The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we address the problem of massive event trace sizes, one of the most urgent challenges in the performance analysis of large-scale parallel applications. Reducing trace sizes during the application runtime decreases application slow down, eliminates measurement bias, and cuts down stress on the underlying file system. Previous approaches use static filters to decrease trace size, which...
Cyber-Physical Systems (CPS) have gained wide popularity, however, developing and debugging CPS remain significant challenges. Many bugs are detectable only at runtime under deployment conditions that may be unpredictable or at least unexpected at development time. The current state of the practice of debugging CPS is generally ad hoc, involving trial and error in a real deployment. For increased...
Healthcare costs are booming as population ages and need healthcare. Pervasive applications are expected to take healthcare into people's homes and thus cut health-related costs. However, the lack of appropriate middleware to collect and integrate pervasive data is a brake to their development. In this paper, we present the integration of iCasa and Cilia, two service-oriented frameworks, and show...
Self-adaptive software systems (SASS) are equipped with feedback loops to adapt autonomously to changes of the software or environment. In established fields, such as embedded software, sophisticated approaches have been developed to systematically study feedback loops early during the development. In order to cover the particularities of feedback, techniques like one-way and in-the-loop simulation...
This paper describes work in progress on the design and implementation of an SQL-like language for performing complex queries on event streams. This language aims at providing a simple, intuitive and fully non-procedural syntax, while still preserving backwards compatibility with traditional SQL. The syntax and informal semantics of the language are introduced, multiple examples of scenarios taken...
A large class of emerging compute-intensive applications demand real-time or near real-time processing guarantees on streaming data. Sensor processing in particular, has stringent latency requirements for carrying out its digital processing for rapidly incoming radar data streams. The consequent demands on the cluster middleware used to run such codes include (i) efficient online observation of current...
We propose an approach by integrating static and dynamic program analyses to detect threadsafety violations in hybrid MPI/OpenMP programs. We innovatively transform the thread-safety violation problems to race conditions problems. In our approach, the static analysis identifies a list of MPI calls related to thread-safety violations, then replaces them with our own MPI wrappers, which involve accesses...
The detection of behavioral design patterns is more accurate when a dynamic analysis is performed on the candidate instances identified statically. Such a dynamic analysis requires the monitoring of the candidate instances at run-time through the execution of a set of test cases. However, the definition of such test cases is a time-consuming task if performed manually, even more, when the number of...
Currently available business process monitoring solutions usually rely on applications' business logic, which hampers the separation between the business logic and the business rules. Existing solutions address the issue from only the modeling perspective at design-time. However, modern business process systems are required to be adaptive to the constant changes of the business rules at runtime. In...
Runtime monitoring can be used to verify, enforce and control the dynamic execution of a target program at runtime to detect property violations, enforce desired properties and actively correct the execution, respectively. However, the state-of-the-art study lacks an appropriate formal program semantics of runtime monitoring. In this paper, we propose a theory of runtime control at an appropriate...
We present work on extending IEC 61499 with behavioral types-based specifications. Identifying components and establishing interface specifications is already a key concept of IEC 61499. Components and their interfaces are a well established concept facilitating the development, maintenance, and refactoring of software systems. Behavioral types further extend the expressiveness of interface specifications...
Building Automation Systems take care about many different kinds of automation tasks within today's buildings. The provided services are usually distributed across the related buildings, are developed by various vendors, use different communication standards, have disjunct semantic representation of data and so on. In larger, flexible and growing BAS it's obviously hard to manage all services without...
Due to the heterogeneity and complexity of systems-of-systems (SoS), their simulation is becoming very time consuming, expensive and hence impractical. As a result, design simulation is increasingly being complemented with more efficient design emulation. Runtime monitoring of emulated designs would provide a precious support in the verification activities of such complex systems. We propose novel...
Modern software systems often run on a changing and unpredictable environment, they need to adapt itself at runtime in response to changing requirements of users and running environment. Therefore, numerous methods have been proposed to support the development of self-adaptive system. Some approaches are requirements-based. Other approaches are architecture-based. By considering only a partial view...
The long-term goal of the work presented here is the automatic instrumentation of C programs with temporal property checkers to perform the runtime verification that these programs behave as expected, both for debugging purposes and for security or safety-oriented monitoring. This paper describes our first results towards this objective. To give requirements engineers or software developers the possibility...
Today's software is getting more and more complex and harder to understand. Models help to organize knowledge and emphasize the structure of a software at a higher abstraction level. While the usage of model-driven techniques is widely adopted during software construction, it is still an open research topic if models can also be used to make runtime phenomena more comprehensible as well. It is not...
There are different kinds of datacenter monitor system, but most of them just monitor a few aspects of runtime data. Some of them just focused on temperature monitoring and power consumption. And others are focusing on application behaviors and system resources. So they can't reflect the running state of a datacenter precisely. In this paper, we introduce a platform which aims at monitoring multilayer...
The importance of continuous delivery and the emergence of tools allowing to treat infrastructure configurations programmatically have revolutionized the way computing resources and software systems are managed. However, these tools keep lacking an explicit model representation of underlying resources making it difficult to introspect, verify or reconfigure the system in response to external events...
This paper introduces a new approach for the online detection of performance anomalies in cloud virtual machines (VMs). It is designed for cloud infrastructure providers to detect during runtime unknown anomalies that may still be observed in complex modern systems hosted on VMs. The approach is drawn on data stream clustering of per-VM monitoring data and detects at a fine granularity where anomalies...
Monitoring composition of web services is important to ensure provisioning of a valid business process. Most of the existing works on service monitoring focused either on QoS violations or service interactions during execution of services that are statically composed. However, dynamic composition of services wherein the services are discovered and composed at runtime based on user requirements and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.