期刊文献+

URMG: Enhanced CBMG-Based Method for Automatically Testing Web Applications in the Cloud 被引量:2

URMG: Enhanced CBMG-Based Method for Automatically Testing Web Applications in the Cloud
原文传递
导出
摘要 To satisfy the rapid growth of cloud technologies, a large number of web applications have been developed and deployed, and these applications are being run in clouds. Due to the scalability provided by clouds, a single web application may be concurrently visited by several millions or billions of users. Thus, the testing and performance evaluations of these applications are increasingly important. User model based evaluations can significantly reduce the manual work required, and can enable us to determine the performance of applications under real runtime environments. Hence, it has become one of the most popular evaluation methods in both industry and academia. Significant efforts have focused on building different kinds of models using mining web access logs, such as Markov models and Customer Behavior Model Graph (CBMG). This paper proposes a new kind of model, named the User Representation Model Graph (URMG), which is built based on CBMG. It uses an algorithm to refine CBMG and optimizes the evaluations execution process. Based on this model, an automatic testing and evaluation system for web applications is designed, implemented, and deployed in our test cloud, which is able to execute all of the analysis and testing operations using only web access logs. In our system, the error rate caused by random access to applications in the execution phase is also reduced, and the results show that the error rate of the evaluation that depends on URMG is 50% less than that which depends on CBMG. To satisfy the rapid growth of cloud technologies, a large number of web applications have been developed and deployed, and these applications are being run in clouds. Due to the scalability provided by clouds, a single web application may be concurrently visited by several millions or billions of users. Thus, the testing and performance evaluations of these applications are increasingly important. User model based evaluations can significantly reduce the manual work required, and can enable us to determine the performance of applications under real runtime environments. Hence, it has become one of the most popular evaluation methods in both industry and academia. Significant efforts have focused on building different kinds of models using mining web access logs, such as Markov models and Customer Behavior Model Graph (CBMG). This paper proposes a new kind of model, named the User Representation Model Graph (URMG), which is built based on CBMG. It uses an algorithm to refine CBMG and optimizes the evaluations execution process. Based on this model, an automatic testing and evaluation system for web applications is designed, implemented, and deployed in our test cloud, which is able to execute all of the analysis and testing operations using only web access logs. In our system, the error rate caused by random access to applications in the execution phase is also reduced, and the results show that the error rate of the evaluation that depends on URMG is 50% less than that which depends on CBMG.
出处 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第1期65-75,共11页 清华大学学报(自然科学版(英文版)
基金 supported by the National Natural Science Foundation of China(No.61232008) the National High-Tech Research and Development(863)Program of China(Nos.2013AA01A213 and 2013AA01A208) Chinese Universities Scientific Fund(No.2013TS094) Guangzhou Science and Technology Program(No.2012Y2-00040)
关键词 CLOUD web application performance evaluation customer behavior user representation cloud web application performance evaluation customer behavior user representation
  • 相关文献

参考文献20

  • 1G. Banga and P. Druschel, Measuring the capacity of a web server under realistic loads, World Wide Web, vol. 2, pp. 69- 83,1999.
  • 2P. Antonellis, C. Makris, and N. Tsirakis, Algorithms for clustering clickstream data, Information Processing Letters, vol. 109, pp. 381-385, 2009.
  • 3M. F. Arlitt and C. L. Williamson, Web server workload characterization: The search for invariants, in Proceedings of Performance Evaluation Review ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 1996, pp. 126-137.
  • 4A. Vakali, J. Pokorny, and T. Dalamagas, An overview of web data clustering practices, in Proceedings of Current Trends in Database Technology - EDBT 2004 Workshops, Berlin, Germany, 2004, pp. 597-606.
  • 5R. Arora, M. R. Gupta, A. Kapila, and M. Fazel, Clustering by left-stochastic matrix factorization, in Proceedings of 28th International Conference on Machine Learning, Bellevue, WA, USA, 2011, pp. 761-768.
  • 6R. Cooley, R. Mobasher, and J. Srivastava, Data preparation for mining World Wide Web browsing patterns, Knowledge and Information Systems, vol. I, pp. 5-32, 1999.
  • 7W. Kwedlo and P. Iwanowicz, Using genetic algorithm for selection of initial cluster centers for the K -means method, in Proceedings of Artificial Intelligence and Soft Computing, ICAISC 2010, Berlin, Germany, 2010, pp. 165-172.
  • 8C. Bystroff, S. DeLuca, and C. N. McDaniel, ECOME: A simple model for an evolving consumption web, in Proceedings or IEEE Computational Systems Bioinformatics Conference, Workshops and Poster Abstracts, Stanford, CA, USA, 2005, pp. 260-26\.
  • 9J. Zhao, W. Zhang, and Y. Liu, Improved K-means cluster algorithm in telecommunications enterprises customer segmentation, in Proceedings or IEEE International Conference on Information Theory and Information Security, Piscataway, NJ, USA, 2010, pp. 167-169.
  • 10M. T. Lu and W. L. Yeung, A framework for effective commercial web application development, Internet Research: Electronic Networking Applications and Policy, vol. 8, pp. 166-173, 1998.

同被引文献42

  • 1张万山,肖瑶,梁俊杰,余敦辉.基于主题聚类的Web资源个性化推荐研究[J].微电子学与计算机,2015,32(4):35-39. 被引量:6
  • 2戴臻,费洪晓,李俊,谢文彪,肖新华.基于特定模式树的用户行为关联规则挖掘算法[J].计算机系统应用,2007,16(5):56-59. 被引量:7
  • 3刘蓉,陈鹏,张兴艳.个性化网页推荐中基于神经网络的自适应用户模型研究[J].电子测量技术,2007,30(4):165-168. 被引量:2
  • 4黄书剑.时序数据上的数据挖掘.软件学报,2004,15(1):1-7.
  • 5左琳.神经网络及在网络用户行为分析中的应用研究[D].电子科技大学,2011.
  • 6何茁菲基于微博用户行为的兴趣模型构建和可视化方法研究[D].哈尔滨工业大学,2013.
  • 7网站用户分析的五大常规方法[EB/OL].[2014-12-03].http://www.admin5.coffl/article/20100726/254679.shtml.
  • 8Wu, Y., Zhou C, Chen M, et al. Human comment dynamics in on-line social systems [J]. Physica A: Statistical Mechanics and its Applications, 2010, 389(24): 5832-5837.
  • 9Yu, J., Hu ., Yu M.,et al. Analyzing netizens' view and reply behaviors on the forum [J]. Physica A: Statistical Mechanics and its Applications, 2010, 389(16): 3267-3273.
  • 10Oh S.H., Lee W.S., An anomaly intrusion detection method by clustering normal user behavior[J]. Computers & Security, 2003.22(7): 596-612.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部