期刊文献+

基于中间件的运行时监测与分析框架 被引量:2

Middleware Based Runtime Monitoring and Analyzing Framework
下载PDF
导出
摘要 运行时刻软件的监测与分析不仅可以提高软件质量,也是软件自适应性的基础.本文提出了基于模式的声明式约束描述方法,以此为基础,在J2EE中间件PKUAS上开发了运行时监测与分析框架,其最大的特点是探针的灵活部署和监测面向业务逻辑的约束.最后,阐述了框架的实现和相关实验的效果. Runtime software monitoring and analyzing is not only the approach to improve the quality of software, but also the basis of adaptive software. This paper proposes a pattern-based declarative approach to specify constraints. Based on this approach we implemented a runtime monitoring and analyzing framework on J2EE middleware PKUAS. The most special points of the framework are the flexibility of deploying probes and business logic oriented monitoring. In the end, the paper describes the implementation details and evaluation result of the framework.
出处 《电子学报》 EI CAS CSCD 北大核心 2007年第B12期124-128,共5页 Acta Electronica Sinica
基金 国家自然基金重大项目(No.90412001) 国家863高技术研究展计划(No.2006AA01Z175)
关键词 运行时监测分析 约束描述 约束定义语言 中间件 监测框架 runtirne monitoring and analysis description of constraint constraint definition Language middleware monitoring framework
  • 相关文献

参考文献13

  • 1Klaus Havelund, Grigore Rosu. Monitoring Java Programs with Java PathExplorer[R]. RIACS Technical Report 01.19,2001.
  • 2Nelly Delgado, Ann Quiroz Gates, Steve Roach. A taxonomy and catalog of runtime software-fault monitoring tools [J]. IEEE Transactions on Software Engineering, 2004,30(12) :859 - 872.
  • 3Jeffrey Kephart,David Chess. The vision of autonomic computing[ J]. IEEE Computer, 2003,36( 1 ) :41 - 50.
  • 4Peyman Oreizy, Nenad Medvidovic, Richard Taylor, et al. An architecture-based approach to serf-adaptive software[J]. IEEE Intelligent Systems, 1999,14 (3) :54 - 62.
  • 5Zheng Li, Yah Jin, Jun Han. A runlime monitoring and validation framework for Web service interactions[ A]. Proceedings of the Australian Software Engineering Conference[ C ]. Washington, DC: IEEE Computer Society, 21306.70 - 79.
  • 6Luciano Baresi, Sam Guinea. Towards dynamic monitoring of WS-BPEL processes [A]. Lecture Notes in Computer Science [C]. Heidelberg: Springer Berlin, 2005.269 - 282.
  • 7M Kim, S Kannan, I Lee, O Sokolsky. Java-MaC: a run-time assurance tool for Java programs[ J] .Formal Methods in System Design,2004,24(2): 129 - 155.
  • 8Feng Chen,Marcelo D' Amorim, Grigore Rosu. Monitoring-oriented Programming: a Tool-Supported Methodology for Higher Quality Object-Oriented Software[R]. University of Illinois at Urbana-Champaign, 2004.
  • 9P Zave. Classification of research efforts in requirements engineering[J]. ACM Computing Surveys, 1997, 29(4) :315 - 321.
  • 10Marry Shaw. Troth vs knowledge: the difference between what a component does and what we know it does[A] .Proceedings of the 8th International Workshop on Software Specification and Design [C]. Washington, DC: IEEE Computer Society, 1996. 181 - 185.

二级参考文献2

共引文献42

同被引文献21

  • 1马浩海,谢冰,麻志毅,张能斌,邵维忠.PKUMoDEL:模型驱动的开发和语言家族支持环境[J].计算机研究与发展,2007,44(4):686-692. 被引量:6
  • 2Dwyer M,Avrunin G,Corbett J.Patterns in property specifications for finite-state verification[C] //Proc of ICSE99.Washington,DC:IEEE Computer Society,1999:411-420.
  • 3Wang Qianxiang,Li Min,Meng Na,et al.A pattern-based constraint description approach for Web services[C] //Proc of QSIC07.Washington,DC:IEEE Computer Society,2007:60-69.
  • 4Wang Qianxiang,Mathur A.Interceptor based constraint violation detection[C] //Proc of ECBS05.Washington,DC:IEEE Computer Society,2005:457-464.
  • 5Avizienis A,Laprie J,Randell B,et al.Basic concepts and taxonomy of dependable and secure computing[J].IEEE Trans on Dependable and Secure Computing,2004,1(1):11-33.
  • 6Dawson D,Desmarais R,Kienle H,et al.Monitoring in adaptive systems using reflection[C] //Proc of the 2008 Int Workshop on Software Engineering for Adaptive and Self-Managing Systems.New York:ACM,2008:81-88.
  • 7IEEE Computer Society Professional Practices Committee.Guide to the Software Engineering Body of Knowledge[EB/OL].[2008-09-15].http://www.swebok.org/ironman/pdf/SWEBOK_Guide_2004.pdf.
  • 8Zave P.Classification of research efforts in requirements engineering[C] //Proc of RE95.Washington,DC:IEEE,1995:214-216.
  • 9Wikipedia.Runtime verification[EB/OL].[2008-09-16].http://en.wikipedia.org/wiki/Runtime_verification.
  • 10Delgado N,Gates A,Roach S.A taxonomy and catalog of runtime software-fault monitoring tools[J].IEEE Trans on Software Engineering,2004,30(12):859-872.

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部