Distributed Component

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 102210 Experts worldwide ranked by ideXlab platform

Samuel Kounev - One of the best experts on this subject based on the ideXlab platform.

  • Automated extraction of architecture-level performance models of Distributed Component-based systems
    2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011
    Co-Authors: Fabian Brosig, Nikolaus Huber, Samuel Kounev
    Abstract:

    Modern enterprise applications have to satisfy increasingly stringent Quality-of-Service requirements. To ensure that a system meets its performance requirements, the ability to predict its performance under different configurations and workloads is essential. Architecture-level performance models describe performance-relevant aspects of software architectures and execution environments allowing to evaluate different usage profiles as well as system deployment and configuration options. However, building performance models manually requires a lot of time and effort. In this paper, we present a novel automated method for the extraction of architecture-level performance models of Distributed Component-based systems, based on monitoring data collected at run-time. The method is validated in a case study with the industry-standard SPECjEnterprise2010 Enterprise Java benchmark, a representative software system executed in a realistic environment. The obtained performance predictions match the measurements on the real system within an error margin of mostly 10-20 percent.

  • ASE - Automated extraction of architecture-level performance models of Distributed Component-based systems
    2011 26th IEEE ACM International Conference on Automated Software Engineering (ASE 2011), 2011
    Co-Authors: Fabian Brosig, Nikolaus Huber, Samuel Kounev
    Abstract:

    Modern enterprise applications have to satisfy increasingly stringent Quality-of-Service requirements. To ensure that a system meets its performance requirements, the ability to predict its performance under different configurations and workloads is essential. Architecture-level performance models describe performance-relevant aspects of software architectures and execution environments allowing to evaluate different usage profiles as well as system deployment and configuration options. However, building performance models manually requires a lot of time and effort. In this paper, we present a novel automated method for the extraction of architecture-level performance models of Distributed Component-based systems, based on monitoring data collected at run-time. The method is validated in a case study with the industry-standard SPECjEnterprise2010 Enterprise Java benchmark, a representative software system executed in a realistic environment. The obtained performance predictions match the measurements on the real system within an error margin of mostly 10 -- 20 percent.

  • performance modeling and evaluation of Distributed Component based systems using queueing petri nets
    IEEE Transactions on Software Engineering, 2006
    Co-Authors: Samuel Kounev
    Abstract:

    Performance models are used increasingly throughout the phases of the software engineering lifecycle of Distributed Component-based systems. However, as systems grow in size and complexity, building models that accurately capture the different aspects of their behavior becomes a more and more challenging task. In this paper, we present a novel case study of a realistic Distributed Component-based system, showing how queueing Petri net models can be exploited as a powerful performance prediction tool in the software engineering process. A detailed system model is built in a step-by-step fashion, validated, and then used to evaluate the system performance and scalability. Along with the case study, a practical performance modeling methodology is presented which helps to construct models that accurately reflect the system performance and scalability characteristics. Taking advantage of the modeling power and expressiveness of queueing Petri nets, our approach makes it possible to model the system at a higher degree of accuracy, providing a number of important benefits

Heiko Krumm - One of the best experts on this subject based on the ideXlab platform.

  • trust adapted enforcement of security policies in Distributed Component structured applications
    International Symposium on Computers and Communications, 2001
    Co-Authors: Peter Herrmann, Heiko Krumm
    Abstract:

    Software Component technology on the one hand supports the cost-effective development of specialized applications. On the other hand, however it introduces special security problems. Some major problems can be solved by the automated run-time enforcement of security policies. Each Component is controlled by a wrapper which monitors the Component's behavior and checks its compliance with the security behavior constraints of the Component's employment contract. Since control functions and wrappers can cause substantial overhead, we introduce trust-adapted control functions where the intensity of monitoring and behavior checks depends on the level of trust, the Component, its hosting environment, and its vendor have currently in the eyes of the application administration. We report on wrappers and a trust information service, outline the embedding security model and architecture, and describe a Java Bean based experimental implementation.

  • ISCC - Trust-adapted enforcement of security policies in Distributed Component-structured applications
    Proceedings. Sixth IEEE Symposium on Computers and Communications, 2001
    Co-Authors: Peter Herrmann, Heiko Krumm
    Abstract:

    Software Component technology on the one hand supports the cost-effective development of specialized applications. On the other hand, however it introduces special security problems. Some major problems can be solved by the automated run-time enforcement of security policies. Each Component is controlled by a wrapper which monitors the Component's behavior and checks its compliance with the security behavior constraints of the Component's employment contract. Since control functions and wrappers can cause substantial overhead, we introduce trust-adapted control functions where the intensity of monitoring and behavior checks depends on the level of trust, the Component, its hosting environment, and its vendor have currently in the eyes of the application administration. We report on wrappers and a trust information service, outline the embedding security model and architecture, and describe a Java Bean based experimental implementation.

Peter Herrmann - One of the best experts on this subject based on the ideXlab platform.

  • formal security policy verification of Distributed Component structured software
    Formal Techniques for (Networked and) Distributed Systems, 2003
    Co-Authors: Peter Herrmann
    Abstract:

    Component-structured software, which is coupled from independently developed software Components, introduces new security problems. In particular, a Component may attack Components of its environment and, in consequence, spoil the application incorporating it. Therefore, to guard a system, we constrain the behavior of a Component by ruling out the transmission of events between Components which may cause harm. Security policies describing the behavior constraints are formally specified and, at runtime, so-called security wrappers monitor the interface traffic of Components and check it for compliance with the specifications. Moreover, one can also use the specifications to prove formally that the combinations of the Component security policies fulfill certain security properties of the complete Component-structured application. A well-known method to express system security properties is access control which can be modelled by means of the popular Role Based Access Control (RBAC) method.

  • trust adapted enforcement of security policies in Distributed Component structured applications
    International Symposium on Computers and Communications, 2001
    Co-Authors: Peter Herrmann, Heiko Krumm
    Abstract:

    Software Component technology on the one hand supports the cost-effective development of specialized applications. On the other hand, however it introduces special security problems. Some major problems can be solved by the automated run-time enforcement of security policies. Each Component is controlled by a wrapper which monitors the Component's behavior and checks its compliance with the security behavior constraints of the Component's employment contract. Since control functions and wrappers can cause substantial overhead, we introduce trust-adapted control functions where the intensity of monitoring and behavior checks depends on the level of trust, the Component, its hosting environment, and its vendor have currently in the eyes of the application administration. We report on wrappers and a trust information service, outline the embedding security model and architecture, and describe a Java Bean based experimental implementation.

  • ISCC - Trust-adapted enforcement of security policies in Distributed Component-structured applications
    Proceedings. Sixth IEEE Symposium on Computers and Communications, 2001
    Co-Authors: Peter Herrmann, Heiko Krumm
    Abstract:

    Software Component technology on the one hand supports the cost-effective development of specialized applications. On the other hand, however it introduces special security problems. Some major problems can be solved by the automated run-time enforcement of security policies. Each Component is controlled by a wrapper which monitors the Component's behavior and checks its compliance with the security behavior constraints of the Component's employment contract. Since control functions and wrappers can cause substantial overhead, we introduce trust-adapted control functions where the intensity of monitoring and behavior checks depends on the level of trust, the Component, its hosting environment, and its vendor have currently in the eyes of the application administration. We report on wrappers and a trust information service, outline the embedding security model and architecture, and describe a Java Bean based experimental implementation.

Fabian Brosig - One of the best experts on this subject based on the ideXlab platform.

  • Automated extraction of architecture-level performance models of Distributed Component-based systems
    2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011
    Co-Authors: Fabian Brosig, Nikolaus Huber, Samuel Kounev
    Abstract:

    Modern enterprise applications have to satisfy increasingly stringent Quality-of-Service requirements. To ensure that a system meets its performance requirements, the ability to predict its performance under different configurations and workloads is essential. Architecture-level performance models describe performance-relevant aspects of software architectures and execution environments allowing to evaluate different usage profiles as well as system deployment and configuration options. However, building performance models manually requires a lot of time and effort. In this paper, we present a novel automated method for the extraction of architecture-level performance models of Distributed Component-based systems, based on monitoring data collected at run-time. The method is validated in a case study with the industry-standard SPECjEnterprise2010 Enterprise Java benchmark, a representative software system executed in a realistic environment. The obtained performance predictions match the measurements on the real system within an error margin of mostly 10-20 percent.

  • ASE - Automated extraction of architecture-level performance models of Distributed Component-based systems
    2011 26th IEEE ACM International Conference on Automated Software Engineering (ASE 2011), 2011
    Co-Authors: Fabian Brosig, Nikolaus Huber, Samuel Kounev
    Abstract:

    Modern enterprise applications have to satisfy increasingly stringent Quality-of-Service requirements. To ensure that a system meets its performance requirements, the ability to predict its performance under different configurations and workloads is essential. Architecture-level performance models describe performance-relevant aspects of software architectures and execution environments allowing to evaluate different usage profiles as well as system deployment and configuration options. However, building performance models manually requires a lot of time and effort. In this paper, we present a novel automated method for the extraction of architecture-level performance models of Distributed Component-based systems, based on monitoring data collected at run-time. The method is validated in a case study with the industry-standard SPECjEnterprise2010 Enterprise Java benchmark, a representative software system executed in a realistic environment. The obtained performance predictions match the measurements on the real system within an error margin of mostly 10 -- 20 percent.

You Jinyuan - One of the best experts on this subject based on the ideXlab platform.

  • A Distributed Component Coordination Model Based on Petri Nets
    Journal of Software, 2002
    Co-Authors: You Jinyuan
    Abstract:

    Coordination is one of the basic problems in Distributed Component systems. But up to now this problem has not been solved yet properly. According to the real application, the Concerto model is proposed, which is based on Petri net. Expanding the semantics of Petri net, Concerto model introduces control buffer and data buffer, which reflect the control dependency and data dependency respectively, to unify the present control-driven and data-driven coordination models. For the execution of Concerto model, driving mode, action rule and Concerto engine are put forward. There are four kind of driving modes, depended on operation time, minimal time, maximal time and average time respectively. They are useful in application domains such as real-time systems, flow controlling, and task scheduling. As the core of model execution, Concerto engine controls the coordination of Distributed Component system by following certain arbitration rule, which resolves the deadlock and starvation.

  • The Visual Environment for Distributed Component Coordination
    Computer Engineering, 2000
    Co-Authors: You Jinyuan
    Abstract:

    The coordination of Distributed Components is an important issue in the development of Component-based Distributed systems. According to the requirements of practical applications, we propose the Concerto model, which is based on the theory of Petri nets and synthesizes two present coordination models: control-driven and data-driven. It binds the transition of Petri nets with event, condition, poeration and time, and therefore provides an approach to interact with computing systems. Based oil Concerto model, we realize all environment for Distributed Component coordination. which tverifies the Distributed Components systems correctness and then interacts, with the computing system to control the execution of Distributed Components.