期刊文献+

基于分形的软件衰退预测 被引量:2

Fractal-based Approach for Software Aging Prediction
下载PDF
导出
摘要 许多研究人员指出导致软件性能衰退的主要原因之一是系统资源的耗尽,而软件系统实时运行时采集到的系统资源耗费数据展示出了分形这一几何特征,因此应用了基于分形分析的方法,计算反映软件衰退状态的霍尔德指数,实现软件性能衰退的预测。首先改进和扩展了霍尔德指数计算算法,使得能够计算多维霍尔德指数;然后使用经典的统计方法预测软件衰退导致宕机的时间,接着用实验验证了改进的多维霍尔德指数计算算法的精度,最后使用软件运行中采集到的系统资源耗费数据进行了仿真实验,实验结果显示该算法有效的预测宕机时间,从而为执行软件自愈策略提供依据。 A number of recent studies have reported the phenomenon of "software aging", characterized by progressive performance degradation and a sudden crash/hang of a software system due to exhaustion of operating system resources, fragmentation and accumulation of errors. Because the data of resource usage collected from software system display fractal characteristics, a fractal-based method was adopted to calculate the holder exponent of resource usage for software aging. First, the existed algorithm was improved to calculate multidimensional holder exponent and check the improved algorithm's accuracy; then statistical method was adopted to predict the downtime of software system; finally the proposed method was tested using the performance parameters data collected from a realistic software system to evaluate the forecasting performance.
出处 《系统仿真学报》 EI CAS CSCD 北大核心 2007年第3期549-551,共3页 Journal of System Simulation
基金 国家自然科学基金(60273035) 国防科工委基础应用项目(K1704060511)
关键词 软件衰退 分形分析 时间序列 预测 软件自愈 software aging fractal analysis time series prediction software rejuvenation
  • 相关文献

参考文献9

  • 1Li L,Vaisyanathan,Trivedi.An Approach for Estimation of Software Aging in a Web Server[C]// Proceedings of ISESE.2002,91-102.
  • 2Huang Y,Kintala C,Kolettis N,et al.Software Rejuvenation:Analysis,Module and Applications[C]// Proceedings of the 25th Symposium on Fault Tolerant Computer System.Pasadena,CA:IEEE Computer Society,1995,381-390.
  • 3徐建,游静,陈昊,刘凤玉.基于NIS的异常检测算法[J].计算机科学,2005,32(4):140-143. 被引量:4
  • 4Xu Jian,You Jing,Liu Fengyu.A Fuzzy Rules based Approach for Performance Anomaly Detection[C]// Proceedings of Networking,Sensing and Control.2005,44-48.
  • 5Trivedi K,Vaidyanathan K.A Measurement-Based Model for Estimation of Resource Exhaustion in Operational Software Systems[C]// Proceedings of ISSRE.1999,84-94.
  • 6Mark Shereshevsky,Jonathan Crowell,Bojan Cukic.Software Aging and Multifractality of Memory Resources[C]// Proceedings of DSN.2003,721-730.
  • 7张鹏,廖建新,程时端.自相似业务量的多重分形分析[J].电子学报,2000,28(1):96-98. 被引量:12
  • 8Petros Maragos.Modulation and Fractal Models for Speech Analysis and Recognition[C]//Proceedings of COST-249 Meeting.1998,121-129.
  • 9Gilbert R O.Statistical Methods for Environmental Pollution Monitoring[Z].New York:John Wiley & Sons,Inc.1987.

二级参考文献18

  • 1谢和平,分形应用中的数学基础与方法,1996年
  • 2Matthew V, Mahoney, Philip K. Chan: Learning Rules for Anomaly Detection of Hostile Network Traffic. In: Proc. Third IEEE Intl. Conf. on Data Mining (ICDM), 2003. 601~604
  • 3Ye Nong, Chen Qiang. An Anomaly Detection Technique Based on A Chi-square Statistic for Detecting Intrusions into Information Systems, Quality and Reliability Engineering International, 2001,17(2) :105~112
  • 4Nguyen B V. An Application of Support Vector Machines to Anomaly Detection,CS681 (Research in Computer Science - Support Vector Machine)report, Fall 2002
  • 5Murphy P M, Aha D W. UCI Repository of machine learning databases, 1992
  • 6Forrest S, Hofmeyr S A. Immunology as information processing [A]. In: Segel L. A, Cohen I. R, eds. Design Principles for the Immune System and Other Distributed Autonomous Systems [C].USA: Oxford University Press, 2000
  • 7Forrest S,et al. Self-Nonself Discrimination in a Computer. In:Proc. of 1994 IEEE Symposium on Research in Security and Privacy, Los Alamos ,CA: IEEE Computer Society Press, 1994
  • 8D'haeseleer P. A Distributed Approach to Anomaly Detection.ACM Transactions on Information System Security,1997
  • 9Fayyad U M,Irani K B. Multi-Interval Discretization of Continuous-Valued Attributes for Classification Learning. In:Proc. of The Thirteenth intl. Joint Conf. on Artifical Intelligence, 1993. 1022~1027
  • 10Smith R E,et al. Searching for Diverse,Coperative Populations With Genetic Algorithm [J]. Evolutionary Computation, 1997,1(2):127~149

共引文献14

同被引文献6

  • 1Shereshevsky M,Cukic B,Crowel J,et al.Software Aging and Multifractality of Memory Resources[C] ∥Pceedings of DSN 2003.Los Alamitos,USA:IEEE Computer Society,2003:721-730.
  • 2Chen Xiu-E,Quan Quan,Jia Yun-Fei,et al.A Threshold Autoregressive Model for Software Aging[J].Service-Oriented System Engineering,2006:34-40.
  • 3Vaidyanathan K,Trivedi K S.A Measurement-based Model for Estimation of Software Aging in Operational Software Systems[C] ∥Proceedings of 1999 International Symposium on Software Reliability Enginering.Los Alamitos,USA:IEEE Computer Society,1999:84-93.
  • 4Li L,Vaidyanathan K,Trivedi K S.An Approach for Estimation of Software Aging in a Web Server[C] ∥Proceedings of 2002 International Symposium on Empirical Software Engineering.Los Alamitos,USA:IEEE Computer Society,2002:91-100.
  • 5谢幼琼,顾圣平.城市用水时间序列的Hurst指数研究[J].水电能源科学,2012,30(12):27-29. 被引量:4
  • 6邹柏贤,刘强.基于ARMA模型的网络流量预测[J].计算机研究与发展,2002,39(12):1645-1652. 被引量:107

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部