525 research outputs found

    Process mining and verification

    Get PDF

    LWS: A Framework for Log-based Workload Simulation in Session-based SUT

    Full text link
    Microservice-based applications and cloud-native systems have been widely applied in large IT enterprises. The operation and management of microservice-based applications and cloud-native systems have become the focus of research. Essential and real workloads are the premise and basis of prominent research topics including performance testing, dynamic resource provisioning and scheduling, and AIOps. Due to the privacy restriction, the complexity and variety of workloads, and the requirements for reasonable intervention, it is difficult to copy or generate real workloads directly. In this paper, we formulate the task of workload simulation and propose a framework for Log-based Workload Simulation (LWS) in session-based application systems. First, LWS collects session logs and transforms them into grouped and well-organized sessions. Then LWS extracts the user behavior abstraction based on a relational model and the intervenable workload intensity by three methods from different perspectives. LWS combines the user behavior abstraction and the workload intensity for simulated workload generation and designs a domain-specific language for better execution. The experimental evaluation is performed on an open-source cloud-native application and a public real-world e-commerce workload. The experimental results show that the simulated workload generated by LWS is effective and intervenable

    Mining Significant Temporal Networks Is Polynomial

    Get PDF
    A Conditional Simple Temporal Network with Uncertainty and Decisions (CSTNUD) is a formalism that tackles controllable and uncontrollable durations as well as controllable and uncontrollable choices simultaneously. In the classic top-down model-based engineering approach, a designer builds a CSTNUD to model, validate and execute some temporal plan of interest. Instead, in this paper, we investigate the bottom-up approach by providing a deterministic polynomial time algorithm to mine a CSTNUD from a set of execution traces (i.e., a log). This paper paves the way for the design of controllable temporal networks mined from traces that also contain information on uncontrollable events
    • …
    corecore