首页> 外文期刊>ACM transactions on autonomous and adaptive systems >Inferring Software Component Interaction Dependencies for Adaptation Support
【24h】

Inferring Software Component Interaction Dependencies for Adaptation Support

机译:推断适应支持的软件组件交互依赖性

获取原文
获取原文并翻译 | 示例
           

摘要

A self-managing software system should be able to monitor and analyze its runtime behavior and make adaptation decisions accordingly to meet certain desirable objectives. Traditional software adaptation techniques and recent "models@runtime" approaches usually require an a priori model for a system's dynamic behavior. Oftentimes the model is difficult to define and labor-intensive to maintain, and tends to get out of date due to adaptation and architecture decay. We propose an alternative approach that does not require defining the system's behavior model beforehand, but instead involves mining software component interactions from system execution traces to build a probabilistic usage model, which is in turn used to analyze, plan, and execute adaptations. In this article, we demonstrate how such an approach can be realized and effectively used to address a variety of adaptation concerns. In particular, we describe the details of one application of this approach for safely applying dynamic changes to a running software system without creating inconsistencies. We also provide an overview of two other applications of the approach, identifying potentially malicious (abnormal) behavior for self-protection, and improving deployment of software components in a distributed setting for performance self-optimization. Finally, we report on our experiments with engineering self-management features in an emergency deployment system using the proposed mining approach.
机译:一个自我管理的软件系统应该能够监视和分析其运行时行为,并据此做出适应性决策,以满足某些期望的目标。传统的软件适应技术和最新的“ models @ runtime”方法通常需要用于系统动态行为的先验模型。通常,该模型很难定义且维护起来很费力,并且由于适应性和体系结构衰落而往往过时。我们提出了一种替代方法,该方法不需要事先定义系统的行为模型,而需要从系统执行跟踪中挖掘软件组件的交互以构建概率使用模型,该模型随后用于分析,计划和执行适应。在本文中,我们演示了如何实现并有效地使用这种方法来解决各种适应问题。特别是,我们描述了此方法的一种应用程序的详细信息,该方法可将动态更改安全地应用于正在运行的软件系统,而不会产生不一致之处。我们还概述了该方法的其他两个应用程序,识别潜在的恶意(异常)行为以进行自我保护,并改善分布式组件中软件组件的部署以实现性能自我优化。最后,我们使用拟议的采矿方法报告了在应急部署系统中具有工程自我管理功能的实验。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号