Journal on Communications ›› 2016, Vol. 37 ›› Issue (3): 7-19.doi: 10.11959/j.issn.1000-436x.2016048
• Academic paper • Previous Articles Next Articles
Zhen LI1,Jun-feng TIAN1,Zhuo CHANG1,Xiao-xue MA2
Online:
2016-03-25
Published:
2017-08-04
Supported by:
Zhen LI,Jun-feng TIAN,Zhuo CHANG,Xiao-xue MA. Distributed software monitoring and trustworthiness evaluation based on checkpoints[J]. Journal on Communications, 2016, 37(3): 7-19.
"
方法 | 交互关联类型 | 符号 | 关联规则 | 交互关联可信性值 |
因果 | → | placeOrder→writeToDB,writeToDB→notifySupplier , | ||
文献[7] | 并发 | || | changeOrder→writeToDB,notifyUserOfShipment→writeToDB , | 1 |
重复 | ? | writeToDB→notifyUser,changeOrder→noChangeAllowed | ||
placeOrder < pwriteToDB < pnotifySupplier, | ||||
文献[11] | 因果 | <p | changeOrder < pwriteToDB < pnotifySupplier,notifyUserOfShipment < pwriteToDB < pnotifyUser, | 1 |
changeOrder < pnoChangeAllowed | 0 | |||
本文方法 | 同步因果异步因果并发互斥重复 | <S <A||+* | placeOrder <SwriteToDB <SnotifySupplier,*[change order before shipment](changeOrder <S writeToDB <S notifySupplier),notifyUserOfShipment <SwriteToDB <SnotifyUser,*[change order after shipment](changeOrder <S noChangeAllowed) |
"
测试序号 | 2)writeToDB | 3)notifySupplier | 8)writeToDB | 9)notifyUser | 场景 1 | ||||
tget | texe | tget | texe | tget | texe | tget | texe | ||
1 | 10.35 | 15.74 | 10.05 | 8.25 | 10.23 | 15.87 | 8.98 | 7.65 | 1 124.34 |
2 | 9.98 | 14.95 | 9.30 | 7.83 | 10.11 | 15.44 | 9.24 | 7.87 | 1 098.35 |
3 | 9.57 | 14.80 | 9.91 | 8.13 | 9.76 | 14.32 | 8.65 | 7.54 | 1 087.65 |
4 | 10.12 | 15.56 | 9.54 | 7.95 | 9.99 | 15.34 | 8.50 | 7.39 | 1 128.72 |
5 | 9.76 | 14.55 | 9.58 | 8.01 | 9.74 | 14.78 | 8.78 | 7.78 | 1 105.60 |
平均值 | 9.96 | 15.12 | 9.68 | 8.03 | 9.97 | 15.15 | 8.83 | 7.65 | 1 108.93 |
额外开销均值 | 0 | 1.65 | 0 | 1.18 | 2.83 |
[1] | REYNOLDS P , KILLIAN C , WIENER J L , et al. Pip:detecting the unexpected in distributed systems[C]// The 3rd Symposium on Net-worked Systems Design and Implementation. USENIX Assoc ion Berkeley,CA,USA, c2006:115-128. |
[2] | 杨晓晖, 周学海, 田俊峰 , 等. 一个新的软件行为动态可信评测模型[J]. 小型微型计算机系统, 2010,31(11): 2113-2120. YANG X H , ZHOU X H , TIAN J F , et al. Novel dynamic trusted evaluation model of software behavior[J]. Journal of inese Computer Systems, 2010,31(11): 2113-2120. |
[3] | 刘玉玲, 杜瑞忠, 冯建磊 , 等. 基于软件行为的检查点风险评估信任模型[J]. 西安电子科技大学学报(自然科学版), 2012,39(1): 179-184. LIU Y L , DU R Z , FENG J L , et al. Trust model of software behaviors based on check point risk assessment[J]. Journal of Xidian University, 2012,39(1): 179-184. |
[4] | 田俊峰, 张亚姣 . 基于马尔可夫的检查点可信评估方法[J]. 通信学报, 2015,36(1): 230-236. TIAN J F , ZHANG Y J . Checkpoint trust evaluation method based on Markov[J]. Journal on Communications, 2015,36(1): 230-236. |
[5] | 刘东红, 郭长国, 王怀民 , 等. 监控使能的分布式软件系统构造方法[J]. 软件学报, 2011,22(11): 2610-2624. LIU D H , GUO C G , WANG H M , et al. Monitoring enabled istri-buted software construction method[J]. Journal of Software, 2011,22(11): 2610-2624. |
[6] | 文志诚, 李长云, 满君丰 . 基于贝叶斯网的分布式软件行为运行时可信性分析[J]. 小型微型计算机系统, 2012,33(3): 504-511. WEN Z C , LI C Y , MAN J F . Analyzing running-time behavioral cre-dibility for distributed software based on Bayesian network[J]. Journal of Chinese Computer Systems, 2012,33(3): 504-511. |
[7] | 彭成, 杨路明, 满君丰 . 网络化软件交互行为动态建模[J]. 电子学报, 2013,41(2): 314-320. PENG C , YANG L M , MAN J F . Dynamic modeling of networked software interactive behavior[J]. Acta Electronica Sin, 2013,41(2): 314-320. |
[8] | WANG Q , LU Y , XU Z J , et al. Software reliability mode for com-ponent interaction mode[J]. Journal of Electronics(Chi 2011,28(4/5/6): 632-642. |
[9] | YANG N H , YU H Q , QIAN Z L , et al. Modeling and quantitatively predicting software security based on stochastic Petri nets[J]. Mathe-matical and Computer Modeling, 2012,55(1-2):102-112. |
[10] | TYAGI K , SHARMA A . An adaptive neuro fuzzy model for estimat-ing the reliability of component-based software systems[J]. Applied Computing and Informatics, 2014,10(s1-2):38-51. |
[11] | CHEN X H , LIU J , LIU Z M . Requirements monitoring for nternet-ware:an interaction based approach[J]. Science China:Information Science, 2013,56(8):1-5. |
[12] | GOKHALE S S . Architecture-based software reliability analysis:overview and limitations[J]. IEEE Transactions on Dependable and Secure Computing, 2007,4(1):32-40. |
[13] | CHEUNG R C . A user-oriented software reliability model[J]. IEEE Transactions on Software Engineering, 1980,SE-6(2):118-125. |
[14] | GOKHALE S S , WONG W E , HORGAN J R , et al. An analytical approach to architecture-based software performance and reliability prediction[J]. Performance Evaluation, 2004,58(4):391-412. |
[15] | HSU C J , HUANG C Y . An adaptive reliability analysis using path testing for complex component-based software systems[J]. IEEE Transactions on Reliability, 2011,60(1):158-170. |
[16] | YACOUB S , CUKIC B , AMMAR H H . A scenario-based reliability analysis approach for component-based software[J]. IEEE Transac-tions Reliability, 2004,54(4):465-480. |
[17] | 李珍, 田俊峰, 赵鹏远 . 基于分级属性的软件监控点可信行为模型[J]. 电子与信息学报, 2012,34(6): 1445-1451. LI Z , TIAN J F , ZHAO P Y . A trustworthy behavior model for software monitoring point based on classification attributes[J]. Journal of Electronics & Information Technology, 2012,34(6): 1445-1451. |
[18] | 李珍, 田俊峰, 杨晓晖 . 基于检查点分级属性的软件动态可信评测模型[J]. 计算机研究与发展, 2013,50(11): 2397-2405. LI Z , TIAN J F , YANG X H . Dynamic trustworthiness eval ion model of software based on checkpoint's classification attributes[J]. Journal of Computer Research and Development, 2013,50(11): 2397-2405. |
[19] | 邵建平, 王玲 . “拉长板”木桶原理及其运用研究[J]. 科技管理研究, 2005,25(4): 159-161. SHAO J P , WANG L . Research on “stretched panels” bucket theory and its application[J]. Science and Technology Manage nt Research, 2005,25(4): 159-161. |
[1] | Xuming PEI,Jianxin JIA,Hua QIAN,Zhenghang ZHU,Zhenyu TANG,Kai KANG. Low latency handover scheme for 5G dual-connectivity scenario [J]. Journal on Communications, 2019, 40(4): 212-222. |
[2] | Junfeng TIAN,Yuhui GUO. Software behavior trust forecast model based on check point scene information [J]. Journal on Communications, 2018, 39(9): 147-158. |
[3] | Li ZHANG,Cong WANG. Multi-label feature selection algorithm based on joint mutual information of max-relevance and min-redundancy [J]. Journal on Communications, 2018, 39(5): 111-122. |
[4] | Wei-dong LYU,Xue-guang ZHOU,Zhi-min YUAN. Design of tree topology based Byzantine fault tolerance system [J]. Journal on Communications, 2017, 38(Z2): 139-146. |
[5] | Gang XIONG,Ju-long LAN,Yu-xiang HU,Shi-ran LIU. Evaluation approach for network components performance using trustworthiness measurement [J]. Journal on Communications, 2016, 37(3): 117-128. |
[6] | Nan WANG,dong SUNQin,dong ZHOUYa,qin WANGHan,sheng SUILian. Study on user influence analysis via regional user interaction model in online social networks [J]. Journal on Communications, 2016, 37(1): 160-169. |
[7] | Kan CHEN,Liang CHEN,Pei-dong ZHU,Yue-shan XIONG. Interaction based on method for spam detection in online social networks [J]. Journal on Communications, 2015, 36(7): 120-128. |
[8] | Jun-feng TIAN,Ya-jiao ZHANG. Checkpoint trust evaluation method based on Markov [J]. Journal on Communications, 2015, 36(1): 230-236. |
[9] | Qiang HAN,Yu-yu YUAN. Research on trustworthiness measurement approaches of component based BPRAS [J]. Journal on Communications, 2014, 35(3): 47-57. |
[10] | . Research on trustworthiness measurement approaches of component based BPRAS [J]. Journal on Communications, 2014, 35(3): 6-57. |
[11] | Xian-jia MENG,Jian-feng MA,Di LU,Yi-chuan WANG. Comprehensive trust evaluation model in social networks [J]. Journal on Communications, 2014, 35(12): 136-143. |
[12] | . Comprehensive trust evaluation model in social networks [J]. Journal on Communications, 2014, 35(12): 16-143. |
[13] | . Scheme of node identify authentication in distributed file interaction system [J]. Journal on Communications, 2013, 34(Z1): 3-20. |
[14] | Wen-cai HE,Min DU,Zhi-wei CHEN,Pei-he LIU,Yan-yan HAN. Scheme of node identify authentication in distributed file interaction system [J]. Journal on Communications, 2013, 34(Z1): 14-20. |
[15] | Jian-wei LIAO,Shan-xiong CHEN,Li LI. Memory contents patch based virtual machine synchronization [J]. Journal on Communications, 2012, 33(Z1): 157-164. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|