Temporal Violation Handling

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 54 Experts worldwide ranked by ideXlab platform

Xiao Liu - One of the best experts on this subject based on the ideXlab platform.

  • ICDS - A Novel Throughput Based Temporal Violation Handling Strategy for Instance-Intensive Cloud Business Workflows
    Communications in Computer and Information Science, 2020
    Co-Authors: Futian Wang, Xiao Liu, Wei Zhang, Cheng Zhang
    Abstract:

    Temporal Violations take place during the batch-mode execution of instance-intensive business workflows running in the cloud environments which may significantly affect the QoS (Quality of Service) of cloud workflow system. However, currently most research in the area of workflow Temporal QoS focuses on single scientific workflow rather than business workflow with a batch of parallel workflow instances. Therefore, how to handle Temporal Violations of instance-intensive cloud business workflows is a new challenge. To address such a problem, in this paper, we propose a novel throughput based Temporal Violation Handling strategy. Specifically, firstly we present a definition of throughput based Temporal Violation Handling point to determine where Temporal Violation Handling should be conducted, and secondly we design a new method for adding necessary cloud computing resources for recovering detected Temporal Violations. Experimental results show that our Temporal Violation Handling strategy can effectively handle Temporal Violations in cloud business workflow and thus guarantee satisfactory on-time completion rate.

  • a novel throughput based Temporal Violation Handling strategy for instance intensive cloud business workflows
    International Conference on the Digital Society, 2019
    Co-Authors: Futian Wang, Xiao Liu, Wei Zhang, Cheng Zhang
    Abstract:

    Temporal Violations take place during the batch-mode execution of instance-intensive business workflows running in the cloud environments which may significantly affect the QoS (Quality of Service) of cloud workflow system. However, currently most research in the area of workflow Temporal QoS focuses on single scientific workflow rather than business workflow with a batch of parallel workflow instances. Therefore, how to handle Temporal Violations of instance-intensive cloud business workflows is a new challenge. To address such a problem, in this paper, we propose a novel throughput based Temporal Violation Handling strategy. Specifically, firstly we present a definition of throughput based Temporal Violation Handling point to determine where Temporal Violation Handling should be conducted, and secondly we design a new method for adding necessary cloud computing resources for recovering detected Temporal Violations. Experimental results show that our Temporal Violation Handling strategy can effectively handle Temporal Violations in cloud business workflow and thus guarantee satisfactory on-time completion rate.

  • adaptive Temporal verification and Violation Handling for time constrained business cloud workflows
    International Conference on Service Oriented Computing, 2018
    Co-Authors: Xiao Liu, Haoyu Luo, Jin Liu, Bo Han, Yun Yang
    Abstract:

    To achieve on-time completion of time-constrained business cloud workflows, a large number of parallel cloud workflow instances need to be constantly monitored so that Temporal Violations (namely intermediate runtime delays) can be detected and handled timely. Over the last few years, many strategies have been proposed but they are not adaptive enough to capture the dynamic behaviors of business cloud workflows. In this paper, we introduce the idea of “adaptiveness” into our strategy design. Specifically, we first present an adaptive Temporal checkpoint selection strategy where the time intervals between checkpoints are adaptively determined at runtime, and then propose a matching Temporal Violation Handling strategy which can determine the required lifecycle of cloud services. The evaluation results demonstrate that our adaptive strategy can achieve both higher efficiency and better cost effectiveness compared with conventional strategies.

  • ICSOC - Adaptive Temporal verification and Violation Handling for time-constrained business cloud workflows
    Service-Oriented Computing, 2018
    Co-Authors: Haoyu Luo, Xiao Liu, Jin Liu, Bo Han, Yun Yang
    Abstract:

    To achieve on-time completion of time-constrained business cloud workflows, a large number of parallel cloud workflow instances need to be constantly monitored so that Temporal Violations (namely intermediate runtime delays) can be detected and handled timely. Over the last few years, many strategies have been proposed but they are not adaptive enough to capture the dynamic behaviors of business cloud workflows. In this paper, we introduce the idea of “adaptiveness” into our strategy design. Specifically, we first present an adaptive Temporal checkpoint selection strategy where the time intervals between checkpoints are adaptively determined at runtime, and then propose a matching Temporal Violation Handling strategy which can determine the required lifecycle of cloud services. The evaluation results demonstrate that our adaptive strategy can achieve both higher efficiency and better cost effectiveness compared with conventional strategies.

  • A sufficient and necessary Temporal Violation Handling point selection strategy in cloud workflow
    Future Generation Computer Systems, 2018
    Co-Authors: Yeguo Wang, Xiao Liu, Futian Wang, Haoyu Luo, Ying Xie, Yun Yang
    Abstract:

    Abstract To deliver high QoS (quality of service) for business process participants, workflow Temporal verification is conducted to provide satisfactory on-time completion rate of business process in the cloud. Temporal Violation Handling is the last task in a typical workflow Temporal verification framework to deal with detected time delays. However, there are very few existing studies regarding Temporal Violation Handling for cloud business workflows. In this paper, queuing theory is first employed to simulate time features of parallel workflow instances. Then, propagation effect based Temporal consistency model for business workflows and Temporal consistency model for workflow activities in the same queuing system are presented respectively. Finally, a promising Temporal Violation Handling point selection strategy for cloud business workflows is proposed and proved to satisfy the property of sufficiency and necessity. Compared with other representative strategies, experimental results show that our novel Handling point selection strategy can reduce the monitoring and Handling cost while maintaining the target on-time completion rate agreed between users and service providers.

Yun Yang - One of the best experts on this subject based on the ideXlab platform.

  • adaptive Temporal verification and Violation Handling for time constrained business cloud workflows
    International Conference on Service Oriented Computing, 2018
    Co-Authors: Xiao Liu, Haoyu Luo, Jin Liu, Bo Han, Yun Yang
    Abstract:

    To achieve on-time completion of time-constrained business cloud workflows, a large number of parallel cloud workflow instances need to be constantly monitored so that Temporal Violations (namely intermediate runtime delays) can be detected and handled timely. Over the last few years, many strategies have been proposed but they are not adaptive enough to capture the dynamic behaviors of business cloud workflows. In this paper, we introduce the idea of “adaptiveness” into our strategy design. Specifically, we first present an adaptive Temporal checkpoint selection strategy where the time intervals between checkpoints are adaptively determined at runtime, and then propose a matching Temporal Violation Handling strategy which can determine the required lifecycle of cloud services. The evaluation results demonstrate that our adaptive strategy can achieve both higher efficiency and better cost effectiveness compared with conventional strategies.

  • ICSOC - Adaptive Temporal verification and Violation Handling for time-constrained business cloud workflows
    Service-Oriented Computing, 2018
    Co-Authors: Haoyu Luo, Xiao Liu, Jin Liu, Bo Han, Yun Yang
    Abstract:

    To achieve on-time completion of time-constrained business cloud workflows, a large number of parallel cloud workflow instances need to be constantly monitored so that Temporal Violations (namely intermediate runtime delays) can be detected and handled timely. Over the last few years, many strategies have been proposed but they are not adaptive enough to capture the dynamic behaviors of business cloud workflows. In this paper, we introduce the idea of “adaptiveness” into our strategy design. Specifically, we first present an adaptive Temporal checkpoint selection strategy where the time intervals between checkpoints are adaptively determined at runtime, and then propose a matching Temporal Violation Handling strategy which can determine the required lifecycle of cloud services. The evaluation results demonstrate that our adaptive strategy can achieve both higher efficiency and better cost effectiveness compared with conventional strategies.

  • A sufficient and necessary Temporal Violation Handling point selection strategy in cloud workflow
    Future Generation Computer Systems, 2018
    Co-Authors: Yeguo Wang, Xiao Liu, Futian Wang, Haoyu Luo, Ying Xie, Yun Yang
    Abstract:

    Abstract To deliver high QoS (quality of service) for business process participants, workflow Temporal verification is conducted to provide satisfactory on-time completion rate of business process in the cloud. Temporal Violation Handling is the last task in a typical workflow Temporal verification framework to deal with detected time delays. However, there are very few existing studies regarding Temporal Violation Handling for cloud business workflows. In this paper, queuing theory is first employed to simulate time features of parallel workflow instances. Then, propagation effect based Temporal consistency model for business workflows and Temporal consistency model for workflow activities in the same queuing system are presented respectively. Finally, a promising Temporal Violation Handling point selection strategy for cloud business workflows is proposed and proved to satisfy the property of sufficiency and necessity. Compared with other representative strategies, experimental results show that our novel Handling point selection strategy can reduce the monitoring and Handling cost while maintaining the target on-time completion rate agreed between users and service providers.

  • Necessary and sufficient checkpoint selection for Temporal verification of high-confidence cloud workflow systems
    Science China Information Sciences, 2015
    Co-Authors: Futian Wang, Xiao Liu, Yun Yang
    Abstract:

    On-time completion is an important Temporal QoS (Quality of Service) dimension and one of the fundamental requirements for high-confidence workflow systems. In recent years, a workflow Temporal verification framework, which generally consists of Temporal constraint setting, Temporal checkpoint selection, Temporal verification, and Temporal Violation Handling, has been the major approach for the high Temporal QoS assurance of workflow systems. Among them, effective Temporal checkpoint selection, which aims to timely detect intermediate Temporal Violations along workflow execution plays a critical role. Therefore, Temporal checkpoint selection has been a major topic and has attracted significant efforts. In this paper, we will present an overview of work-flow Temporal checkpoint selection for Temporal verification. Specifically, we will first introduce the throughput based and response-time based Temporal consistency models for business and scientific cloud workflow systems, respectively. Then the corresponding benchmarking checkpoint selection strategies that satisfy the property of “necessity and sufficiency” are presented. We also provide experimental results to demonstrate the effectiveness of our checkpoint selection strategies, and finally points out some possible future issues in this research area.

  • Do we need to handle every Temporal Violation in scientific workflow systems
    ACM Transactions on Software Engineering and Methodology, 2014
    Co-Authors: Xiao Liu, Yun Yang, Dong Yuan, Jinjun Chen
    Abstract:

    Scientific processes are usually time constrained with overall deadlines and local milestones. In scientific workflow systems, due to the dynamic nature of the underlying computing infrastructures such as grid and cloud, execution delays often take place and result in a large number of Temporal Violations. Since Temporal Violation Handling is expensive in terms of both monetary costs and time overheads, an essential question aroused is “do we need to handle every Temporal Violation in scientific workflow systemsq” The answer would be “true” according to existing works on workflow Temporal management which adopt the philosophy similar to the Handling of functional exceptions, that is, every Temporal Violation should be handled whenever it is detected. However, based on our observation, the phenomenon of self-recovery where execution delays can be automatically compensated for by the saved execution time of subsequent workflow activities has been entirely overlooked. Therefore, considering the nonfunctional nature of Temporal Violations, our answer is “not necessarily true.” To take advantage of self-recovery, this article proposes a novel adaptive Temporal Violation Handling point selection strategy where this phenomenon is effectively utilised to avoid unnecessary Temporal Violation Handling. Based on simulations of both real-world scientific workflows and randomly generated test cases, the experimental results demonstrate that our strategy can significantly reduce the cost on Temporal Violation Handling by over 96p while maintaining extreme low Violation rate under normal circumstances.

Haoyu Luo - One of the best experts on this subject based on the ideXlab platform.

  • adaptive Temporal verification and Violation Handling for time constrained business cloud workflows
    International Conference on Service Oriented Computing, 2018
    Co-Authors: Xiao Liu, Haoyu Luo, Jin Liu, Bo Han, Yun Yang
    Abstract:

    To achieve on-time completion of time-constrained business cloud workflows, a large number of parallel cloud workflow instances need to be constantly monitored so that Temporal Violations (namely intermediate runtime delays) can be detected and handled timely. Over the last few years, many strategies have been proposed but they are not adaptive enough to capture the dynamic behaviors of business cloud workflows. In this paper, we introduce the idea of “adaptiveness” into our strategy design. Specifically, we first present an adaptive Temporal checkpoint selection strategy where the time intervals between checkpoints are adaptively determined at runtime, and then propose a matching Temporal Violation Handling strategy which can determine the required lifecycle of cloud services. The evaluation results demonstrate that our adaptive strategy can achieve both higher efficiency and better cost effectiveness compared with conventional strategies.

  • ICSOC - Adaptive Temporal verification and Violation Handling for time-constrained business cloud workflows
    Service-Oriented Computing, 2018
    Co-Authors: Haoyu Luo, Xiao Liu, Jin Liu, Bo Han, Yun Yang
    Abstract:

    To achieve on-time completion of time-constrained business cloud workflows, a large number of parallel cloud workflow instances need to be constantly monitored so that Temporal Violations (namely intermediate runtime delays) can be detected and handled timely. Over the last few years, many strategies have been proposed but they are not adaptive enough to capture the dynamic behaviors of business cloud workflows. In this paper, we introduce the idea of “adaptiveness” into our strategy design. Specifically, we first present an adaptive Temporal checkpoint selection strategy where the time intervals between checkpoints are adaptively determined at runtime, and then propose a matching Temporal Violation Handling strategy which can determine the required lifecycle of cloud services. The evaluation results demonstrate that our adaptive strategy can achieve both higher efficiency and better cost effectiveness compared with conventional strategies.

  • A sufficient and necessary Temporal Violation Handling point selection strategy in cloud workflow
    Future Generation Computer Systems, 2018
    Co-Authors: Yeguo Wang, Xiao Liu, Futian Wang, Haoyu Luo, Ying Xie, Yun Yang
    Abstract:

    Abstract To deliver high QoS (quality of service) for business process participants, workflow Temporal verification is conducted to provide satisfactory on-time completion rate of business process in the cloud. Temporal Violation Handling is the last task in a typical workflow Temporal verification framework to deal with detected time delays. However, there are very few existing studies regarding Temporal Violation Handling for cloud business workflows. In this paper, queuing theory is first employed to simulate time features of parallel workflow instances. Then, propagation effect based Temporal consistency model for business workflows and Temporal consistency model for workflow activities in the same queuing system are presented respectively. Finally, a promising Temporal Violation Handling point selection strategy for cloud business workflows is proposed and proved to satisfy the property of sufficiency and necessity. Compared with other representative strategies, experimental results show that our novel Handling point selection strategy can reduce the monitoring and Handling cost while maintaining the target on-time completion rate agreed between users and service providers.

  • SCC - Where to Fix Temporal Violations: A Novel Handling Point Selection Strategy for Business Cloud Workflows
    2016 IEEE International Conference on Services Computing (SCC), 2016
    Co-Authors: Haoyu Luo, Xiao Liu, Jin Liu, Futian Wang
    Abstract:

    On-time completion is an important QoS (Quality of Service) dimension for business cloud workflow systems. Due to the dynamic and uncertain system performance, failures of on-time completion, namely Temporal Violations, often take place during workflow runtime and thus Temporal verification and Temporal Violation Handling are required. Currently, workflow throughput is employed by Temporal verification for a large number of parallel workflow instances as the detector for Temporal Violations in a collective way. However, based on workflow throughput, it is impossible to locate the exact workflow activities and cloud services where Temporal Violations occurred. This is a critical problem as to increase workflow throughput of the whole system is very expensive if we do not know where to fix local Temporal Violations. To address such a problem, based on the results of a throughput based Temporal checkpoint selection strategy, this paper proposes a novel Temporal Violation Handling point selection strategy which further utilizes the average response time of a cloud service as the key detector to determine whether Temporal Violation Handling needs to be implemented or not. Comprehensive experimental results demonstrate that while achieving the same on-time completion rate, our strategy is much more cost effective as it can precisely localize Temporal Violations and hence require a much smaller number of times for Temporal Violation Handling compared with other strategies.

Futian Wang - One of the best experts on this subject based on the ideXlab platform.

  • ICDS - A Novel Throughput Based Temporal Violation Handling Strategy for Instance-Intensive Cloud Business Workflows
    Communications in Computer and Information Science, 2020
    Co-Authors: Futian Wang, Xiao Liu, Wei Zhang, Cheng Zhang
    Abstract:

    Temporal Violations take place during the batch-mode execution of instance-intensive business workflows running in the cloud environments which may significantly affect the QoS (Quality of Service) of cloud workflow system. However, currently most research in the area of workflow Temporal QoS focuses on single scientific workflow rather than business workflow with a batch of parallel workflow instances. Therefore, how to handle Temporal Violations of instance-intensive cloud business workflows is a new challenge. To address such a problem, in this paper, we propose a novel throughput based Temporal Violation Handling strategy. Specifically, firstly we present a definition of throughput based Temporal Violation Handling point to determine where Temporal Violation Handling should be conducted, and secondly we design a new method for adding necessary cloud computing resources for recovering detected Temporal Violations. Experimental results show that our Temporal Violation Handling strategy can effectively handle Temporal Violations in cloud business workflow and thus guarantee satisfactory on-time completion rate.

  • a novel throughput based Temporal Violation Handling strategy for instance intensive cloud business workflows
    International Conference on the Digital Society, 2019
    Co-Authors: Futian Wang, Xiao Liu, Wei Zhang, Cheng Zhang
    Abstract:

    Temporal Violations take place during the batch-mode execution of instance-intensive business workflows running in the cloud environments which may significantly affect the QoS (Quality of Service) of cloud workflow system. However, currently most research in the area of workflow Temporal QoS focuses on single scientific workflow rather than business workflow with a batch of parallel workflow instances. Therefore, how to handle Temporal Violations of instance-intensive cloud business workflows is a new challenge. To address such a problem, in this paper, we propose a novel throughput based Temporal Violation Handling strategy. Specifically, firstly we present a definition of throughput based Temporal Violation Handling point to determine where Temporal Violation Handling should be conducted, and secondly we design a new method for adding necessary cloud computing resources for recovering detected Temporal Violations. Experimental results show that our Temporal Violation Handling strategy can effectively handle Temporal Violations in cloud business workflow and thus guarantee satisfactory on-time completion rate.

  • A sufficient and necessary Temporal Violation Handling point selection strategy in cloud workflow
    Future Generation Computer Systems, 2018
    Co-Authors: Yeguo Wang, Xiao Liu, Futian Wang, Haoyu Luo, Ying Xie, Yun Yang
    Abstract:

    Abstract To deliver high QoS (quality of service) for business process participants, workflow Temporal verification is conducted to provide satisfactory on-time completion rate of business process in the cloud. Temporal Violation Handling is the last task in a typical workflow Temporal verification framework to deal with detected time delays. However, there are very few existing studies regarding Temporal Violation Handling for cloud business workflows. In this paper, queuing theory is first employed to simulate time features of parallel workflow instances. Then, propagation effect based Temporal consistency model for business workflows and Temporal consistency model for workflow activities in the same queuing system are presented respectively. Finally, a promising Temporal Violation Handling point selection strategy for cloud business workflows is proposed and proved to satisfy the property of sufficiency and necessity. Compared with other representative strategies, experimental results show that our novel Handling point selection strategy can reduce the monitoring and Handling cost while maintaining the target on-time completion rate agreed between users and service providers.

  • SCC - Where to Fix Temporal Violations: A Novel Handling Point Selection Strategy for Business Cloud Workflows
    2016 IEEE International Conference on Services Computing (SCC), 2016
    Co-Authors: Haoyu Luo, Xiao Liu, Jin Liu, Futian Wang
    Abstract:

    On-time completion is an important QoS (Quality of Service) dimension for business cloud workflow systems. Due to the dynamic and uncertain system performance, failures of on-time completion, namely Temporal Violations, often take place during workflow runtime and thus Temporal verification and Temporal Violation Handling are required. Currently, workflow throughput is employed by Temporal verification for a large number of parallel workflow instances as the detector for Temporal Violations in a collective way. However, based on workflow throughput, it is impossible to locate the exact workflow activities and cloud services where Temporal Violations occurred. This is a critical problem as to increase workflow throughput of the whole system is very expensive if we do not know where to fix local Temporal Violations. To address such a problem, based on the results of a throughput based Temporal checkpoint selection strategy, this paper proposes a novel Temporal Violation Handling point selection strategy which further utilizes the average response time of a cloud service as the key detector to determine whether Temporal Violation Handling needs to be implemented or not. Comprehensive experimental results demonstrate that while achieving the same on-time completion rate, our strategy is much more cost effective as it can precisely localize Temporal Violations and hence require a much smaller number of times for Temporal Violation Handling compared with other strategies.

  • Necessary and sufficient checkpoint selection for Temporal verification of high-confidence cloud workflow systems
    Science China Information Sciences, 2015
    Co-Authors: Futian Wang, Xiao Liu, Yun Yang
    Abstract:

    On-time completion is an important Temporal QoS (Quality of Service) dimension and one of the fundamental requirements for high-confidence workflow systems. In recent years, a workflow Temporal verification framework, which generally consists of Temporal constraint setting, Temporal checkpoint selection, Temporal verification, and Temporal Violation Handling, has been the major approach for the high Temporal QoS assurance of workflow systems. Among them, effective Temporal checkpoint selection, which aims to timely detect intermediate Temporal Violations along workflow execution plays a critical role. Therefore, Temporal checkpoint selection has been a major topic and has attracted significant efforts. In this paper, we will present an overview of work-flow Temporal checkpoint selection for Temporal verification. Specifically, we will first introduce the throughput based and response-time based Temporal consistency models for business and scientific cloud workflow systems, respectively. Then the corresponding benchmarking checkpoint selection strategies that satisfy the property of “necessity and sufficiency” are presented. We also provide experimental results to demonstrate the effectiveness of our checkpoint selection strategies, and finally points out some possible future issues in this research area.

Jinjun Chen - One of the best experts on this subject based on the ideXlab platform.

  • Do we need to handle every Temporal Violation in scientific workflow systems
    ACM Transactions on Software Engineering and Methodology, 2014
    Co-Authors: Xiao Liu, Yun Yang, Dong Yuan, Jinjun Chen
    Abstract:

    Scientific processes are usually time constrained with overall deadlines and local milestones. In scientific workflow systems, due to the dynamic nature of the underlying computing infrastructures such as grid and cloud, execution delays often take place and result in a large number of Temporal Violations. Since Temporal Violation Handling is expensive in terms of both monetary costs and time overheads, an essential question aroused is “do we need to handle every Temporal Violation in scientific workflow systemsq” The answer would be “true” according to existing works on workflow Temporal management which adopt the philosophy similar to the Handling of functional exceptions, that is, every Temporal Violation should be handled whenever it is detected. However, based on our observation, the phenomenon of self-recovery where execution delays can be automatically compensated for by the saved execution time of subsequent workflow activities has been entirely overlooked. Therefore, considering the nonfunctional nature of Temporal Violations, our answer is “not necessarily true.” To take advantage of self-recovery, this article proposes a novel adaptive Temporal Violation Handling point selection strategy where this phenomenon is effectively utilised to avoid unnecessary Temporal Violation Handling. Based on simulations of both real-world scientific workflows and randomly generated test cases, the experimental results demonstrate that our strategy can significantly reduce the cost on Temporal Violation Handling by over 96p while maintaining extreme low Violation rate under normal circumstances.

  • Temporal QOS Management in Scientific Cloud Workflow Systems
    2012
    Co-Authors: Xiao Liu, Jinjun Chen, Yun Yang
    Abstract:

    Cloud computing can provide virtually unlimited scalable high performance computing resources. Cloud workflows often underlie many large scale data/computation intensive e-science applications such as earthquake modelling, weather forecasting and astrophysics. During application modelling, these sophisticated processes are redesigned as cloud workflows, and at runtime, the models are executed by employing the supercomputing and data sharing ability of the underlying cloud computing infrastructures. Temporal QOS Management in Scientific Cloud Workflow Systems focuses on real world scientific applications which often must be completed by satisfying a set of Temporal constraints such as milestones and deadlines. Meanwhile, activity duration, as a measurement of system performance, often needs to be monitored and controlled. This book demonstrates how to guarantee on-time completion of most, if not all, workflow applications. Offering a comprehensive framework to support the lifecycle of time-constrained workflow applications, this book will enhance the overall performance and usability of scientific cloud workflow systems. Explains how to reduce the cost to detect and handle Temporal Violations while delivering high quality of service (QoS) Offers new concepts, innovative strategies and algorithms to support large-scale sophisticated?applications in the cloud Improves the overall performance and usability of cloud workflow systems Table of Contents Chapter 1 Introduction Chapter 2 Literature Review and Problem Analysis Chapter 3 A Scientific Cloud Workflow System Chapter 4 Novel Probabilistic Temporal Framework Chapter 5 Forecasting Scientific Cloud Workflow Activity Duration Intervals Chapter 6 Temporal Constraint Setting Chapter 7 Temporal Checkpoint Selection and Temporal Verification Chapter 8 Temporal Violation Handling Point Selection Chapter 9 Temporal Violation Handling Chapter 10 Conclusions and Contribution Bibliography Appendix: Notation Index

  • Temporal Violation Handling
    Temporal QOS Management in Scientific Cloud Workflow Systems, 2012
    Co-Authors: Xiao Liu, Yun Yang, Jinjun Chen
    Abstract:

    Temporal Violation Handling is the key of the last component in our Temporal framework for scientific cloud workflow systems. Clearly, whether a detected Temporal Violation can be recovered or not mainly depends on the performance of Temporal Violation Handling strategies employed in the system. Meanwhile, since the time overheads and monetary cost for Temporal Violation Handling strategies are usually much more expensive than that of its precedent steps such as checkpoint selection and Temporal verification, cost-effective Temporal Violation Handling strategies are required to be employed or designed to reduce the overall cost of the Temporal framework.

  • Temporal Violation Handling Point Selection
    Temporal QOS Management in Scientific Cloud Workflow Systems, 2012
    Co-Authors: Xiao Liu, Yun Yang, Jinjun Chen
    Abstract:

    In scientific cloud workflow systems, Temporal Violation Handling points are those workflow activity points where Temporal Violation Handling strategies are triggered to tackle detected Temporal Violations. The existing work on Temporal verification adopts the philosophy of Temporal Violation Handling required whenever a Temporal Violation is detected. Therefore, a checkpoint is regarded the same as a Temporal Violation Handling point. However, the probability of self-recovery which utilises the time redundancy of subsequent workflow activities to automatically compensate for the time deficit is ignored and hence would impose a high-Temporal Violation Handling cost. To address such a problem, this book presents a novel adaptive Temporal Violation Handling point selection strategy where the probability of self-recovery is effectively utilised in Temporal Violation Handling point selection to avoid unnecessary Handling for Temporal Violations. This chapter is organised as follows. Section 8.1 presents the specifically related work and problem analysis. Section 8.2 presents our novel adaptive Temporal Violation Handling point selection strategy. Section 8.3 demonstrates the evaluation results.

  • Literature Review and Problem Analysis
    Temporal QOS Management in Scientific Cloud Workflow Systems, 2012
    Co-Authors: Xiao Liu, Yun Yang, Jinjun Chen
    Abstract:

    This chapter reviews the existing work related to Temporal QoS organised as follows. Section 2.1 gives a general introduction of workflow Temporal QoS. Section 2.2 reviews the Temporal consistency model. Section 2.3 reviews the Temporal constraint setting. Section 2.4 reviews the Temporal checkpoint selection and Temporal verification. Section 2.5 reviews the Temporal Violation Handling. In each section, the problems with the current work are analysed along the line.