首页 > 最新文献

29th Annual International Computer Software and Applications Conference (COMPSAC'05)最新文献

英文 中文
Synchronized architectures for adaptive systems 自适应系统的同步架构
T. Seceleanu, D. Garlan
In this paper we demonstrate how to use action systems to specify and refine self-adaptive systems. Focusing on the special case in which there is a fixed set of possible configurations, we use a recently-introduced synchronization operator to achieve separation of concerns between adaptation policy and steady-state system execution. The use of action systems permits the application of standard techniques for refinement to construct correct implementations from higher-level models. We illustrate the application of this idea to the problem of coping with dynamically-varying user requirements.
在本文中,我们演示了如何使用动作系统来指定和改进自适应系统。专注于存在一组固定可能配置的特殊情况,我们使用最近引入的同步操作符来实现适应性策略和稳态系统执行之间的关注点分离。操作系统的使用允许应用标准技术进行细化,以便从更高级别的模型构造正确的实现。我们举例说明了这一思想在处理动态变化的用户需求问题上的应用。
{"title":"Synchronized architectures for adaptive systems","authors":"T. Seceleanu, D. Garlan","doi":"10.1109/COMPSAC.2005.149","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.149","url":null,"abstract":"In this paper we demonstrate how to use action systems to specify and refine self-adaptive systems. Focusing on the special case in which there is a fixed set of possible configurations, we use a recently-introduced synchronization operator to achieve separation of concerns between adaptation policy and steady-state system execution. The use of action systems permits the application of standard techniques for refinement to construct correct implementations from higher-level models. We illustrate the application of this idea to the problem of coping with dynamically-varying user requirements.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132669003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An empirical performance study for validating a performance analysis approach: PSIM 验证绩效分析方法的实证绩效研究:PSIM
Jinchun Xia, Yujia Ge, Carl K. Chang
Performance analysis gains more attention in recent years by researchers who focus their study on the early software development stages to mitigate the risk of redesign as problems emerge later. Previously we proposed PSIM (a performance simulation and modeling tool) that integrated performance properties into software architecture specifications expressed in several major UML diagrams. PSIM models can be transformed into colored GSPN and the colored GSPN models can then be simulated to perform model-based performance evaluation. In this paper we briefly review the PSIM approach and apply it to model a Web-based conferencing system, called M-Net, to derive performance metrics. We then conduct runtime performance testing to the implementation of M-Net and compare the simulation data to runtime testing data. The comparison results show the effectiveness of the PSIM method in predicting system performance and identifying system performance bottlenecks.
近年来,性能分析得到了研究人员的更多关注,他们将研究重点放在软件开发的早期阶段,以减轻后来出现问题时重新设计的风险。以前我们提出了PSIM(一种性能模拟和建模工具),它将性能属性集成到几个主要UML图中表示的软件体系结构规范中。将PSIM模型转换为彩色GSPN,然后对彩色GSPN模型进行仿真,以进行基于模型的性能评估。在本文中,我们简要回顾了PSIM方法,并将其应用于基于web的会议系统建模,称为M-Net,以获得性能指标。然后,我们对M-Net的实现进行运行时性能测试,并将模拟数据与运行时测试数据进行比较。对比结果表明,PSIM方法在预测系统性能和识别系统性能瓶颈方面是有效的。
{"title":"An empirical performance study for validating a performance analysis approach: PSIM","authors":"Jinchun Xia, Yujia Ge, Carl K. Chang","doi":"10.1109/COMPSAC.2005.43","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.43","url":null,"abstract":"Performance analysis gains more attention in recent years by researchers who focus their study on the early software development stages to mitigate the risk of redesign as problems emerge later. Previously we proposed PSIM (a performance simulation and modeling tool) that integrated performance properties into software architecture specifications expressed in several major UML diagrams. PSIM models can be transformed into colored GSPN and the colored GSPN models can then be simulated to perform model-based performance evaluation. In this paper we briefly review the PSIM approach and apply it to model a Web-based conferencing system, called M-Net, to derive performance metrics. We then conduct runtime performance testing to the implementation of M-Net and compare the simulation data to runtime testing data. The comparison results show the effectiveness of the PSIM method in predicting system performance and identifying system performance bottlenecks.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133251924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Measuring the functionality of online stores 衡量在线商店的功能
E. Cachia, Mark Micallef
This paper shows the need of a framework which can be used to measure the functionality delivered by electronic commerce (e-commerce) systems. Such a framework would be helpful in areas such as cost prediction, effort estimation, and so on. The paper goes on to propose such a framework, based on the established methods of function points and object points.
本文展示了对一个框架的需求,该框架可用于度量电子商务(电子商务)系统交付的功能。这样的框架在诸如成本预测、工作量估计等领域会很有帮助。本文在已有的功能点和对象点方法的基础上,提出了这样一个框架。
{"title":"Measuring the functionality of online stores","authors":"E. Cachia, Mark Micallef","doi":"10.1109/COMPSAC.2005.97","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.97","url":null,"abstract":"This paper shows the need of a framework which can be used to measure the functionality delivered by electronic commerce (e-commerce) systems. Such a framework would be helpful in areas such as cost prediction, effort estimation, and so on. The paper goes on to propose such a framework, based on the established methods of function points and object points.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121970752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Buffer overrun prevention through component composition analysis 通过成分分析防止缓冲区溢出
D. Llewellyn-Jones, M. Merabti, Q. Shi, R. Askwith
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem. Rather than concentrate on how to prevent the use of code containing buffer overrun vulnerabilities, we look at component composition techniques that can allow vulnerable code to be executed in a safe way within a composed application. We establish how this can be determined in an automated way using formal code analysis techniques and present results from the prototype system that we have developed for this purpose.
缓冲区溢出漏洞会导致严重的安全问题,并且已被证明很难预防。在本文中,我们提出了一种解决这个问题的新方法。我们不关注如何防止使用包含缓冲区溢出漏洞的代码,而是关注组件组合技术,该技术允许在组合应用程序中以安全的方式执行易受攻击的代码。我们建立了如何使用正式的代码分析技术以自动化的方式确定这一点,并展示了我们为此目的开发的原型系统的结果。
{"title":"Buffer overrun prevention through component composition analysis","authors":"D. Llewellyn-Jones, M. Merabti, Q. Shi, R. Askwith","doi":"10.1109/COMPSAC.2005.54","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.54","url":null,"abstract":"Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem. Rather than concentrate on how to prevent the use of code containing buffer overrun vulnerabilities, we look at component composition techniques that can allow vulnerable code to be executed in a safe way within a composed application. We establish how this can be determined in an automated way using formal code analysis techniques and present results from the prototype system that we have developed for this purpose.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125866215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Designing controllers for reachability 为可达性设计控制器
C. Seceleanu
We propose a deductive method for constructing reliable reachability controllers, with application to fault-tolerant discrete systems. Designing the controller reduces to finding a strategy to win specific games defined by sequential angelic and demonic nondeterministic statements. During the game, the plant (the demon) tries to prevent the controller (the angel) from achieving its respective goal, modeled by a special kind of liveness property. We show that the angel has a way to enforce the required property, provided that adequate invariance and termination properties hold. The control strategy is obtained by propagating certain assertions into the angelic statement. We illustrate our method on a data-processing application.
提出了一种构造可靠可达性控制器的演绎法,并将其应用于容错离散系统。设计控制器可以简化为找到一种策略来赢得由连续的天使和恶魔不确定性语句定义的特定游戏。在游戏中,植物(恶魔)试图阻止控制器(天使)实现各自的目标,这是一种特殊的活动性属性。我们表明,只要保持足够的不变性和终止属性,天使有一种方法来强制执行所需的属性。控制策略是通过将某些断言传播到天使语句中获得的。我们用一个数据处理应用程序来说明我们的方法。
{"title":"Designing controllers for reachability","authors":"C. Seceleanu","doi":"10.1109/COMPSAC.2005.68","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.68","url":null,"abstract":"We propose a deductive method for constructing reliable reachability controllers, with application to fault-tolerant discrete systems. Designing the controller reduces to finding a strategy to win specific games defined by sequential angelic and demonic nondeterministic statements. During the game, the plant (the demon) tries to prevent the controller (the angel) from achieving its respective goal, modeled by a special kind of liveness property. We show that the angel has a way to enforce the required property, provided that adequate invariance and termination properties hold. The control strategy is obtained by propagating certain assertions into the angelic statement. We illustrate our method on a data-processing application.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126125526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On personal data license design and negotiation 个人资料许可证的设计和谈判
Yuh-Jzer Joung, Cheng-An Yen, Chung-Tang Huang, Yi-Jhan Huang
Web applications often require users to provide personal information for customization, identification, or completing a transaction. However, the way we disclose our information in current cyberspace does not allow us to control the usage, release and circulation of the information, violating the basic principle of personal information privacy. Online personal data licensing (OPDL) is a framework to bring the control of personal information back to individuals by requiring application and service providers to obtain a license from a person before collecting, processing, and using his personal information. In this paper we present the license design and automation of the license negotiation process.
Web应用程序通常要求用户提供个人信息以进行定制、识别或完成交易。然而,我们在当前网络空间中披露信息的方式,使我们无法控制信息的使用、发布和流通,违反了个人信息隐私的基本原则。在线个人数据许可(OPDL)是一种通过要求应用程序和服务提供商在收集、处理和使用个人信息之前从个人那里获得许可,将个人信息控制权交还给个人的框架。在本文中,我们提出了许可设计和自动化的许可协商过程。
{"title":"On personal data license design and negotiation","authors":"Yuh-Jzer Joung, Cheng-An Yen, Chung-Tang Huang, Yi-Jhan Huang","doi":"10.1109/COMPSAC.2005.114","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.114","url":null,"abstract":"Web applications often require users to provide personal information for customization, identification, or completing a transaction. However, the way we disclose our information in current cyberspace does not allow us to control the usage, release and circulation of the information, violating the basic principle of personal information privacy. Online personal data licensing (OPDL) is a framework to bring the control of personal information back to individuals by requiring application and service providers to obtain a license from a person before collecting, processing, and using his personal information. In this paper we present the license design and automation of the license negotiation process.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127401930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Configuration-Oriented Symbolic Test Sequence Construction Method for EFSM 面向组态的EFSM符号测试序列构建方法
Shuhao Li, Ji Wang, Xin Wang, Zhichang Qi
This paper presents a new approach to generating configuration-oriented executable symbolic test sequences from Extended Finite State Machine (EFSM) models. The information about the values of the context variables and the domain intervals of the input parameters are exploited to guide the derivation of the test sequences. Meanwhile, the transition guards along the test sequences are continually used to reduce the domain intervals of the input parameters. Experiments indicate that this method significantly reduces the EFSM state space to be explored and the number of non-executable symbolic test sequences to be generated. Since parameterized input events are allowed to occur in EFSM cycles, this method is suitable for testing the open reactive systems that interact with the environments via parameterized input events.
提出了一种利用扩展有限状态机模型生成面向配置的可执行符号测试序列的新方法。利用有关上下文变量的值和输入参数的域间隔的信息来指导测试序列的推导。同时,连续使用沿测试序列的过渡保护来减小输入参数的域间隔。实验表明,该方法显著减少了EFSM状态空间的探索和生成的不可执行符号测试序列的数量。由于参数化输入事件允许在EFSM周期中发生,因此该方法适用于测试通过参数化输入事件与环境交互的开放反应系统。
{"title":"Configuration-Oriented Symbolic Test Sequence Construction Method for EFSM","authors":"Shuhao Li, Ji Wang, Xin Wang, Zhichang Qi","doi":"10.1109/COMPSAC.2005.61","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.61","url":null,"abstract":"This paper presents a new approach to generating configuration-oriented executable symbolic test sequences from Extended Finite State Machine (EFSM) models. The information about the values of the context variables and the domain intervals of the input parameters are exploited to guide the derivation of the test sequences. Meanwhile, the transition guards along the test sequences are continually used to reduce the domain intervals of the input parameters. Experiments indicate that this method significantly reduces the EFSM state space to be explored and the number of non-executable symbolic test sequences to be generated. Since parameterized input events are allowed to occur in EFSM cycles, this method is suitable for testing the open reactive systems that interact with the environments via parameterized input events.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127125443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards a contract aware CORBA component container 实现一个支持契约的CORBA组件容器
E. Teiniker, R. Lechner, Gernot Schmoelzer, Christian Kreiner, Z. Kovács, R. Weiss
Component based software engineering (CBSE) suggests the idea of applications as assemblies of prefabricated components. Practical experiences with the CORBA component model (CCM), which is a multi-language and multi-platform component architecture, have shown that pure syntax declarations are inadequate for describing trustworthy software components, in particular for reuse. In this paper we present a contract extension to the CCM metamodel, a contract aware CCM container that improves the trustworthiness of CORBA components and experimental results that explore the runtime impacts of contract verification.
基于组件的软件工程(CBSE)提出了将应用程序作为预制组件组装的思想。CORBA组件模型(CCM)是一种多语言、多平台的组件体系结构,使用它的实际经验表明,纯语法声明不足以描述可信的软件组件,特别是用于重用。在本文中,我们提出了CCM元模型的合约扩展,一个合约感知的CCM容器,它提高了CORBA组件的可信度,并探索了合约验证对运行时的影响的实验结果。
{"title":"Towards a contract aware CORBA component container","authors":"E. Teiniker, R. Lechner, Gernot Schmoelzer, Christian Kreiner, Z. Kovács, R. Weiss","doi":"10.1109/COMPSAC.2005.155","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.155","url":null,"abstract":"Component based software engineering (CBSE) suggests the idea of applications as assemblies of prefabricated components. Practical experiences with the CORBA component model (CCM), which is a multi-language and multi-platform component architecture, have shown that pure syntax declarations are inadequate for describing trustworthy software components, in particular for reuse. In this paper we present a contract extension to the CCM metamodel, a contract aware CCM container that improves the trustworthiness of CORBA components and experimental results that explore the runtime impacts of contract verification.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131040414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A testing approach for XML schemas XML模式的测试方法
M. C. F. P. Emer, S. Vergilio, M. Jino
XML is a language frequently used for data representation and interchange in Web-based applications. In most cases, the XML documents must conform to a schema that defines the type of data that is accepted by a Web application. In this sense, an error in the schema or in the XML document can lead to failures in the application; the use of testing approaches, criteria and specific tools to ensure the reliability of data in the XML format is fundamental. We present a testing approach that helps to reveal faults in XML schemas. The test process involves generating XML documents with some modifications with respect to the original XML document and using queries to these documents to validate the schema. The XML documents and queries are generated according to a set of fault classes defined for the XML schemas. A case study applying the proposed approach is described and the results are presented.
XML是一种在基于web的应用程序中经常用于数据表示和交换的语言。在大多数情况下,XML文档必须符合一个模式,该模式定义了Web应用程序可以接受的数据类型。从这个意义上说,模式或XML文档中的错误可能导致应用程序失败;使用测试方法、标准和特定工具来确保XML格式数据的可靠性是基本的。我们提出了一种有助于揭示XML模式中的错误的测试方法。测试过程包括生成对原始XML文档进行一些修改的XML文档,并使用对这些文档的查询来验证模式。XML文档和查询是根据为XML模式定义的一组错误类生成的。本文描述了应用该方法的一个案例研究,并给出了结果。
{"title":"A testing approach for XML schemas","authors":"M. C. F. P. Emer, S. Vergilio, M. Jino","doi":"10.1109/COMPSAC.2005.35","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.35","url":null,"abstract":"XML is a language frequently used for data representation and interchange in Web-based applications. In most cases, the XML documents must conform to a schema that defines the type of data that is accepted by a Web application. In this sense, an error in the schema or in the XML document can lead to failures in the application; the use of testing approaches, criteria and specific tools to ensure the reliability of data in the XML format is fundamental. We present a testing approach that helps to reveal faults in XML schemas. The test process involves generating XML documents with some modifications with respect to the original XML document and using queries to these documents to validate the schema. The XML documents and queries are generated according to a set of fault classes defined for the XML schemas. A case study applying the proposed approach is described and the results are presented.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125540101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Increasing Web Service Dependability Through Consensus Voting 通过共识投票增加Web服务的可靠性
N. Looker, M. Munro, Jie Xu
This paper demonstrates our Web Service based N-Version model, WS-FTM (Web Service-Fault Tolerance Mechanism), which applies this well proven technique to the domain of Web Services to increase system dependability. WS-FTM achieves transparent usage of replicated Web Services by use of a modified stub. The stub is created using tools included in WS-FTM. Our initial implementation includes a simple consensus voter that allows generic result comparison. Finally we show, through the use of a non-trivial example, that WS-FTM can be used to increase the reliability of a Web Service system.
本文演示了基于Web服务的n版本模型WS-FTM (Web服务容错机制),该模型将这种久经考验的技术应用于Web服务领域,以提高系统的可靠性。WS-FTM通过使用修改后的存根实现对复制的Web服务的透明使用。存根是使用WS-FTM中包含的工具创建的。我们最初的实现包括一个允许通用结果比较的简单共识投票人。最后,通过使用一个重要的示例,我们展示了可以使用WS-FTM来提高Web服务系统的可靠性。
{"title":"Increasing Web Service Dependability Through Consensus Voting","authors":"N. Looker, M. Munro, Jie Xu","doi":"10.1109/COMPSAC.2005.88","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.88","url":null,"abstract":"This paper demonstrates our Web Service based N-Version model, WS-FTM (Web Service-Fault Tolerance Mechanism), which applies this well proven technique to the domain of Web Services to increase system dependability. WS-FTM achieves transparent usage of replicated Web Services by use of a modified stub. The stub is created using tools included in WS-FTM. Our initial implementation includes a simple consensus voter that allows generic result comparison. Finally we show, through the use of a non-trivial example, that WS-FTM can be used to increase the reliability of a Web Service system.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122258921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
期刊
29th Annual International Computer Software and Applications Conference (COMPSAC'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1