2021
DOI: 10.1007/978-3-030-86044-8_15
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Domain-Based Cyclic Dependencies in Microservice APIs Using Source Code Detectors

Abstract: Isolation, autonomy, and loose coupling are critical success factors of microservice architectures. Unfortunately, systems tend to become strongly coupled over time, sometimes even exhibiting cyclic communication chains, making the individual deployment of services challenging. Such chains are highly problematic when strongly coupled communication e.g. based on synchronous invocations is used, but also create complexity and maintenance issues in more loosely coupled asynchronous or event-based communication. H… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…The communication model we extract from the underlying microservice artifacts is derived from our previous work [13]. We express inter-service calls within the system as a directed graph G = (V, E, DA, F ), where V represents the set of architectural elements essential for the communication flow -like APIs (V AP I ∈ V ) -and E ⊆ V × V is the set of invocations (each represented by a tuple), both synchronous and asynchronous.…”
Section: Formal Model Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…The communication model we extract from the underlying microservice artifacts is derived from our previous work [13]. We express inter-service calls within the system as a directed graph G = (V, E, DA, F ), where V represents the set of architectural elements essential for the communication flow -like APIs (V AP I ∈ V ) -and E ⊆ V × V is the set of invocations (each represented by a tuple), both synchronous and asynchronous.…”
Section: Formal Model Descriptionmentioning
confidence: 99%
“…Instead, we used a different mining approach adapted from our previous works [13,23]. for mining code artifacts: To identify significant architectural hotspots within a system, it is often sufficient to look only for specific patterns in code that describe a particular communication model or API technology and ignore all other parts that are not relevant in this context.…”
Section: Source Code Miningmentioning
confidence: 99%
See 1 more Smart Citation