Petko Valtchev - Academia.edu (original) (raw)

Papers by Petko Valtchev

Research paper thumbnail of A Lazy Evaluation Strategy for Assessing Network Device Configuration Correctness

Network development frequently affects the management of its devices, the bandwidth and the workl... more Network development frequently affects the management of its devices, the bandwidth and the workload of network administrators who have to configure these devices. But the establishment by the IETF network protocols such as Netconf and YANG allowed the development of network configuration management to replace SNMP who had proven flawed. Thus the third aspect already found its solutions in the development of management tools for configurations, involving the first aspect at the same time. Remains the second aspect that few existing tools take into account, because the change of one parameter will transfer the entire configuration file. Therefore, our present paper proposes a method for recovering a part of a configuration file for editing. To do this, we use high-level programming concepts to abstract the manufacturer of the equipment. We used also concepts such as logical formulas and Meta-CLI to represent the abstract configuration of the device then we can test certain complex properties of one or more devices and deduce the rest of information. These logical formulas are in the form of a tree containing device parameters retrieved from the device itself. Thus our algorithm needs only to retrieve the parameter necessary for the computing of the logical formula.

Research paper thumbnail of A Data Model for Management of Network Device Configuration Heterogeneity

The management of the configuration of network devices is a complex process, due to both the numb... more The management of the configuration of network devices is a complex process, due to both the number of devices and parameters to take into consideration, and most importantly to the widely varying ways in which such parameters can be queried and modified on each device. Each equipment vendor provides its own command-line interface or management protocol where parameters are structured in a different way, and even multiple equipments from the same vendor may need to be interacted with differently. In this paper, we present a generic data model for configuration information of network devices that takes into account vendor and version heterogeneity. Ultimately, a configuration query engine will allow a user to pinpoint a specific, abstract configuration parameter, and be given the proper sequence of commands to query that parameter on a device of given vendor and operating system version.

Research paper thumbnail of Boussaidi. Using FCA to suggest refactorings to correct design defects

Research paper thumbnail of Using FCA to suggest refactorings to correct design defects

Proceedings of the 4th International Conference on Concept Lattices and Their Applications, Oct 30, 2006

Design defects are poor design choices resulting in a hard-to-maintain software, hence their dete... more Design defects are poor design choices resulting in a hard-to-maintain software, hence their detection and correction are key steps of a disciplined software process aimed at yielding high-quality software artifacts. While modern structure-and metric-based techniques enable precise detection of design defects, the correction of the discovered defects, eg, by means of refactorings, remains a manual, hence error-prone, activity. As many of the refactorings amount to re-distributing class members over a (possibly extended) set of classes, formal ...

Research paper thumbnail of Using FCA to Suggest Refactorings to Correct Design Defects

Lecture Notes in Computer Science, 2008

Design defects are poor design choices resulting in a hard-to-maintain software, hence their dete... more Design defects are poor design choices resulting in a hard-to-maintain software, hence their detection and correction are key steps of a disciplined software process aimed at yielding high-quality software artifacts. While modern structure-and metric-based techniques enable precise detection of design defects, the correction of the discovered defects, eg, by means of refactorings, remains a manual, hence error-prone, activity. As many of the refactorings amount to re-distributing class members over a (possibly extended) set of classes, formal ...

Research paper thumbnail of A data model for management of network device configuration heterogeneity

2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

Research paper thumbnail of MASPEGHI 2004 Mechnisms for Specialization, Generalization and Inheritance

European Conference on Object-Oriented Programming, 2004

Abstract: MASPEGHI 2004 is the third edition of the MASPEGHIworkshop. This year the organizers of... more Abstract: MASPEGHI 2004 is the third edition of the MASPEGHIworkshop. This year the organizers of both the ECOOP 2002 InheritanceWorkshop and MASPEGHI 2003 came together to enlarge the scope ofthe workshop and to address new challenges. We succeeded in gatheringa diverse group of researchers and practitioners interested in mechanismsfor managing specialization and generalization of programming languagecomponents. The workshop contained a

Research paper thumbnail of Analogy-based software quality prediction

Predicting the stability of object-oriented systems is an important and challenging task. Classic... more Predicting the stability of object-oriented systems is an important and challenging task. Classical approaches to quality prediction perform some form of inductive inference starting from datasets of software items with known quality factor values and looking for typical features that discriminate the items regarding the quality factor. However, most of the effective methods for predictive model construction are based on

Research paper thumbnail of A Declarative Approach to Network Device Configuration Correctness

Journal of Network and Systems Management, 2016

Research paper thumbnail of Finding Minimal Rare Itemsets and Rare Association Rules

Proceedings of the 4th International Conference on Knowledge Science Engineering and Management, 2010

Rare association rules correspond to rare, or infrequent, itemsets, as opposed to frequent ones t... more Rare association rules correspond to rare, or infrequent, itemsets, as opposed to frequent ones that are targeted by conventional pattern miners. Rare rules reflect regularities of local, rather than global, scope that can nevertheless provide valuable insights to an expert, especially in areas such as genetics and medical diagnosis where some specific deviations/illnesses occur only in a small number of cases. The work presented here is motivated by the long-standing open question of efficiently mining strong rare rules, i.e., rules with high confidence and low support.

Research paper thumbnail of Similarity-based Clustering versus Galois lattice

Research paper thumbnail of When concepts point at other concepts: the case of uml diagram reconstruction

Research paper thumbnail of FlowME: Lattice-based Traffic Measurement

An implementation over an Openflow switch, FlowME, was developed and evaluated upon its memory us... more An implementation over an Openflow switch, FlowME, was developed and evaluated upon its memory usage, performance overhead, and processing effort to generate the minimal solution. Experimental results indicate a significant decrease in resource consumption.

Research paper thumbnail of Alignement d'ontologies dirigé par la structure

... Par exemple, la similarité de classes appliquée à Flat et Person, soit simC(Flat, Person), va... more ... Par exemple, la similarité de classes appliquée à Flat et Person, soit simC(Flat, Person), va dépendre a priori de la similarité d'attributs simA pour tous les couples mixtes d'attributs, en particulier simA(address, salary). La dépendance ...

Research paper thumbnail of Recommendation Strategy based On Relation Rule Mining

Research paper thumbnail of A Lazy Evaluation Strategy for Assessing Network Device Configuration Correctness

2014 19th International Conference on Engineering of Complex Computer Systems, Aug 1, 2014

Research paper thumbnail of A Fast Algorithm for Building the Hasse Diagram of a Galois Lattice

Research paper thumbnail of Analyse formelle de donn�es relationnelles pour la r�ing�nierie des mod�les UML

Research paper thumbnail of P.: OLA in the OAEI 2005 alignment contest

Research paper thumbnail of A partition-based approach towards building Galois (concept) lattices

Research paper thumbnail of A Lazy Evaluation Strategy for Assessing Network Device Configuration Correctness

Network development frequently affects the management of its devices, the bandwidth and the workl... more Network development frequently affects the management of its devices, the bandwidth and the workload of network administrators who have to configure these devices. But the establishment by the IETF network protocols such as Netconf and YANG allowed the development of network configuration management to replace SNMP who had proven flawed. Thus the third aspect already found its solutions in the development of management tools for configurations, involving the first aspect at the same time. Remains the second aspect that few existing tools take into account, because the change of one parameter will transfer the entire configuration file. Therefore, our present paper proposes a method for recovering a part of a configuration file for editing. To do this, we use high-level programming concepts to abstract the manufacturer of the equipment. We used also concepts such as logical formulas and Meta-CLI to represent the abstract configuration of the device then we can test certain complex properties of one or more devices and deduce the rest of information. These logical formulas are in the form of a tree containing device parameters retrieved from the device itself. Thus our algorithm needs only to retrieve the parameter necessary for the computing of the logical formula.

Research paper thumbnail of A Data Model for Management of Network Device Configuration Heterogeneity

The management of the configuration of network devices is a complex process, due to both the numb... more The management of the configuration of network devices is a complex process, due to both the number of devices and parameters to take into consideration, and most importantly to the widely varying ways in which such parameters can be queried and modified on each device. Each equipment vendor provides its own command-line interface or management protocol where parameters are structured in a different way, and even multiple equipments from the same vendor may need to be interacted with differently. In this paper, we present a generic data model for configuration information of network devices that takes into account vendor and version heterogeneity. Ultimately, a configuration query engine will allow a user to pinpoint a specific, abstract configuration parameter, and be given the proper sequence of commands to query that parameter on a device of given vendor and operating system version.

Research paper thumbnail of Boussaidi. Using FCA to suggest refactorings to correct design defects

Research paper thumbnail of Using FCA to suggest refactorings to correct design defects

Proceedings of the 4th International Conference on Concept Lattices and Their Applications, Oct 30, 2006

Design defects are poor design choices resulting in a hard-to-maintain software, hence their dete... more Design defects are poor design choices resulting in a hard-to-maintain software, hence their detection and correction are key steps of a disciplined software process aimed at yielding high-quality software artifacts. While modern structure-and metric-based techniques enable precise detection of design defects, the correction of the discovered defects, eg, by means of refactorings, remains a manual, hence error-prone, activity. As many of the refactorings amount to re-distributing class members over a (possibly extended) set of classes, formal ...

Research paper thumbnail of Using FCA to Suggest Refactorings to Correct Design Defects

Lecture Notes in Computer Science, 2008

Design defects are poor design choices resulting in a hard-to-maintain software, hence their dete... more Design defects are poor design choices resulting in a hard-to-maintain software, hence their detection and correction are key steps of a disciplined software process aimed at yielding high-quality software artifacts. While modern structure-and metric-based techniques enable precise detection of design defects, the correction of the discovered defects, eg, by means of refactorings, remains a manual, hence error-prone, activity. As many of the refactorings amount to re-distributing class members over a (possibly extended) set of classes, formal ...

Research paper thumbnail of A data model for management of network device configuration heterogeneity

2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

Research paper thumbnail of MASPEGHI 2004 Mechnisms for Specialization, Generalization and Inheritance

European Conference on Object-Oriented Programming, 2004

Abstract: MASPEGHI 2004 is the third edition of the MASPEGHIworkshop. This year the organizers of... more Abstract: MASPEGHI 2004 is the third edition of the MASPEGHIworkshop. This year the organizers of both the ECOOP 2002 InheritanceWorkshop and MASPEGHI 2003 came together to enlarge the scope ofthe workshop and to address new challenges. We succeeded in gatheringa diverse group of researchers and practitioners interested in mechanismsfor managing specialization and generalization of programming languagecomponents. The workshop contained a

Research paper thumbnail of Analogy-based software quality prediction

Predicting the stability of object-oriented systems is an important and challenging task. Classic... more Predicting the stability of object-oriented systems is an important and challenging task. Classical approaches to quality prediction perform some form of inductive inference starting from datasets of software items with known quality factor values and looking for typical features that discriminate the items regarding the quality factor. However, most of the effective methods for predictive model construction are based on

Research paper thumbnail of A Declarative Approach to Network Device Configuration Correctness

Journal of Network and Systems Management, 2016

Research paper thumbnail of Finding Minimal Rare Itemsets and Rare Association Rules

Proceedings of the 4th International Conference on Knowledge Science Engineering and Management, 2010

Rare association rules correspond to rare, or infrequent, itemsets, as opposed to frequent ones t... more Rare association rules correspond to rare, or infrequent, itemsets, as opposed to frequent ones that are targeted by conventional pattern miners. Rare rules reflect regularities of local, rather than global, scope that can nevertheless provide valuable insights to an expert, especially in areas such as genetics and medical diagnosis where some specific deviations/illnesses occur only in a small number of cases. The work presented here is motivated by the long-standing open question of efficiently mining strong rare rules, i.e., rules with high confidence and low support.

Research paper thumbnail of Similarity-based Clustering versus Galois lattice

Research paper thumbnail of When concepts point at other concepts: the case of uml diagram reconstruction

Research paper thumbnail of FlowME: Lattice-based Traffic Measurement

An implementation over an Openflow switch, FlowME, was developed and evaluated upon its memory us... more An implementation over an Openflow switch, FlowME, was developed and evaluated upon its memory usage, performance overhead, and processing effort to generate the minimal solution. Experimental results indicate a significant decrease in resource consumption.

Research paper thumbnail of Alignement d'ontologies dirigé par la structure

... Par exemple, la similarité de classes appliquée à Flat et Person, soit simC(Flat, Person), va... more ... Par exemple, la similarité de classes appliquée à Flat et Person, soit simC(Flat, Person), va dépendre a priori de la similarité d'attributs simA pour tous les couples mixtes d'attributs, en particulier simA(address, salary). La dépendance ...

Research paper thumbnail of Recommendation Strategy based On Relation Rule Mining

Research paper thumbnail of A Lazy Evaluation Strategy for Assessing Network Device Configuration Correctness

2014 19th International Conference on Engineering of Complex Computer Systems, Aug 1, 2014

Research paper thumbnail of A Fast Algorithm for Building the Hasse Diagram of a Galois Lattice

Research paper thumbnail of Analyse formelle de donn�es relationnelles pour la r�ing�nierie des mod�les UML

Research paper thumbnail of P.: OLA in the OAEI 2005 alignment contest

Research paper thumbnail of A partition-based approach towards building Galois (concept) lattices