期刊文献+

不完全事务行为踪迹标记研究 被引量:2

Research on Tokenizing Behavior Footprints of Incomplete Transaction
下载PDF
导出
摘要 研究不完全事务的行为踪迹标记问题,从软件交互行为本身出发,追踪分析事务产生的行为序列,为丢失标记的行为找到归属.本文提出了在分布式环境下事务处理过程满足SMP的系统模型,采用状态划分算法对随机排序的各事务进行"剥离";用偶图匹配方法对分割得到的偶图子系统依MLR分别进行匹配;最后将匹配的结果拼接起来形成完整的行为踪迹序列,提高了对监测信息的使用效率.通过仿真实验证实了本方法在标记不完全事务上的有效性和准确性. The paper investigates the problem of tokenizing behavior footprints of incomplete transaction,starts from the software interactive behavior itself,tracks and analyses behavior sequences which generated by transactions,and finds the attribution for the behavior which lost token.We propose a system model in which transaction processing satisfied with the semi-Markov process under distributed environment,we use state division algorithm to strip transactions with random order,then,match the bipartite subsystems separately according to the maximum likelihood rule,finally,splice the matched results and form the complete transaction sequences,which improves the efficiency of the monitoring information.The simulation experiment has proved our method has both validity and accuracy in tokenizing incomplete transaction.
出处 《小型微型计算机系统》 CSCD 北大核心 2011年第8期1593-1598,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60773110)资助 湖南省自然科学基金项目(09JJ6087)资助 湖南省研究生创新基金项目(CX2009B200)资助 湖南省教育厅项目(09C316)资助
关键词 不完全事务 行为踪迹 状态划分 偶图匹配 incomplete transaction behavior footprints state division bipartite matching
  • 相关文献

参考文献2

二级参考文献49

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2王怀民,唐扬斌,尹刚,李磊.互联网软件的可信机理[J].中国科学(E辑),2006,36(10):1156-1169. 被引量:59
  • 3Windows Vista performance and reliability monitoring step-by-step guide[EB/OL]. (2007-10). http://technet2. microsoft. com/WindowsVista/en/library/ab3 b2cfc-b177-43ec-8a4d-Obfae62d88961033.mspx? mfr = true.
  • 4JONES C. Assessment and control of software risks [ M ]. Englewood Cliffs,NJ: Prentice Hall, 1994.
  • 5WALKER R J, BANIASSAD E L A, MURPHY G C. An inital assessment of aspect-oriented programming [ C ]//Proc of the 21 st International Conference on Software Engineering. 1999:120-130.
  • 6Wily technology' s ByteCode instrumentation adopted as industry standard in J2SETM 5.0 [ EB/OL]. ( 2007- 10). http ://www. sun. com/aboutsun/media/presskits/tiger/WilyJ2SErelease. pdf.
  • 7Introduction to the WebLogic diagnostics framework (WLDF) [ EB/ OL]. (2006-06) [2007-10]. http:// dev2dev.bea. com/ pub/a/ 2006/06/wldf. html.
  • 8[1]Standish Group. The CHAOS Report[R].Found at http://www. standishgroup. com. 1995.
  • 9[2]The Inquiry Board. Ariane 5 Flight 105 Inquiry Board Report [ R ].Paris: European Space Agency Press,July 1996.
  • 10[3]National Science,Technology Council (NSTC). America in the Age of Information: A Forum on Federal Information and Communications R&D[R]. Bethesda, Maryland, July 6 - 7,1995.

共引文献117

同被引文献30

  • 1陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(z1):1933-1938. 被引量:115
  • 2张尧学.透明计算:概念、结构和示例[J].电子学报,2004,32(F12):169-174. 被引量:48
  • 3Leonardo Mariani, Mauro Pezz, Oliviero Riganelli, Mauro Santom. SEIM: static extraction of interaction models[ A]. In- ternational Workshop on Software Engineering [ C ]. Cape Town, South Africa: IEEE Computer Society,2010.22- 28.
  • 4Christopher Ackermann, Mikael LindvaU, Rance Cleaveland.Towards behavioral reflexion models [ A ]. Reliability Society [ C]. Mysuru, India: m-Tl Computer Society,2009.175 - 184.
  • 5Jonathan E. Cook, Alexander L. Wolf. Discovering models of software processes from event-based data [ J].ACM Transac- tions on Software Engineering and Methodology, 1998,7(3 ): 215 - 249.
  • 6Kai-Yuan Cai,Bei-Bei Yin. Software execution processes as an evolving complex network[ J ]. Information Sciences, 2009, 179 (12) : 1903 - 1928.
  • 7Tao Li, Wci Pcng, Charles Pcrng, Sheng Ma, Haixun Wang. An integrated data-driven framework for computing system man- agcnnt[ J]. IEE Transactions on Systems,2010,40( 1 ) :90 - 99.
  • 8C-'hun ying Zlmo, Jun Kong, Kang mng. Program behavior discovery and verification: A graph grammar approach[ J]. 1EF.E Transactions on Software Engineering, 2010,36(3) : 431 - 447.
  • 9Anton ChuvAkin, GunnAr Peterson. How to doapplication log- ging fight[ J]. IF.F.E Computer and Reliability Societies,2010, 8(4) :82 - 85.
  • 10211en Li, Jun Feng Tian,Liu Yang.An improved software be- havior model in system call level and Irustwofiness evalua- tion[ J]. Information Technology Journal, 2011,10 ( 11 ) :2208 - 2213.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部