91 research outputs found
Recommended from our members
Coverage Based Testing for Service Level Agreements
Service level agreements (SLAs) are typically used to specify rules regarding the consumption of services that are agreed between the providers of the service-based applications (SBAs) and their consumers. An SLA includes a list of terms that contain the guarantees that must be fulfilled during the provisioning and consumption of the services. Since the violation of such guarantees may lead to the application of potential penalties, it is important to assure that the SBA behaves as expected. In this paper, we propose a proactive approach to test SLA-aware SBAs by means of identifying test requirements, which represent situations that are relevant to be tested. To address this issue, we define a four-valued logic that allows evaluating both the individual guarantee terms and their logical relationships. Grounded in this logic, we devise a test criterion based on the modified condition decision coverage (MCDC) in order to obtain a cost-effective set of test requirements from the structure of the SLA. Furthermore by analyzing the syntax and semantics of the agreement, we define specific rules to avoid non-feasible test requirements. The whole approach has been automated and applied over an eHealth case study
Recommended from our members
Identifying Test Requirements by Analyzing SLA Guarantee Terms
Service Level Agreements (SLAs) are used to specify the negotiated conditions between the provider and the consumer of services. In this paper we present a stepwise method to identify and categorize a set of test requirements that represent the potential situations that can be exercised regarding the specification of each isolated guarantee term of an SLA. This identification is addressed by means of devising a set of coverage levels that allow grading the thoroughness of the tests. The utilization of these test requirements would focus on twofold objectives: (1) the generation of a test suite that allows exercising the situations described in the test requirements and (2) the support for the derivation of a monitoring plan that checks the compliance of these requirements at runtime. The approach is illustrated over an eHealth case study
Proactive and reactive runtime service discovery: a framework and its evaluation
The identification of services during the execution of service-based applications to replace services in them that are no longer available and/or fail to satisfy certain requirements is an important issue. In this paper we present a framework to support runtime service discovery. This framework can execute service discovery queries in pull and push mode. In pull mode, it executes queries when a need for finding a replacement service arises. In push mode, queries are subscribed to the framework to be executed proactively, and in parallel with the operation of the application, in order to identify adequate services that could be used if the need for replacing a service arises. Hence, the proactive (push) mode of query execution makes it more likely to avoid interruptions in the operation of service-based applications when a service in them needs to be replaced at runtime. In both modes of query execution, the identification of services relies on distance-based matching of structural, behavioural, quality, and contextual characteristics of services and applications. A prototype implementation of the framework has been developed and an evaluation was carried out to assess the performance of the framework. This evaluation has shown positive results, which are discussed in the paper
Recommended from our members
A Data-informed Public Health Policy-Makers Platform
Hearing loss is a disease exhibiting a growing trend due to the number of factors, including but not limited to the mundane exposure to the noise and ever-increasing amount of older population. In the framework of a public health policymaking process, modeling of the hearing loss disease based on data is a key factor in alleviating the issues related to the disease issuing effective public health policies. First, the paper describes the steps of the data-driven policymaking process. Afterward, a scenario along with the part of the proposed platform, responsible for supporting policymaking are presented. With the aim of demonstrating the capabilities and usability of the platform for the policy-makers, some initial results of preliminary analytics are presented in a framework of a policy-making process. Ultimately, the utility of the approach is validated throughout the results of the survey which was presented to the health system policy-makers professionals involved in the policy development process in Croatia
Cerebellar transcranial magnetic stimulation: The role of coil type from distinct manufacturers
BACKGROUND: Stimulating the cerebellum with transcranial magnetic stimulation is often perceived as uncomfortable. No study has systematically tested which coil design can effectively trigger a cerebellar response with the least discomfort. OBJECTIVE: To determine the relationship between perceived discomfort and effectiveness of cerebellar stimulation using different coils: MagStim (70 mm, 110 mm-coated, 110-uncoated), MagVenture and Deymed. METHODS: Using the cerebellar-brain inhibition (CBI) protocol, we conducted a CBI recruitment curve with respect to each participant's maximum tolerated-stimulus intensity (MTI) to assess how effective each coil was at activating the cerebellum. RESULTS: Only the Deymed double-cone coil elicited CBI at low intensities (-20% MTI). At the MTI, the MagStim (110 mm coated/uncoated) and Deymed coils produced reliable CBI, whereas no CBI was found with the MagVenture coil. CONCLUSION: s: The Deymed double-cone coil was most effective at cerebellar stimulation at tolerable intensities. These results can guide coil selection and stimulation parameters when designing cerebellar TMS studies
Examination of silver-graphite lithographically printed resistive strain sensors
This paper reports the design and manufacture of three differing types of resistive strain sensitive structures fabricated using the Conductive Lithographic Film (CLF) printing process. The structures, utilising two inks prepared with silver and graphite particulates as the conductive phase, have been analysed to determine electrical and mechanical properties with respect to strain, temperature and humidity when deposited on four alternative substrate materials (GlossArt, PolyArt, Teslin and Melinex)
Recommended from our members
ASSERT4SOA: Toward Security Certification of Service-Oriented Applications
ASSERT4SOA project proposes machine readable certificates to be used to allow Web service requesters to automatically assess the security properties of Web services (and their providers) as certified by a trusted third party. This vision promises to open up an entire new market for certification services
Recommended from our members
Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework
The SERENITY monitoring framework offers mechanisms for diagnosing the causes of violations of security and dependability (S&D) properties and detecting potential violations of such properties, called “threats”. Diagnostic information and threat detection are often necessary for deciding what an appropriate reaction to a violation is and taking pre-emptive actions against predicted violations, respectively. In this chapter, we describe the mechanisms of the SERENITY monitoring framework which generate diagnostic information for violations of S&D properties and detecting threats
- …