212,421 research outputs found

    Optimizing Computation of Recovery Plans for BPEL Applications

    Full text link
    Web service applications are distributed processes that are composed of dynamically bounded services. In our previous work [15], we have described a framework for performing runtime monitoring of web service against behavioural correctness properties (described using property patterns and converted into finite state automata). These specify forbidden behavior (safety properties) and desired behavior (bounded liveness properties). Finite execution traces of web services described in BPEL are checked for conformance at runtime. When violations are discovered, our framework automatically proposes and ranks recovery plans which users can then select for execution. Such plans for safety violations essentially involve "going back" - compensating the executed actions until an alternative behaviour of the application is possible. For bounded liveness violations, recovery plans include both "going back" and "re-planning" - guiding the application towards a desired behaviour. Our experience, reported in [16], identified a drawback in this approach: we compute too many plans due to (a) overapproximating the number of program points where an alternative behaviour is possible and (b) generating recovery plans for bounded liveness properties which can potentially violate safety properties. In this paper, we describe improvements to our framework that remedy these problems and describe their effectiveness on a case study.Comment: In Proceedings TAV-WEB 2010, arXiv:1009.330

    Expectile Matrix Factorization for Skewed Data Analysis

    Full text link
    Matrix factorization is a popular approach to solving matrix estimation problems based on partial observations. Existing matrix factorization is based on least squares and aims to yield a low-rank matrix to interpret the conditional sample means given the observations. However, in many real applications with skewed and extreme data, least squares cannot explain their central tendency or tail distributions, yielding undesired estimates. In this paper, we propose \emph{expectile matrix factorization} by introducing asymmetric least squares, a key concept in expectile regression analysis, into the matrix factorization framework. We propose an efficient algorithm to solve the new problem based on alternating minimization and quadratic programming. We prove that our algorithm converges to a global optimum and exactly recovers the true underlying low-rank matrices when noise is zero. For synthetic data with skewed noise and a real-world dataset containing web service response times, the proposed scheme achieves lower recovery errors than the existing matrix factorization method based on least squares in a wide range of settings.Comment: 8 page main text with 5 page supplementary documents, published in AAAI 201

    Mathematical evaluation of context transfer and multicast fast reroute in multicast enabled network mobility management

    Get PDF
    Internet applications such as web based monitoring; live internet video, online video, video conference, webcam viewing and internet video to TV are highly used in today’s IP communication. The trends of these applications are, that they are played on mobile devices and distributed to many end users. Multicast communication over IP contributes to the end users applications distribution. It has been discovered by a CISCO research that mobile multicast traffic will soon reach zetabyte in 2019. The aim of this paper is to introduce new method that enable multicast in network mobility management. The new method is using context transfer and multicast fast reroute technique. The proposed method is quantitatively evaluated in terms of packet loss and service recovery tim

    Integrated Data, Message, and Process Recovery for Failure Masking in Web Services

    Get PDF
    Modern Web Services applications encompass multiple distributed interacting components, possibly including millions of lines of code written in different programming languages. With this complexity, some bugs often remain undetected despite extensive testing procedures, and occasionally cause transient system failures. Incorrect failure handling in applications often leads to incomplete or to unintentional request executions. A family of recovery protocols called interaction contracts provides a generic solution to this problem by means of system-integrated data, process, and message recovery for multi-tier applications. It is able to mask failures, and allows programmers to concentrate on the application logic, thus speeding up the development process. This thesis consists of two major parts. The first part formally specifies the interaction contracts using the state-and-activity chart language. Moreover, it presents a formal specification of a concrete Web Service that makes use of interaction contracts, and contains no other error-handling actions. The formal specifications undergo verification where crucial safety and liveness properties expressed in temporal logics are mathematically proved by means of model checking. In particular, it is shown that each end-user request is executed exactly once. The second part of the thesis demonstrates the viability of the interaction framework in a real world system. More specifically, a cascadable Web Service platform, EOS, is built based on widely used components, Microsoft Internet Explorer and PHP application server, with interaction contracts integrated into them.Heutige Web-Service-Anwendungen setzen sich aus mehreren verteilten interagierenden Komponenten zusammen. Dabei werden oft mehrere Programmiersprachen eingesetzt, und der Quellcode einer Komponente kann mehrere Millionen Programmzeilen umfassen. In Anbetracht dieser Komplexität bleiben typischerweise einige Programmierfehler trotz intensiver Qualitätssicherung unentdeckt und verursachen vorübergehende Systemsausfälle zur Laufzeit. Eine ungenügende Fehlerbehandlung in Anwendungen führt oft zur unvollständigen oder unbeabsichtigt wiederholten Ausführung einer Operation. Eine Familie von Recovery-Protokollen, die so genannten "Interaction Contracts", bietet eine generische Lösung dieses Problems. Diese Recovery- Protokolle sorgen für die Fehlermaskierung und ermöglichen somit, dass Entwickler ihre ganze Konzentration der Anwendungslogik widmen können. Dies trägt zu einer erheblichen Beschleunigung des Entwicklungsprozesses bei. Diese Dissertation besteht aus zwei wesentlichen Teilen. Der erste Teil widmet sich der formalen Spezifikation der Recovery-Protokolle unter Verwendung des Formalismus der State-and-Activity-Charts. Darüber hinaus entwickeln wir die formale Spezifikation einer Web-Service-Anwendung, die außer den Recovery-Protokollen keine weitere Fehlerbehandlung beinhaltet. Die formalen Spezifikationen werden in Bezug auf kritische Sicherheits- und Lebendigkeitseigenschaften, die als temporallogische Formeln angegeben sind, mittels "Model Checking" verifiziert. Unter anderem wird somit mathematisch bewiesen, dass jede Operation eines Endbenutzers genau einmal ausgeführt wird. Der zweite Teil der Dissertation beschreibt die Implementierung der Recovery- Protokolle im Rahmen einer beliebig verteilbaren Web-Service-Plattform EOS, die auf weit verbreiteten Web-Produkten aufbaut: dem Browser "Microsoft Internet Explorer" und dem PHP-Anwendungsserver

    Implementasi Dan Evaluasi Kinerja Disaster Recovery dalam Lingkungan Data Center Berbasis Cloud - Implementation And Evaluation Of Disaster Recovery Performance In Cloud-Based Data Center Environment

    Get PDF
    Meningkatnya pertumbuhan penggunaan internet diimbangi dengan tingginya permintaan pengguna atau penikmat layanan aplikasi agar aplikasi dapat diakses setiap waktu. Di zaman milenial ini, ketersedian aplikasi menjadi raja dari segala sesuatu, jika aplikasi tidak dapat diakses bahkan dalam satu menit akan menjadi masalah besar bagi pemilik bisnis dan mengancam reputasi perusahaan terutama yang membutuhkan ketersediaan aplikasi selama 24 jam contohnya aplikasi perbankan, aplikasi e-commerse, dsb. Untuk menjamin ketersediaan aplikasi dan sistem mayoritas perusahaan yang memiliki infrastruktur tradisional atau private server memiliki disaster planning mulai dari cara paling sederhana yaitu melakukan backup secara berkala maupun membangun sistem Disaster Recovery secara realtime. Saat ini, ada banyak penyedia cloud yang menawarkan layanan yang disebut DRaaS (Disaster Recovery as a Service) untuk memfasilitasi kebutuhan perusahaan yang ingin menjaga kelangsungan bisnis mereka. Banyaknya penyedia layanan cloud serta miripnya layanan yang ditawarkan membuat calon pengguna bingung penyedia cloud mana yang sesuai dengan sistem bisnis mereka. Penelitian ini memperkenalkan metode desain implementasi DRaaS dari dua penyedia layanan cloud berbeda untuk mendapatkan parameter RPO dan RTO yang nantinya dijadikan pertimbangan dalam memilih layanan DRaaS. Hasil dari penelitian ini adalah sebuah sistem disaster recovery yang menggunakan Google Cloud dan Amazon Web Service sebagai secondary server yang menghasilkan nilai RPO 3 menit. Sistem DRaaS ini telah diuji untuk melakukan failover dengan nilai RTO 9,6 detik untuk Google Cloud dan 15,4 detik untuk Amazon Web Service. ========================================================================================================== The increasing growth of Internet use is offset by the high demand of users or connoisseurs of application services for applications to be accessed at any time. In this millennial era, the availability of applications to be the king of everything, if the application can not be accessed even within a minute will be a big problem for business owners and threaten the reputation of the company especially those requiring 24 hours application availability for example banking applications, e-commerce applications, etc. To ensure the availability of applications and systems the majority of companies that have a traditional infrastructure or private server has a disaster planning starting from the simplest way of doing regular backups and build system Disaster Recovery in realtime. Currently, there are many cloud providers offering services called DRaaS (Disaster Recovery as a Service) to facilitate the needs of companies that want to keep their business going. The number of cloud service providers and similar services offered to make prospective users confused which cloud provider that suits their business systems. This research introduces the design method of DRaaS implementation from two different cloud service providers to get RPO and RTO parameters which will be taken into consideration in choosing DRaaS service. The results of this study is a disaster recovery system that uses Google Cloud and Amazon Web Service as a secondary server that produces a 3 minute RPO value. This DRaaS system has been tested for failover with RTO value 9.6 seconds for Google Cloud and 15.4 seconds for Amazon Web Service

    Towards an Enhanced Protocol for Improving Transactional Support in Interoperable Service Oriented Application-Based (SOA-Based) Systems

    Get PDF
    When using a shared database for distributed transactions, it is often difficult to connect business processes and softwarecomponents running on disparate platforms into a single transaction. For instance, one platform may add or update data, and thenanother platform later access the changed or added data. This severely limits transactional capabilities across platforms. Thissituation becomes more acute when concurrent transactions with interleaving operations spans across different applications andresources. Addressing this problem in an open, dynamic and distributed environment of web services poses special challenges,and still remains an open issue. Following the broad adoption and use of the standard Web Services Transaction Protocols,requirements have grown for the addition of extended protocols to handle problems that exist within the context of interoperableservice-oriented applications. Most extensions to the current standard WS-Transaction Protocols still lack proper mechanisms forerror-handling, concurrency control, transaction recovery, consolidation of multiple transaction calls into a single call, and securereporting and tracing for suspicious activities. In this research, we will first extend the current standard WS-TransactionFramework, and then propose an enhanced protocol (that can be deployed within the extended framework) to improvetransactional and security support for asynchronous applications in a distributed environment. A hybrid methodology whichincorporates service-oriented engineering and rapid application development will be used to develop a procurement system(which represents an interoperable service-oriented application) that integrates our proposed protocol. We will empiricallyevaluate and compare the performance of the enhanced protocol with other conventional distributed protocols (such as 2PL) interms of QoS parameters (throughput, response time, and resource utilization), availability of the application, databaseconsistency, and effect of locking on latency, among other factors.Keywords: Database, interoperability, security, concurrent transaction, web services, protocol, service-oriente

    Data Security on Backed Up Data and Recovery in Cloud Storage

    Get PDF
    Cloud provides its users with different services. Every day during cloud computing, a great deal of data is generated. On the cloud servers, the data is being saved. A recovery tool should be created in case this data is lost from the server. One such setup is described in this consideration. The proposed approach would enable simultaneous data storage on the inaccessible server and the cloud server. The information is returned from the farther server when the key record is misplaced. Secret key security is ensured so that the authentication is secure and authorized by the user based on the attributes of backup and recovery. A cloud is a distinct Information Technology infrastructure designed to provide its users with different facilities that can be gotten to remotely. Cloud alludes to the term arrange of systems that back get to decentralized Data Innovation assets. Cloud employments the Web as well as the inaccessible central servers to manage consumers and businessmen's data and applications. This helps to save the consumer from costs and room problems. It is a technology that makes data collection, processing, and bandwidth much more centralized. A cloud encompasses a certain restrain, because it could be a certain system utilized to supply assets remotely. The Web offers get to an endless number of clouds. Though the Web offers free get to a few web-based Information Technology services, a cloud is generally private and provides wireless data resources. Much of the Internet is accessible via the web service to Information Technology services. On the other hand, the Information Technology services supplied by cloud environments are intended to provide back-end computing capabilities and browser access.

    Supporting Young People With Psychosis In The Community: An ICT Enabled Relapse Prevention Tool

    Get PDF
    Psychotic disorders are the most disabling of all mental illnesses and place a heavy demand on limited mental health services. Consequently, this research aims to develop novel approaches to care which are less demanding of public resources. This research-in-progress is based in an innovative youth mental health service in Australia. It presents a model for a web-based platform which provides support for relapse prevention in young people with first-episode psychosis (FEP). This study combines Information Systems and Psychology theory and research to develop an advanced web-based interactive psychosocial intervention for relapse prevention and recovery in FEP. While web-based applications to support schizophrenia, depression and anxiety have been researched such approaches have not been applied to the problem of relapse prevention in young people with FEP. The research uses focus groups to study case managers, clients of the support organisation and usability experts to inform an initial prototype which has then been presented to a group of clients for evaluation. It concludes that an intervention based on intelligent technologies which combine social networking and web-based treatment to promote independent home based care would best suit the characteristics of the target group and should be tested in large-scale in the community

    Investigation into Mobile Learning Framework in Cloud Computing Platform

    Get PDF
    Abstract—Cloud computing infrastructure is increasingly used for distributed applications. Mobile learning applications deployed in the cloud are a new research direction. The applications require specific development approaches for effective and reliable communication. This paper proposes an interdisciplinary approach for design and development of mobile applications in the cloud. The approach includes front service toolkit and backend service toolkit. The front service toolkit packages data and sends it to a backend deployed in a cloud computing platform. The backend service toolkit manages rules and workflow, and then transmits required results to the front service toolkit. To further show feasibility of the approach, the paper introduces a case study and shows its performance
    corecore