The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the raise of computer systems' complexity, greater number of modules, technologies involved and functionalities, monitoring and keeping up with such systems in real time has become an indispensable task, given the fact that the quality of production software impacts directly on decision making and risk management by organizations. Knowing what to observe, which metrics are being more used for...
Monitoring plays a significant role in improving the quality of service in cloud computing. It helps clouds to scale resource utilization adaptively, to identify defects in services for service developers, and to discover usage patterns of numerous end users. However, due to the heterogeneity of components in clouds and the complexity arising from the wealth of runtime information, monitoring in clouds...
This paper seeks to answer fundamental questions about trade-offs between static and dynamic security analysis. It has been previously shown that flow-sensitive static information-flow analysis is a natural generalization of flow-insensitive static analysis, which allows accepting more secure programs. It has been also shown that sound purely dynamic information-flow enforcement is more permissive...
Dynamic program execution monitors allow programmers to observe and verify an application while it is running. Instrumentation-based dynamic program monitors often incur significant performance overhead due to instrumentation. Special hardware supports have been proposed to reduce this overhead. However, these supports mostly target specific monitoring requirements and thus have limited applicability...
The popularity of the Enterprise Service Bus (ESB) pattern as a foundation of Service Oriented Architectures (SOA) for enterprise environments is increasing. Java business integration (JSR-208) is an attempt at Java-centric standardization of the ESB pattern. JSR-208 lacks a complete monitoring facility, which nowadays is crucial for management of complex enterprise environments and for establishing...
Dynamic program monitoring has been applied in software-intensive systems to detect runtime constraint violations and trigger system recovery actions. Uncontrolled monitoring activities may, however, delay detection of a violation for an unbounded time and, worse, affect the original system's schedulability. In this paper, we introduce the concept of predictable monitoring, which demands a bound on...
This article describes the method related to simplifying detection of the problem reason in applications by using automatic analyzing of monitoring data on embedded system. Usually, dependencies in monitoring data are not obvious and usually it is very complicated to find the relationship between error symptom and the reason of the problem. The suggested method finds dependencies in system behavior...
Web applications have become very popular today in a variety of domains. Given the varied nature of client-side environments and browser configurations, it is difficult to completely test or debug the client-side code of Web applications in-house. There are tools that facilitate functional testing on various browsers, but they cannot mimic all of the possible client-side environments. In modern Web...
In today's continuously changing markets newly developed products often do not meet the demands and expectations of customers. Research on this problem identified a large gap between developer and user expectations. Approaches to bridge this gap are to provide the developers with better information on product usage and to create a fast feedback cycle that helps tackling usage problems. Therefore,...
Due to their scale, complexity, and dynamic nature, e-science cyber-infrastructures have raised major system management challenges. It has been argued that employing system management frameworks to monitor and control large scale systems is a possible solution to address these challenges. This paper presents an application of a management framework, known as Hasthi (Sanskrit name of Elephant which...
Software runtime monitoring mechanisms can be used to increase the dependability of software systems. However, it is a complex and burdensome job for developers to rebuild existing software systems by adding software runtime monitoring mechanism. Meanwhile, current software runtime monitoring mechanisms are mainly restricted to monitor centralized software systems. This paper presents a novel method,...
The volume of Web based malware on the Internet keeps rising despite huge investments on Web security. JavaScript, the dominant scripting language for Web applications, is the primary channel for most of these attacks. In this paper, we describe research into the design and implementation of new Web client protection system based on code instrumentation techniques. This system combines traditional...
We propose a new approach, namely optimized embedded signature monitoring (OESM) to perform on-line control-flow fault detection. The underlined advantage of this approach is the ability to perform a profiling algorithm that analyses the control-flow graph of user program in order to optimize the number of checkpoints (i. e., signatures) to be inserted along with the application code. By optimization,...
Supporting business services through Web service compositions (WSC) as part of service-oriented architectures involves various runtime monitoring requirements. The implementation of these requirements results in additional development activities. Due to the lack of standards for treating such WSC monitoring concerns, a corresponding development approach has to deal with a variety of specific technologies...
Run-time monitoring can provide important insights about a program's behavior and, for simple properties, it can be done efficiently. Monitoring properties describing sequences of program states and events, however, can result in significant run-time overhead. In this paper we present a novel approach to reducing the cost of run-time monitoring of path properties. Properties are composed to form a...
Monitoring the execution of large enterprise systems is needed to ensure that such complex systems are performing as expected. However, common techniques for monitoring, such as code instrumentation and profiling have significant performance overhead, and require access to the source code and to system experts. In this paper, we propose using execution logs to monitor the execution of applications...
This paper proposes a collaborative runtime monitoring framework to enhance the dependability of the software developed in traditional Web services architecture. The enabling mechanism is an active service broker (ASB) architecture which allows the service broker not only to serve as a passive service repository, but also to involve itself in service interactions and thus to play an active role in...
Dynamically discovering likely program invariants from concrete test executions has emerged as a highly promising software engineering technique. Dynamic invariant inference has the advantage of succinctly summarizing both "expected" program inputs and the subset of program behaviors that is normal under those inputs. In this paper, we introduce a technique that can drastically increase...
The paper describes the performance visualization tool (PROVE) of an integrated parallel program development environment called GRADE. All four major aspects of performance visualization (source code instrumentation, data acquisition, data analysis, visualization), are explained generally and in the context of PROVE.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.