Load tests ensure that software systems are able to perform under the expected workloads. The current state of load test analysis requires significant manual review of performance counters and execution logs, and a hi...
详细信息
Load tests ensure that software systems are able to perform under the expected workloads. The current state of load test analysis requires significant manual review of performance counters and execution logs, and a high degree of system-specific expertise. In particular, memory-related issues (e.g., memory leaks or spikes), which may degrade performance and cause crashes, are difficult to diagnose. Performance analysts must correlate hundreds of megabytes or gigabytes of performance counters (to understand resource usage) with execution logs (to understand system behaviour). However, little work has been done to combine these two types of information to assist performance analysts in their diagnosis. We propose an automated approach that combines performance counters and execution logs to diagnose memory-related issues in load tests. We perform three case studies on two systems: one open-source system and one large-scale enterprise system. Our approach flags ≤ 0.1% of the execution logs with a precision ≥ 80%.
Integral attack is a powerful technique to recover the secret key of block ciphers by usually exploiting the fact that specific parts of the output after several round encryptions has a zero-sum property in a set of c...
详细信息
Cloud computing is a recently developed new technology for complex systems with massive service sharing, which is different from the resource sharing of the grid computing systems. In a cloud environment, service requ...
详细信息
作者:
Thabit SabbahAli SelamatFaculty of Computing
Department of Computer Science Universiti Teknologi Malaysia (UTM) 81310 Skudai Johor Malaysia Faculty of Computing
Department of Software Engineering Universiti Teknologi Malaysia (UTM) 81310 Skudai Johor Malaysia
Thesaurus is used with many Information Retrieval (IR) models such as data integration, data warehousing, semantic query processing and classifiers. Considering the existence of various thesauri for a particular domai...
详细信息
ISBN:
(纸本)9781479906505
Thesaurus is used with many Information Retrieval (IR) models such as data integration, data warehousing, semantic query processing and classifiers. Considering the existence of various thesauri for a particular domain of knowledge;output quality of an IR model when using different thesauri in the same domain is not predictable. In this paper, we propose a methodology to study the performance of thesaurus in solving schema matching as a case study of IR models. The paper also presents initial results of experiment conducted using different thesauri. Precision, recall, and F-measure were calculated to show that the quality of matching was changed according to the used thesaurus.
Promoted by the Service computing paradigm, service composition has played an important role in modern software development. Currently, available services have covered a wide spectrum of heterogeneity, including SOAP ...
详细信息
ISBN:
(纸本)9781467356596
Promoted by the Service computing paradigm, service composition has played an important role in modern software development. Currently, available services have covered a wide spectrum of heterogeneity, including SOAP services, Restful services and other data services. The composite services should continuously serve for a large number of users. The heterogeneity and open dynamic network environment bring grand challenges to the management of service composition. Based upon our previous work on service composition middleware - Star link, and a runtime system management tool - SM@RT, this paper proposes a model-based approach to service composition management at run time. A runtime model enables casual connections between applications and supporting platforms, provides a global view of a running system, abstracts underlying technical details, and performs automated generation of management code. By constructing the runtime model of Star link and using the SM@RT tool to generate synchronization between model and running composition, our approach makes the following contributions to service composition management: (1) a more comprehensive view of service composition management, (2) an easy-of-use manner to perform management operations at model level without underlying tedious details, (3) an on-the-fly effect on running system by means of synchronization between the model and composite services. We demonstrate that our approach can tackle the challenge of service composition management by using a case study of a photo sharing composite service application.
Context: software systems are increasingly required to operate in an open world, characterized by continuous changes in the environment and in the prescribed requirements. Architecture-centric software evolution (ACSE...
详细信息
ISBN:
(纸本)9781467358330
Context: software systems are increasingly required to operate in an open world, characterized by continuous changes in the environment and in the prescribed requirements. Architecture-centric software evolution (ACSE) is considered as an approach to support software adaptation at a controllable level of abstraction in order to survive in the uncertain environment. This requires evolution in system structure and behavior that can be modeled, analyzed and evolved in a formal fashion. Existing research and practices comprise a wide spectrum of evolution-centric approaches in terms of formalisms, methods, processes and frameworks to tackle ACSE as well as empirical studies to consolidate existing research. However, there is no unified framework providing systematic insight into classification and comparison of state-of-the-art in ACSE research. Objective: We present a taxonomic scheme for a classification and comparison of existing ACSE research approaches, leading to a reflection on areas of future research. Method: We performed a systematic literature review (SLR), resulting in 4138 papers searched and 60 peer-reviewed papers considered for data collection. We populated the taxonomic scheme based on a quantitative and qualitative extraction of data items from the included studies. Results: We identified five main classification categories: (i) type of evolution, (ii) type of specification, (iii) type of architectural reasoning, (iv) runtime issues, and (v) tool support. The selected studies are compared based on their claims and supporting evidences through the scheme. Conclusion: The classification scheme provides a critical view of different aspects to be considered when addressing specific ACSE problems. Besides, the consolidation of the ACSE evidences reflects current trends and the needs for future research directions.
According to "Assemble line balancing(ALB)" problem which is widespread in manufacture, we establish a mathematical model and present our improved algorithm that is based on Heuristic rules, which adopt cumu...
详细信息
According to "Assemble line balancing(ALB)" problem which is widespread in manufacture, we establish a mathematical model and present our improved algorithm that is based on Heuristic rules, which adopt cumulative ranked positional weight as a basis of task assignments and schedule the orders of branches traversalAfter that we can find an optimal solution to the balancing problem efficientlyThe result of examples given by this paper shows our algorithm has a good performance.
Modeling blood flow in larger vessels using lattice-Boltzmann methods comes with a challenging set of constraints: a complex geometry with walls and inlets and outlets at arbitrary orientations with respect to the lat...
详细信息
Modeling blood flow in larger vessels using lattice-Boltzmann methods comes with a challenging set of constraints: a complex geometry with walls and inlets and outlets at arbitrary orientations with respect to the lattice, intermediate Reynolds (Re) number, and unsteady flow. Simple bounce-back is one of the most commonly used, simplest, and most computationally efficient boundary conditions, but many others have been proposed. We implement three other methods applicable to complex geometries [Guo, Zheng, and Shi, Phys. Fluids 14, 2007 (2002); Bouzidi, Firdaouss, and Lallemand, Phys. Fluids 13, 3452 (2001); Junk and Yang, Phys. Rev. E 72, 066701 (2005)] in our open-source application hemelb. We use these to simulate Poiseuille and Womersley flows in a cylindrical pipe with an arbitrary orientation at physiologically relevant Re number (1–300) and Womersley (4–12) numbers and steady flow in a curved pipe at relevant Dean number (100–200) and compare the accuracy to analytical solutions. We find that both the Bouzidi-Firdaouss-Lallemand (BFL) and Guo-Zheng-Shi (GZS) methods give second-order convergence in space while simple bounce-back degrades to first order. The BFL method appears to perform better than GZS in unsteady flows and is significantly less computationally expensive. The Junk-Yang method shows poor stability at larger Re number and so cannot be recommended here. The choice of collision operator (lattice Bhatnagar-Gross-Krook vs multiple relaxation time) and velocity set (D3Q15 vs D3Q19 vs D3Q27) does not significantly affect the accuracy in the problems studied.
Security defects were found between inter-components' communication: the use of implicit intents leaded to component hijacking and information leakage, risk of privilege mission leakage existed in public component...
详细信息
Security defects were found between inter-components' communication: the use of implicit intents leaded to component hijacking and information leakage, risk of privilege mission leakage existed in public components. To solve these problems, a method of security defects detection between inter-components' communication has been presented. At first, an Android application was analyzed statically, its control-flow graph (CFG), function call graph (FCG) and component call graph (CCG) were constructed. Then, the potentially dangerous components, implicit intents and privacy leakage paths of the application were found. Finally, 20 popular Android applications were tested. The results show that implicit intents are used in all of the applications, applications embed dynamic codes make up 25%, dangerous components are used in 80% of the applications, and privacy leakages applications make up 40% in total.
暂无评论