {2190-4782},
  year = {2010}
}
@inproceedings{eichinger09from,
  author = {Frank Eichinger and David Kramer and Klemens B{\"o}hm and Wolfgang Karl},
  booktitle = {{I}nternational {C}onference on {A}rtificial {I}ntelligence ({BCS} {AI})},
  title = {{F}rom {S}ource {C}ode to {R}untime {B}ehaviour: {S}oftware {M}etrics {H}elp to {S}elect the {C}omputer {A}rchitecture.},
  year = {2009},
  editor = {Max Bramer and Richard Ellis and Miltos Petridis},
  organization = {BCS SGAI},
  pages = {363--376},
  publisher = {Springer},
  abstract = {The decision which hardware platform to use for a certain application is an important problem in computer architecture. This paper reports on a study where a data-mining approach is used for this decision. It relies purely on source-code characteristics, to avoid potentially expensive program executions. One challenge in this context is that one cannot infer how often functions that are part of the application are typically executed. The main insight of this study is twofold: (a) Source-code characteristics are sufficient nevertheless. (b) Linking individual functions with the runtime behaviour of the program as a whole yields good predictions. In other words, while individual data objects from the training set may be quite inaccurate, the resulting model is not.},
  comment = {Note that there is a journal version of this paper: \url{https://dx.doi.org/10.1016/j.knosys.2009.11.014}.},
  doi = {10.1007/978-1-84882-983-1_29},
  isbn = {978-1-84882-982-4},
  pdf = {https://dbis.ipd.kit.edu/download/eichi/eichinger09from.pdf},
  url = {https://dx.doi.org/10.5445/IR/1000012935}
}
@article{eichinger10from,
  author = {Frank Eichinger and David Kramer and Klemens B{\"o}hm and Wolfgang Karl},
  title = {{F}rom {S}ource {C}ode to {R}untime {B}ehaviour: {S}oftware {M}etrics {H}elp to {S}elect the {C}omputer {A}rchitecture},
  doi = {10.1016/j.knosys.2009.11.014},
  number = {4},
  pages = {343--349},
  volume = {23},
  abstract = {The decision which hardware platform to use for a certain application is an important problem in computer architecture. This paper reports on a study where a data-mining approach is used for this decision. It relies purely on source-code characteristics, to avoid potentially expensive programme executions. One challenge in this context is that one cannot infer how often functions that are part of the application are typically executed. The main insight of this study is twofold: (a) Source-code characteristics are sufficient nevertheless. (b) Linking individual functions with the runtime behaviour of the programme as a whole yields good predictions. In other words, while individual data objects from the training set may be quite inaccurate, the resulting model is not.},
  comment = {Note that there is a conference version of this paper available for download: \url{https://dx.doi.org/10.5445/IR/1000012935}.},
  journal = {{K}nowledge-{B}ased {S}ystems},
  year = {2010}
}
@inproceedings{eichinger10software-defect,
  author = {Frank Eichinger and Klaus Krogmann and Roland Klug and Klemens B{\"o}hm},
  booktitle = {{E}uropean {C}onference on {M}achine {L}earning and {P}rinciples and {P}ractice of {K}nowledge {D}iscovery in {D}atabases ({ECML} {PKDD})},
  title = {{S}oftware-{D}efect {L}ocalisation by {M}ining {D}ataflow-{E}nabled {C}all {G}raphs},
  doi = {10.1007/978-3-642-15880-3_33},
  editor = {Jos{\'e} Balc{\'a}zar and Francesco Bonchi and Aristides Gionis and Mich{\`e}le Sebag},
  isbn = {978-3-642-15879-7},
  number = {I},
  pages = {425--441},
  publisher = {Springer},
  series = {Lecture Notes in Artificial Intelligence},
  url = {https://dx.doi.org/10.5445/IR/1000019636},
  volume = {6321},
  abstract = {Defect localisation is essential in software engineering and is an important task in domain-specific data mining. Existing techniques building on call-graph mining can localise different kinds of defects. However, these techniques focus on defects that affect the controlflow and are agnostic regarding the dataflow. In this paper, we introduce dataflow-enabled call graphs that incorporate abstractions of the dataflow. Building on these graphs, we present an approach for defect localisation. The creation of the graphs and the defect localisation are essentially data mining problems, making use of discretisation, frequent subgraph mining and feature selection. We demonstrate the defect-localisation qualities of our approach with a study on defects introduced into Weka. As a result, defect localisation now works much better, and a developer has to investigate on average only 1.5 out of 30 methods to fix a defect.},
  comment = {The original publication is available at \url{https://link.springer.com/chapter/10.1007/978-3-642-15880-3_33}.

Experimental data: \url{https://dbis.ipd.kit.edu/download/eichi/eichinger10software-defect/}},
  pdf = {https://dbis.ipd.kit.edu/download/eichi/eichinger10software-defect.pdf},
  year = {2010}
}
@inproceedings{eichinger06sequence,
  author = {Frank Eichinger and Detlef D. Nauck and Frank Klawonn},
  booktitle = {{W}orkshop on {P}ractical {D}ata {M}ining: {A}pplications, {E}xperiences and {C}hallenges},
  title = {{S}equence {M}ining for {C}ustomer {B}ehaviour {P}redictions in {T}elecommunications},
  doi = {10.5445/IR/1000005948},
  editor = {Markus Ackermann and Carlos Soares and Bettina Guidemann},
  pages = {3--10},
  url = {https://dbis.ipd.kit.edu/download/eichi/eichinger06sequence.pdf},
  abstract = {Predicting the behaviour of customers is challenging, but important for service oriented businesses. Data mining techniques are used to make such predictions, typically using only recent static data. In this paper, a sequence mining approach is proposed, which allows taking historic data and temporal developments into account as well. In order to form a combined classifier, sequence mining is combined with decision tree analysis. In the area of sequence mining, a tree data structure is extended with hashing techniques and a variation of a classic algorithm is presented. The combined classifier is applied to real customer data and produces promising results.},
  address = {Berlin, Germany},
  year = {2006}
}
@inproceedings{eichinger11scalable,
  author = {Frank Eichinger and Christopher O{\ss}ner and Klemens B{\"o}hm},
  booktitle = {{I}nternational {C}onference on {D}ata {M}ining ({SDM})},
  title = {{S}calable {S}oftware-{D}efect {L}ocalisation by {H}ierarchical {M}ining of {D}ynamic {C}all {G}raphs},
  doi = {10.1137/1.9781611972818.62},
  editor = {Chris Clifton and Takashi Washio},
  isbn = {978-0-898719-92-5},
  organization = {SIAM},
  pages = {723--734},
  publisher = {Omnipress},
  url = {https://dx.doi.org/10.5445/IR/1000023049},
  abstract = {The localisation of defects in computer programmes is essential in software engineering and is important in domain-specific data mining. Existing techniques which build on call-graph mining localise defects well, but do not scale for large software projects. This paper presents a hierarchical approach with good scalability characteristics. It makes use of novel call-graph representations, frequent subgraph mining and feature selection. It first analyses call graphs of a coarse granularity, before it zooms-in into more fine-grained graphs. We evaluate our approach with defects in the Mozilla Rhino project: In our setup, it narrows down the code a developer has to examine to about 6% only.},
  address = {Mesa, USA},
  pdf = {https://dbis.ipd.kit.edu/download/eichi/eichinger11scalable.pdf},
  year = {2011}
}
@article{eichinger14concurrency,
  author = {Frank Eichinger and Victor Pankratius and Klemens B{\"o}hm},
  title = {{D}ata {M}ining for {D}efects in {M}ulticore {A}pplications: {A}n {E}ntropy-{B}ased {C}all-{G}raph {T}echnique},
  doi = {10.1002/cpe.2918},
  number = {1},
  pages = {1--20},
  url = {https://dx.doi.org/10.5445/IR/1000037805},
  volume = {26},
  abstract = {Multicore computers are ubiquitous. Expert developers as well as developers with little experience in parallelism are now asked to create multithreaded software in order to exploit parallelism in mainstream shared-memory hardware. However, finding and fixing parallel programming errors is a complex and arduous task. Programmers thus rely on tools such as race detectors that typically focus on reporting errors due to incorrect usage of synchronization constructs or due to missing synchronization. This arsenal of debugging techniques, however, is incomplete. This article presents a new perspective and addresses a largely unexplored direction of defect localization where a wrong usage of non-parallel programming constructs might cause wrong parallel application behavior. In particular, we make a contribution by showing how to use data-mining techniques to locate defects in multithreaded shared-memory programs. Our technique analyzes execution anomalies in a condensed representation of the dynamic call graphs of a multithreaded object-oriented application and identifies methods that contain a defect. Compared to race detectors that concentrate on finding incorrect synchronization, our method is able to reveal a wider range of defects that affect the control flow of a parallel program. Results from controlled experiments show that our data-mining approach not only finds race conditions in different types of multicore applications, but also other errors that cause incorrect parallel program behavior. Data-mining techniques offer a fruitful new ground for parallel program debugging, and we also discuss long-term directions for this interesting field.},
  journal = {{C}oncurrency and {C}omputation: {P}ractice and {E}xperience},
  pdf = {https://dbis.ipd.kit.edu/download/eichi/eichinger14concurrency.pdf},
  year = {2014}
}
@inproceedings{eichinger10localizing,
  author = {Frank Eichinger and Victor Pankratius and Philipp W. L. Gro{\ss}e and Klemens B{\"o}hm},
  booktitle = {{T}esting: {A}cademic and {I}ndustrial {C}onference -- {P}ractice and {R}esearch {T}echniques ({TAIC} {PART})},
  title = {{L}ocalizing {D}efects in {M}ultithreaded {P}rograms by {M}ining {D}ynamic {C}all {G}raphs},
  doi = {10.1007/978-3-642-15585-7_7},
  editor = {Leonardo Bottaci and Gordon Fraser},
  isbn = {978-3-642-15584-0},
  pages = {56--71},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  url = {https://dx.doi.org/10.5445/IR/1000019716},
  volume = {6303},
  abstract = {Writing multithreaded software for multicore computers confronts many developers with the difficulty of finding parallel programming errors. In the past, most parallel debugging techniques have concentrated on finding race conditions due to wrong usage of synchronization constructs. A widely unexplored issue, however, is that a wrong usage of non-parallel programming constructs may also cause wrong parallel application behavior. This paper presents a novel defect-localization technique for multithreaded shared-memory programs that is based on analyzing execution anomalies. Compared to race detectors that report just on wrong synchronization, this method can detect a wider range of defects affecting parallel execution. It works on a condensed representation of the call graphs of multithreaded applications and employs data-mining techniques to locate a method containing a defect. Our results from controlled application experiments show that we found race conditions, but also other programming errors leading to incorrect parallel program behavior. On average, our approach reduced in our benchmark the amount of code to be inspected to just 7.1% of all methods.},
  comment = {The original publication is available at \url{https://link.springer.com/chapter/10.1007/978-3-642-15585-7_7}.},
  pdf = {https://dbis.ipd.kit.edu/download/eichi/eichinger10localizing.pdf},
  year = {2010}
}
@inproceedings{eichinger15recoleta,
  author = {Frank Eichinger and Immanuel Wietreich},
  booktitle = {{D}atenbanksysteme f{\"{u}}r {B}usiness, {T}echnologie und {W}eb ({BTW})},
  title = {{R}eco{L}eta: {A} {R}ecommender {S}ystem for {E}vents for {P}ersonalised {E}-{M}ail {C}ampaigns},
  year = {2015},
  editor = {Thomas Seidl and Norbert Ritter and Harald Sch{\"{o}}ning and Kai{-}Uwe Sattler and Theo H{\"{a}}rder and Steffen Friedrich and Wolfram Wingerath},
  pages = {679--682},
  publisher = {GI},
  series = {LNI},
  volume = {241},
  abstract = {We demonstrate the RecoLeta system for event recommendations. It combines two different recommender approaches: one novel approach dedicated to music concert events and one state-of-the-art approach. We also present our big-data architecture for e-mail delivery and recommendation calculation in an in-memory database.},
  isbn = {978-3-88579-635-0},
  pdf = {https://publications.frank-eichinger.de/eichinger15recoleta.pdf},
  url = {https://dl.gi.de/handle/20.500.12116/2445}
}
@incollection{eichinger22predicting,
  author = {Frank Eichinger and Moritz Mayer},
  booktitle = {{M}achine {L}earning and {D}ata {A}nalytics for {S}olving {B}usiness {P}roblems},
  title = {{P}redicting {S}alaries with {R}andom-{F}orest {R}egression},
  booksubtitle = {{M}ethods, {A}pplications, and {C}ase {S}tudies},
  chapter = {1},
  doi = {10.1007/978-3-031-18483-3_1},
  editor = {Bader Alyoubi and Chiheb{-}Eddine Ben N'Cir and Ibraheem Alharbi and Anis Jarboui},
  isbn = {978-3-031-18483-3},
  pages = {1--21},
  publisher = {Springer},
  series = {Unsupervised and Semi-Supervised Learning},
  url = {https://link.springer.com/chapter/10.1007/978-3-031-18483-3_1},
  volume = {11},
  abstract = {For companies it is essential to know the market price of the salaries of their current and prospective employees. Predicting such salaries is challenging, as many factors need to be considered, and large real datasets for learning are scarce. For this reason, research on salary predictions is comparably rare and limited. In this study, we investigate whether and how an advanced machine-learning approach, namely ensembles of random-forest regression, can achieve high-quality salary predictions. We use a large real dataset of more than three million employees and more than 300 professions. Our approach learns -- for each profession -- a random-forest regression model to predict salaries. In our evaluation, we show that this approach performs better than related work on salary prediction by machine-learning approaches with a mean absolute percentage error (\emph{MAPE}) of 17.1\%. We identify reducing the number of possible values of categorical variables, training separate models as well as outlier handling as the key factors for the results achieved.},
  year = {2022}
}
@inproceedings{eichinger23estimations,
  author = {Frank Eichinger and Jannik Kiesel and Matthias Dorner and Stefan Arnold},
  booktitle = {{I}nternational {C}onference on {A}rtificial {I}ntelligence ({BCS} {AI})},
  title = {{Estimations of Professional Experience with Panel Data to Improve Salary Predictions}},
  year = {2023},
  editor = {Max Bramer and Frederic Stahl},
  organization = {BCS SGAI},
  pages = {513--518},
  publisher = {Springer},
  abstract = {Predicting salaries is crucial in business. While prediction models can be trained on large and real salary datasets, they typically lack information regarding professional experience, an essential factor for salary. We investigate various regression techniques for the estimation of professional experience based on data from the Socio-Economic Panel (SOEP) to augment data sets. We further show how to integrate such models into applications and evaluate the usefulness for salary prediction on a large real payroll dataset.},
  comment = {Regression models: \url{https://www.it-management.rw.fau.de/sgai/}},
  doi = {10.1007/978-3-031-47994-6_46},
  isbn = {978-3-031-47993-9},
  pdf = {https://publications.frank-eichinger.de/eichinger23estimations.pdf}
}
@comment{{jabref-meta: databaseType:bibtex;}}

This file was generated by bibtex2html 1.98.