Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

BACKGROUND

Before beginning the discussion on using dataflow models to mine system execution traces and validate QoS properties, first let us understand existing techniques used to validate enterprise distributed system QoS properties. This section therefore summarizes current uses of system execution traces, data mining, and dataflow modeling, and conventional techniques for validating distributed systems QoS properties.

System Execution Traces

System execution traces can capture both metrics and the state of a system. Keeping this in mind, Chang and Ren (2007) has investigated techniques for automating the functional validation of test using execution traces. Likewise, Moe and Carr (2001) discuss techniques for understanding and detecting functional anomalies in distributed systems by reconstructing and analyzing (or data mining) system execution traces. Irrespective of how system execution traces are used, their key advantage to validating functional concerns is platform, architecture, and language independence. Therefore this helps to increase the quality of the overall solution (Boehm, Brown, & Lipow, 1976) so that it is applicable across different application domains.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint