2011
DOI: 10.1007/978-3-642-24755-2_19
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Performance Violations of Service Compositions Using Assumption-Based Run-Time Verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 15 publications
0
15
0
Order By: Relevance
“…A number of other recent proposals that are concerned more with predicting SLA violations than with computing the composition level QoS (or their distributions), are based on data mining [17], online testing [18], and model checking [19]. We argue that the information that can be derived from computed composition QoS distribution is much richer than a yes/no prediction of some predefined SLA violation.…”
Section: B Qos Analysismentioning
confidence: 94%
“…A number of other recent proposals that are concerned more with predicting SLA violations than with computing the composition level QoS (or their distributions), are based on data mining [17], online testing [18], and model checking [19]. We argue that the information that can be derived from computed composition QoS distribution is much richer than a yes/no prediction of some predefined SLA violation.…”
Section: B Qos Analysismentioning
confidence: 94%
“…Some research work use runtime verification techniques to determine the necessity of adaptation and to trigger preventive adaptation. In [6], the authors introduce SPADE approach: after the execution of each task, if the local SLA is violated, SPADE uses both monitored data and the assumptions to verify whether the global SLA can be still satisfied. If it reveals that the global SLA is tent to be violated, the adaptation is accordingly triggered.…”
Section: A Related Workmentioning
confidence: 99%
“…All existing approaches can be classified into two categories: offline analysis [1], [2], [3] and online prediction [4], [5], [6]. Offline approaches can decide when and how to improve the end-to-end quality of SBA by reasoning the causes of the past SLA violations.…”
Section: Introductionmentioning
confidence: 99%
“…While several types of run-time adaptation aimed at avoiding or mitigating SLA violations have been proposed [10,12,21], these are often only applicable to the request-response message exchange pattern and/or to acyclic control structures. Several prediction and run-time adaptation approaches, more suited for orchestrations with centralized control flow, were proposed based on machine learning [15], online testing [19], and model checking [20].…”
Section: Introductionmentioning
confidence: 99%