首页 > 最新文献

Proceedings of the 8th Asia-Pacific Symposium on Internetware最新文献

英文 中文
Detecting source code changes to maintain the consistence of behavioral model 检测源代码变更,维护行为模型的一致性
Pub Date : 2012-10-30 DOI: 10.1145/2430475.2430482
Yuankui Li, Linzhang Wang, Xuandong Li, Yuanfang Cai
It is well-known that as software system evolves, the source code tends to deviate from its design model so that maintaining their consistence is challenging. Our objective is to detect code changes that influence designed program behaviour which are referred as design level changes and update the behavioural model timely and automatically to maintain consistence. We propose an approach that filters out low-level source code changes that do not influence program behaviour, abstracts code changes into updating operations for behavioral model, and automates the integration and update of activity diagrams to maintain consistence. We've recognised that it is not uncommon for developers to introduce quick and dirty implementation that unnecessarily increases program complexity or introduces suboptimal behaviour changes. So while merging code changes into behaviour model, our approach also calculates cyclometric complexity variation before and after the process so that developers can be alerted of significant and/or detrimental changes. Our tool allows the user to approve the change in code before merging and updating the model.
众所周知,随着软件系统的发展,源代码倾向于偏离其设计模型,因此维护它们的一致性是具有挑战性的。我们的目标是检测影响设计程序行为的代码更改(称为设计级更改),并及时自动更新行为模型以保持一致性。我们提出了一种方法,过滤掉不影响程序行为的低级源代码更改,将代码更改抽象为行为模型的更新操作,并自动集成和更新活动图以保持一致性。我们已经认识到,对于开发人员来说,引入不必要地增加程序复杂性或引入次优行为更改的快速和肮脏的实现并不罕见。因此,在将代码更改合并到行为模型中时,我们的方法还计算过程前后的循环复杂性变化,以便开发人员可以注意到重大和/或有害的更改。我们的工具允许用户在合并和更新模型之前批准代码中的更改。
{"title":"Detecting source code changes to maintain the consistence of behavioral model","authors":"Yuankui Li, Linzhang Wang, Xuandong Li, Yuanfang Cai","doi":"10.1145/2430475.2430482","DOIUrl":"https://doi.org/10.1145/2430475.2430482","url":null,"abstract":"It is well-known that as software system evolves, the source code tends to deviate from its design model so that maintaining their consistence is challenging. Our objective is to detect code changes that influence designed program behaviour which are referred as design level changes and update the behavioural model timely and automatically to maintain consistence. We propose an approach that filters out low-level source code changes that do not influence program behaviour, abstracts code changes into updating operations for behavioral model, and automates the integration and update of activity diagrams to maintain consistence. We've recognised that it is not uncommon for developers to introduce quick and dirty implementation that unnecessarily increases program complexity or introduces suboptimal behaviour changes. So while merging code changes into behaviour model, our approach also calculates cyclometric complexity variation before and after the process so that developers can be alerted of significant and/or detrimental changes. Our tool allows the user to approve the change in code before merging and updating the model.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80645524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Requirements modeling and system reconfiguration for self-adaptation of Internetware 面向互联网软件自适应的需求建模和系统重构
Pub Date : 2012-10-30 DOI: 10.1145/2430475.2430486
Zhuo-Qun Yang, Jin Zhi
Internetware is a new paradigm proposed in recent years, which is defined as a kind of software constructed by a set of autonomous software entities distributed over the Internet. The environment where Internetware operates, including the Internet and other physical condition that the domain should hold, changes unexpectedly and comes with uncertainty. So the self-adaptation issue becomes inevitable in terms of dynamically configuring the Internetware. Here come two basic questions: how can we derive the adaptation problem in Internetware and how can we solve this problem with some adaptation mechanisms? In this paper, we focus on the requirements level for solving this problem and propose to use i* framework for modeling requirements of Internetware and deriving the adaptation problem from the i* models. To solve the adaptation problem, we provide a synergy approach involving i* models and widely accepted self-adaptation process---the MAPE loop, and apply ECA (3-tuple of ) to present the rationale for reconfiguration decisions.
互联网软件是近年来提出的一种新范式,它被定义为由分布在互联网上的一组自治的软件实体构成的一种软件。互联网运行的环境,包括互联网和域名应有的其他物理条件,会发生意想不到的变化,并伴随着不确定性。因此,在动态配置互联网软件时,自适应问题不可避免。这里有两个基本问题:我们如何推导出互联网中的适应问题?我们如何用一些适应机制来解决这个问题?本文从解决这一问题的需求层次出发,提出使用i*框架对internet的需求进行建模,并从i*模型中推导出适配问题。为了解决适应性问题,我们提供了一种涉及i*模型和广泛接受的自适应过程(MAPE循环)的协同方法,并应用ECA (3-tuple of)来提出重构决策的基本原理。
{"title":"Requirements modeling and system reconfiguration for self-adaptation of Internetware","authors":"Zhuo-Qun Yang, Jin Zhi","doi":"10.1145/2430475.2430486","DOIUrl":"https://doi.org/10.1145/2430475.2430486","url":null,"abstract":"Internetware is a new paradigm proposed in recent years, which is defined as a kind of software constructed by a set of autonomous software entities distributed over the Internet. The environment where Internetware operates, including the Internet and other physical condition that the domain should hold, changes unexpectedly and comes with uncertainty. So the self-adaptation issue becomes inevitable in terms of dynamically configuring the Internetware. Here come two basic questions: how can we derive the adaptation problem in Internetware and how can we solve this problem with some adaptation mechanisms? In this paper, we focus on the requirements level for solving this problem and propose to use i* framework for modeling requirements of Internetware and deriving the adaptation problem from the i* models. To solve the adaptation problem, we provide a synergy approach involving i* models and widely accepted self-adaptation process---the MAPE loop, and apply ECA (3-tuple of <Event, Condition, Action>) to present the rationale for reconfiguration decisions.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77781723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Service discovery for internet of things: a context-awareness perspective 物联网的服务发现:上下文感知视角
Pub Date : 2012-10-30 DOI: 10.1145/2430475.2430500
Qiang Wei, Zhi Jin
In Internet of Things (IoT), functionalities of devices are encapsulated as real-world services to interact with other things or traditional web services to realize the seamless integration physical world with information world, where service discovery plays an important role. However, the resource-constrained and mobility natures of devices and intermittent disconnection of wireless network result in services in IoT having highly dynamic environment, which asks for different requirements for context-aware service discovery approach than traditional web services and brings new challenges for service discovery in IoT. In this paper, we analyze the role of context and relations with entities in IoT firstly; then combing the characteristics of data in IoT, a common ontology based context model with the ability to handle uncertainty and temporal aspects of context is proposed and Dynamic Bayesian networks (DBN) is adopted to reason about these contexts for supporting to sense current situation. Finally, based on the context model and reasoning approach proposed, we present a context-aware service discovery architecture for IoT to provide an efficient infrastructure to support user-centric and environment-aware service provision.
在物联网(Internet of Things, IoT)中,设备的功能被封装为现实世界的服务,与其他事物或传统的web服务进行交互,实现物理世界与信息世界的无缝集成,其中服务发现起着重要的作用。然而,由于设备的资源约束和移动性以及无线网络的间歇性断开,使得物联网中的服务具有高度动态的环境,这就对上下文感知的服务发现方法提出了不同于传统web服务的要求,给物联网中的服务发现带来了新的挑战。本文首先分析了上下文在物联网中的作用及其与实体的关系;然后,结合物联网数据的特点,提出了一种通用的基于本体的上下文模型,该模型具有处理上下文不确定性和时变方面的能力,并采用动态贝叶斯网络(DBN)对这些上下文进行推理,支持对当前状态的感知。最后,基于所提出的上下文模型和推理方法,我们提出了一种上下文感知的物联网服务发现架构,为支持以用户为中心和环境感知的服务提供提供了高效的基础设施。
{"title":"Service discovery for internet of things: a context-awareness perspective","authors":"Qiang Wei, Zhi Jin","doi":"10.1145/2430475.2430500","DOIUrl":"https://doi.org/10.1145/2430475.2430500","url":null,"abstract":"In Internet of Things (IoT), functionalities of devices are encapsulated as real-world services to interact with other things or traditional web services to realize the seamless integration physical world with information world, where service discovery plays an important role. However, the resource-constrained and mobility natures of devices and intermittent disconnection of wireless network result in services in IoT having highly dynamic environment, which asks for different requirements for context-aware service discovery approach than traditional web services and brings new challenges for service discovery in IoT. In this paper, we analyze the role of context and relations with entities in IoT firstly; then combing the characteristics of data in IoT, a common ontology based context model with the ability to handle uncertainty and temporal aspects of context is proposed and Dynamic Bayesian networks (DBN) is adopted to reason about these contexts for supporting to sense current situation. Finally, based on the context model and reasoning approach proposed, we present a context-aware service discovery architecture for IoT to provide an efficient infrastructure to support user-centric and environment-aware service provision.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79165907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Understanding evolution in Internetware using a double pyramids model 用双金字塔模型理解互联网软件的进化
Pub Date : 2012-10-30 DOI: 10.1145/2430475.2430487
Jun Wang, Lin Liu, Jianmin Wang
One of the prominent properties of the Internetware Software Paradigm is its evolutionary characteristic. It is recognised that the evolution of software systems are driven by the needs of final users, and influenced by changes in the operational environments and technology advancement. The evolution of biological and social systems often forms a spiral incremental tendency where the changes are continuous, and stepwise. Inspired by the classical pyramid model of Maslow on Human needs, we propose to understand the evolution of software in the Internetware era with a double pyramid model. In other words, user's needs are gradually changing and their expectations to the system functionalities and qualities are getting higher; at the same time, more and more sophisticated software services become available, they provide richer functionalities, better qualities, more diversified choices, and more appealing user experiences. We first structure the development of user expectation and the capability of services as two separate pyramids, and then we define how the two pyramids interacts and influence each other within a co-evolution model. An example of Internetware system development is presented to illustrate how the co-evolution model helps shorten life cycle of system development and achieve high quality and efficiency at the same time.
互联网软件范式的一个显著特征是它的演化特征。我们认识到,软件系统的发展是由最终用户的需要驱动的,并受到操作环境和技术进步的变化的影响。生物和社会系统的进化常常形成一种螺旋式的增量趋势,其中变化是连续的、逐步的。受马斯洛关于人类需求的经典金字塔模型的启发,我们提出用双金字塔模型来理解互联网软件时代软件的进化。也就是说,用户的需求在逐渐变化,对系统功能和质量的期望越来越高;与此同时,越来越复杂的软件服务出现,它们提供了更丰富的功能、更好的质量、更多样化的选择和更吸引人的用户体验。我们首先将用户期望和服务能力的开发构建为两个独立的金字塔,然后定义这两个金字塔如何在共同进化模型中相互作用和相互影响。以网络系统开发为例,说明协同演化模型如何缩短系统开发的生命周期,同时实现高质量和高效率。
{"title":"Understanding evolution in Internetware using a double pyramids model","authors":"Jun Wang, Lin Liu, Jianmin Wang","doi":"10.1145/2430475.2430487","DOIUrl":"https://doi.org/10.1145/2430475.2430487","url":null,"abstract":"One of the prominent properties of the Internetware Software Paradigm is its evolutionary characteristic. It is recognised that the evolution of software systems are driven by the needs of final users, and influenced by changes in the operational environments and technology advancement. The evolution of biological and social systems often forms a spiral incremental tendency where the changes are continuous, and stepwise. Inspired by the classical pyramid model of Maslow on Human needs, we propose to understand the evolution of software in the Internetware era with a double pyramid model. In other words, user's needs are gradually changing and their expectations to the system functionalities and qualities are getting higher; at the same time, more and more sophisticated software services become available, they provide richer functionalities, better qualities, more diversified choices, and more appealing user experiences. We first structure the development of user expectation and the capability of services as two separate pyramids, and then we define how the two pyramids interacts and influence each other within a co-evolution model. An example of Internetware system development is presented to illustrate how the co-evolution model helps shorten life cycle of system development and achieve high quality and efficiency at the same time.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83733583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interprocedural path-sensitive resource leaks detection for C programs C程序的过程间路径敏感资源泄漏检测
Pub Date : 2012-10-30 DOI: 10.1145/2430475.2430494
Xiujuan Ji, Jufeng Yang, Jing Xu, Lei Feng, Xiaohong Li
In this paper, we present a new tool, RL_Detector, which performs static analysis to detect resource leaks for C programs. The algorithm is inter-procedural and path-sensitive, and it is based on an underlying resource management property: the data flow from resource allocation point must reach resource deallocation point, otherwise the resource is leaked. For each resource, it symbolically executes the program to collect the constraints of all the paths and recorded as some sets. Then the data flow condition can be computed through these sets of all the paths. Finally, the resource leak detection is reduced to the satisfiability of DFC (the Data Flow Condition). It has been effective at detecting resource leak in the SPEC2000 benchmarks and in an open source software project, the actual test results show that the tool keeps the false positive rate below 10% and works on millions of lines of code in a matter of minutes.
在本文中,我们提出了一个新的工具,RL_Detector,它执行静态分析来检测C程序的资源泄漏。该算法是过程间和路径敏感的,它基于一个底层的资源管理属性:从资源分配点开始的数据流必须到达资源分配点,否则资源就会泄漏。对于每个资源,它象征性地执行程序来收集所有路径的约束并记录为一些集合。然后通过所有路径的集合计算数据流条件。最后,将资源泄漏检测简化为DFC(数据流条件)的可满足性。它在SPEC2000基准测试和开源软件项目中有效地检测了资源泄漏,实际测试结果表明,该工具将误报率保持在10%以下,并在几分钟内处理数百万行代码。
{"title":"Interprocedural path-sensitive resource leaks detection for C programs","authors":"Xiujuan Ji, Jufeng Yang, Jing Xu, Lei Feng, Xiaohong Li","doi":"10.1145/2430475.2430494","DOIUrl":"https://doi.org/10.1145/2430475.2430494","url":null,"abstract":"In this paper, we present a new tool, RL_Detector, which performs static analysis to detect resource leaks for C programs. The algorithm is inter-procedural and path-sensitive, and it is based on an underlying resource management property: the data flow from resource allocation point must reach resource deallocation point, otherwise the resource is leaked. For each resource, it symbolically executes the program to collect the constraints of all the paths and recorded as some sets. Then the data flow condition can be computed through these sets of all the paths. Finally, the resource leak detection is reduced to the satisfiability of DFC (the Data Flow Condition). It has been effective at detecting resource leak in the SPEC2000 benchmarks and in an open source software project, the actual test results show that the tool keeps the false positive rate below 10% and works on millions of lines of code in a matter of minutes.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82010913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comparative study of static CIA techniques 静态中情局技术的比较研究
Pub Date : 2012-10-30 DOI: 10.1145/2430475.2430498
Xiaobing Sun, Bin Li, Bixin Li, Wanzhi Wen
Software Change Impact Analysis (CIA) is an essential technique to identify the unpredicted and potential effects caused by software changes. A rich body of different CIA techniques, especially static CIA techniques, have continuously emerged in recent years. However, it is difficult for researchers or practitioners to decide which technique is most appropriate for their needs, or which CIA technique is more effective. Unfortunately, there was only a few work on the comparison of the CIA techniques. This paper presents a comparison study of different types of popular static CIA approaches, i.e., structural static analysis, textual analysis, and historical analysis. For each kind of static CIA approach, we introduce a representative technique, that is FCA -- CIA, ROSE, and IRC2M, respectively. Finally, some empirical studies are conducted on three real-world programs to compare the accuracy of these CIA techniques based on the precision and recall metrics. The results show that the accuracy of these three CIA techniques is different, and FCA - CIA has the best precision while the IRC2M has the best recall.
软件变更影响分析(CIA)是识别由软件变更引起的不可预测和潜在影响的基本技术。近年来,大量不同的CIA技术,特别是静态CIA技术不断涌现。然而,研究人员或从业人员很难决定哪种技术最适合他们的需要,或者哪种中情局技术更有效。不幸的是,只有很少的工作对中情局的技术进行比较。本文对目前流行的几种静态中情局方法进行了比较研究,即结构静态分析、文本分析和历史分析。对于每种静态CIA方法,我们分别介绍了一种具有代表性的技术,即FCA—CIA、ROSE和IRC2M。最后,在三个现实世界的程序中进行了一些实证研究,以比较这些CIA技术基于精度和召回率指标的准确性。结果表明,三种CIA技术的准确率存在差异,其中FCA - CIA的准确率最高,IRC2M的召回率最高。
{"title":"A comparative study of static CIA techniques","authors":"Xiaobing Sun, Bin Li, Bixin Li, Wanzhi Wen","doi":"10.1145/2430475.2430498","DOIUrl":"https://doi.org/10.1145/2430475.2430498","url":null,"abstract":"Software Change Impact Analysis (CIA) is an essential technique to identify the unpredicted and potential effects caused by software changes. A rich body of different CIA techniques, especially static CIA techniques, have continuously emerged in recent years. However, it is difficult for researchers or practitioners to decide which technique is most appropriate for their needs, or which CIA technique is more effective. Unfortunately, there was only a few work on the comparison of the CIA techniques. This paper presents a comparison study of different types of popular static CIA approaches, i.e., structural static analysis, textual analysis, and historical analysis. For each kind of static CIA approach, we introduce a representative technique, that is FCA -- CIA, ROSE, and IRC2M, respectively. Finally, some empirical studies are conducted on three real-world programs to compare the accuracy of these CIA techniques based on the precision and recall metrics. The results show that the accuracy of these three CIA techniques is different, and FCA - CIA has the best precision while the IRC2M has the best recall.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84949232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Dynamic software architectures: formal specification and verification with CSP 动态软件架构:使用CSP进行正式规范和验证
Pub Date : 2012-10-30 DOI: 10.1145/2430475.2430480
Chen Li, Linpeng Huang, Luxi Chen, Xu Li, Weichao Luo
Compared to the traditional software architecture, Dynamic Software Architectures (DSAs) should be able to describe the changes of the system and to effect modifications during system execution, especially for dynamic evolution. To reflect the changes during system execution, we present a formalism for describing architecture structure and interaction behavior, and we also specify four evolution rules for software architecture. Our work expands the idea in three directions. The first is to formalize the architecture structure and interaction behavior including components, connectors and an architectural reference model. The second direction is that we formalize four dynamic evolution rules which DSAs should support, that is, addition, removal, replacement and reconfiguration. Another direction is that we verify software architecture consistency and integrity after dynamic evolution. We use a client/server application as a running example throughout the paper to demonstrate our approach. Our work provides a precise formal specification for software architecture and a rigorous verification for dynamic evolution.
与传统的软件体系结构相比,动态软件体系结构(dsa)应该能够描述系统的变化并在系统执行期间进行修改,特别是对于动态演化。为了反映系统执行过程中的变化,我们提出了一种描述体系结构和交互行为的形式化方法,并为软件体系结构指定了四种演化规则。我们的工作从三个方面扩展了这个想法。首先是形式化体系结构结构和交互行为,包括组件、连接器和体系结构参考模型。第二个方向是形式化了dsa应该支持的四个动态演化规则,即添加、移除、替换和重构。另一个方向是动态演化后验证软件体系结构的一致性和完整性。在本文中,我们使用一个客户机/服务器应用程序作为运行示例来演示我们的方法。我们的工作为软件架构提供了精确的形式化规范,并为动态演进提供了严格的验证。
{"title":"Dynamic software architectures: formal specification and verification with CSP","authors":"Chen Li, Linpeng Huang, Luxi Chen, Xu Li, Weichao Luo","doi":"10.1145/2430475.2430480","DOIUrl":"https://doi.org/10.1145/2430475.2430480","url":null,"abstract":"Compared to the traditional software architecture, Dynamic Software Architectures (DSAs) should be able to describe the changes of the system and to effect modifications during system execution, especially for dynamic evolution. To reflect the changes during system execution, we present a formalism for describing architecture structure and interaction behavior, and we also specify four evolution rules for software architecture. Our work expands the idea in three directions. The first is to formalize the architecture structure and interaction behavior including components, connectors and an architectural reference model. The second direction is that we formalize four dynamic evolution rules which DSAs should support, that is, addition, removal, replacement and reconfiguration. Another direction is that we verify software architecture consistency and integrity after dynamic evolution. We use a client/server application as a running example throughout the paper to demonstrate our approach. Our work provides a precise formal specification for software architecture and a rigorous verification for dynamic evolution.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82548804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A priority-based transaction commit protocol for composite web services 用于组合web服务的基于优先级的事务提交协议
Pub Date : 2012-10-30 DOI: 10.1145/2430475.2430477
Wei Song, Zheng Gao, Jing Cai, Xiaoxing Ma
Service composition provides an effective way to conduct cross-organizational business transactions. Some protocols and frameworks have been proposed to ensure ACID properties of transactional service requisitions from the perspective of a service requester. However, few of them have focused on how to optimize the services' profits from the perspective of a service provider. In this paper, we present a priority-based transaction commit protocol for composite Web services. For this protocol, Nash Bargaining Solution (NBS) is used to differentiate service requesters so that services (i.e., resources) can be allocated with different priorities. In this way, the profit of a service provider can be maximized with proportional fairness. For service requesters, the proposed protocol can guarantee the atomicity of service requisitions. Our experimental results reveal that the proposed protocol can significantly enhance the profit of service providers without violating atomicity of Web service transactions.
服务组合提供了一种执行跨组织业务事务的有效方法。已经提出了一些协议和框架,从服务请求者的角度确保事务性服务请求的ACID属性。然而,很少有人从服务提供商的角度关注如何优化服务的利润。在本文中,我们提出了一种基于优先级的复合Web服务事务提交协议。对于该协议,使用纳什协商解决方案(NBS)来区分服务请求者,以便可以按不同的优先级分配服务(即资源)。这样,服务提供商的利润就可以以比例公平最大化。对于服务请求者,所提出的协议可以保证服务请求的原子性。实验结果表明,该协议在不违背Web服务事务原子性的前提下,显著提高了服务提供者的利润。
{"title":"A priority-based transaction commit protocol for composite web services","authors":"Wei Song, Zheng Gao, Jing Cai, Xiaoxing Ma","doi":"10.1145/2430475.2430477","DOIUrl":"https://doi.org/10.1145/2430475.2430477","url":null,"abstract":"Service composition provides an effective way to conduct cross-organizational business transactions. Some protocols and frameworks have been proposed to ensure ACID properties of transactional service requisitions from the perspective of a service requester. However, few of them have focused on how to optimize the services' profits from the perspective of a service provider. In this paper, we present a priority-based transaction commit protocol for composite Web services. For this protocol, Nash Bargaining Solution (NBS) is used to differentiate service requesters so that services (i.e., resources) can be allocated with different priorities. In this way, the profit of a service provider can be maximized with proportional fairness. For service requesters, the proposed protocol can guarantee the atomicity of service requisitions. Our experimental results reveal that the proposed protocol can significantly enhance the profit of service providers without violating atomicity of Web service transactions.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86029637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review code evolution history in OSS universe 回顾OSS领域的代码演化历史
Pub Date : 2012-10-30 DOI: 10.1145/2430475.2430488
Jiaxin Zhu, Hongwu Lin, Minghui Zhou, Hong Mei
Software evolves all the time because of the changing requirements, in particular, in the diverse Internet environment. Evolution history recorded in software repositories, e.g., Version Control Systems, reflects people's software development practice. Exploring this history could help practitioners to reuse the best practices therefore improve productivity and software quality. Because of the difficulty of collecting and standardizing data, most existing work could only utilize small project set. In this study, we target the open source software universe to build a universal code evolution model for large-scale data. We consider code evolution from two aspects: code version changing history in a single project and code reuse history in the whole universe. In the model, files/modules are built as nodes, and relations (version change or reuse) between files/modules are built as connections. Based on the model, we design and implement a code evolution review framework, i.e., Code Evolution Reviewer (CER), which provides a series of data interfaces to review code evolution history, in particular, code version changing in single project and code reuse among projects. Further, CER could be utilized to explore best practices across large-scale project set.
软件一直在发展,因为需求在不断变化,特别是在多样化的Internet环境中。记录在软件存储库中的演进历史,例如版本控制系统,反映了人们的软件开发实践。探索这段历史可以帮助实践者重用最佳实践,从而提高生产力和软件质量。由于数据收集和标准化的困难,大多数现有的工作只能利用小的项目集。在本研究中,我们以开源软件领域为目标,为大规模数据构建一个通用的代码演化模型。我们从两个方面考虑代码演化:单个项目中的代码版本变更历史和整个宇宙中的代码重用历史。在该模型中,文件/模块被构建为节点,文件/模块之间的关系(版本变更或重用)被构建为连接。基于该模型,我们设计并实现了一个代码演化审查框架,即代码演化审查器(code evolution Reviewer, CER),该框架提供了一系列的数据接口来审查代码演化历史,特别是单个项目内的代码版本变更和项目间的代码重用。此外,CER可用于探索跨大型项目集的最佳实践。
{"title":"Review code evolution history in OSS universe","authors":"Jiaxin Zhu, Hongwu Lin, Minghui Zhou, Hong Mei","doi":"10.1145/2430475.2430488","DOIUrl":"https://doi.org/10.1145/2430475.2430488","url":null,"abstract":"Software evolves all the time because of the changing requirements, in particular, in the diverse Internet environment. Evolution history recorded in software repositories, e.g., Version Control Systems, reflects people's software development practice. Exploring this history could help practitioners to reuse the best practices therefore improve productivity and software quality. Because of the difficulty of collecting and standardizing data, most existing work could only utilize small project set. In this study, we target the open source software universe to build a universal code evolution model for large-scale data. We consider code evolution from two aspects: code version changing history in a single project and code reuse history in the whole universe. In the model, files/modules are built as nodes, and relations (version change or reuse) between files/modules are built as connections. Based on the model, we design and implement a code evolution review framework, i.e., Code Evolution Reviewer (CER), which provides a series of data interfaces to review code evolution history, in particular, code version changing in single project and code reuse among projects. Further, CER could be utilized to explore best practices across large-scale project set.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89447028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A group recommendation approach for service selection 一种服务选择的群体推荐方法
Pub Date : 2012-10-30 DOI: 10.1145/2430475.2430485
Tao Liu, Feng Xu, Yuan Yao, Jian Lu
There are more and more services that fulfill similar functionality, such as image service provided by Flickr, Picasa and Facebook. Which should be adopted to construct our software system in the open, dynamic and non-deterministic Internet environment is a key problem. Earlier work[15, 9] analyze this problem from the point view of QoS and established generic and extensible QoS computation framework for service selection. However those framework are almost designed for individuals. As social network emerges and gets widespread, people tend to be more connected and self-organize themselves into groups. Benefits of all members should be considered when we select service for group. In this article, we propose a revised group recommendation algorithm which takes advantage of collaborative filtering technology for service selection. As the experiment demonstrates, our algorithm exhibits high accuracy.
越来越多的服务实现了类似的功能,比如Flickr、Picasa和Facebook提供的图像服务。在开放、动态、不确定的网络环境下,如何构建软件系统是一个关键问题。早期的工作[15,9]从QoS的角度分析了这个问题,并建立了通用的、可扩展的QoS计算框架,用于服务选择。然而,这些框架几乎是为个人设计的。随着社交网络的出现和普及,人们倾向于更加紧密地联系在一起,并将自己组织成群体。在选择团体服务时,应考虑全体成员的利益。在本文中,我们提出了一种改进的群体推荐算法,该算法利用协同过滤技术进行服务选择。实验表明,该算法具有较高的准确率。
{"title":"A group recommendation approach for service selection","authors":"Tao Liu, Feng Xu, Yuan Yao, Jian Lu","doi":"10.1145/2430475.2430485","DOIUrl":"https://doi.org/10.1145/2430475.2430485","url":null,"abstract":"There are more and more services that fulfill similar functionality, such as image service provided by Flickr, Picasa and Facebook. Which should be adopted to construct our software system in the open, dynamic and non-deterministic Internet environment is a key problem. Earlier work[15, 9] analyze this problem from the point view of QoS and established generic and extensible QoS computation framework for service selection. However those framework are almost designed for individuals. As social network emerges and gets widespread, people tend to be more connected and self-organize themselves into groups. Benefits of all members should be considered when we select service for group. In this article, we propose a revised group recommendation algorithm which takes advantage of collaborative filtering technology for service selection. As the experiment demonstrates, our algorithm exhibits high accuracy.","PeriodicalId":20631,"journal":{"name":"Proceedings of the 8th Asia-Pacific Symposium on Internetware","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88792701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 8th Asia-Pacific Symposium on Internetware
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1