Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD) 2013
DOI: 10.1109/cscwd.2013.6580957
|View full text |Cite
|
Sign up to set email alerts
|

SLA detective control model for workflow composition of cloud services

Abstract: The disqualification of third-party cloud services has caused great threat to large-scale Enterprise Systems (ESs). Service Level Agreements (SLA) management is used to enhance Quality of Service (QoS) in an effective way. Conventional service exception handling is triggered to deal with functional failure. However, in some critical business scenario, service failures and performance violations need to be proactively prevented instead of recovery triggered by the occurrence of those failures. In this paper, a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…A violation detection model was proposed by [23] which considers the utility function to measure the level of satisfaction for quality and control charts. The proposed model is comprised of three parts and considers four criteria for measurement.…”
Section: Reputation-based and Workflow Composition Approachmentioning
confidence: 99%
“…A violation detection model was proposed by [23] which considers the utility function to measure the level of satisfaction for quality and control charts. The proposed model is comprised of three parts and considers four criteria for measurement.…”
Section: Reputation-based and Workflow Composition Approachmentioning
confidence: 99%
“…In this paper, we explain the process for determining and abating SLA violation, which forms part of the post-interaction phase. It is important to mention that various approaches in the literature have used techniques such as QoS prediction [29], workflow detection control model [40], machine learning regression technique [42], and workload analyzer [50] to ascertain the possibility of SLA violation.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The Workflow SLA Violation Detective Control Model (WSVDC) is proposed in [55]. The authors consider a utility function that measures the level of satisfaction and give control charts for each SLA.…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…WSVDC [55] The approach uses the SLA utility function and control charts to identify the difference in workflow composition and to improve the quality of cloud services and performance.…”
Section: Accepted Manuscriptmentioning
confidence: 99%