Temporal Violation

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 4284 Experts worldwide ranked by ideXlab platform

Xiao Liu - One of the best experts on this subject based on the ideXlab platform.

  • a novel throughput based Temporal Violation handling strategy for instance intensive cloud business workflows
    International Conference on the Digital Society, 2019
    Co-Authors: Futian Wang, Xiao Liu, Wei Zhang, Cheng Zhang
    Abstract:

    Temporal Violations take place during the batch-mode execution of instance-intensive business workflows running in the cloud environments which may significantly affect the QoS (Quality of Service) of cloud workflow system. However, currently most research in the area of workflow Temporal QoS focuses on single scientific workflow rather than business workflow with a batch of parallel workflow instances. Therefore, how to handle Temporal Violations of instance-intensive cloud business workflows is a new challenge. To address such a problem, in this paper, we propose a novel throughput based Temporal Violation handling strategy. Specifically, firstly we present a definition of throughput based Temporal Violation handling point to determine where Temporal Violation handling should be conducted, and secondly we design a new method for adding necessary cloud computing resources for recovering detected Temporal Violations. Experimental results show that our Temporal Violation handling strategy can effectively handle Temporal Violations in cloud business workflow and thus guarantee satisfactory on-time completion rate.

  • adaptive Temporal verification and Violation handling for time constrained business cloud workflows
    International Conference on Service Oriented Computing, 2018
    Co-Authors: Xiao Liu, Haoyu Luo, Jin Liu, Bo Han
    Abstract:

    To achieve on-time completion of time-constrained business cloud workflows, a large number of parallel cloud workflow instances need to be constantly monitored so that Temporal Violations (namely intermediate runtime delays) can be detected and handled timely. Over the last few years, many strategies have been proposed but they are not adaptive enough to capture the dynamic behaviors of business cloud workflows. In this paper, we introduce the idea of “adaptiveness” into our strategy design. Specifically, we first present an adaptive Temporal checkpoint selection strategy where the time intervals between checkpoints are adaptively determined at runtime, and then propose a matching Temporal Violation handling strategy which can determine the required lifecycle of cloud services. The evaluation results demonstrate that our adaptive strategy can achieve both higher efficiency and better cost effectiveness compared with conventional strategies.

  • A sufficient and necessary Temporal Violation handling point selection strategy in cloud workflow
    Future Generation Computer Systems, 2018
    Co-Authors: Yeguo Wang, Futian Wang, Haoyu Luo, Ying Xie, Xiao Liu
    Abstract:

    Abstract To deliver high QoS (quality of service) for business process participants, workflow Temporal verification is conducted to provide satisfactory on-time completion rate of business process in the cloud. Temporal Violation handling is the last task in a typical workflow Temporal verification framework to deal with detected time delays. However, there are very few existing studies regarding Temporal Violation handling for cloud business workflows. In this paper, queuing theory is first employed to simulate time features of parallel workflow instances. Then, propagation effect based Temporal consistency model for business workflows and Temporal consistency model for workflow activities in the same queuing system are presented respectively. Finally, a promising Temporal Violation handling point selection strategy for cloud business workflows is proposed and proved to satisfy the property of sufficiency and necessity. Compared with other representative strategies, experimental results show that our novel handling point selection strategy can reduce the monitoring and handling cost while maintaining the target on-time completion rate agreed between users and service providers.

  • Do we need to handle every Temporal Violation in scientific workflow systems
    ACM Transactions on Software Engineering and Methodology, 2014
    Co-Authors: Xiao Liu, Dong Yuan
    Abstract:

    Scientific processes are usually time constrained with overall deadlines and local milestones. In scientific workflow systems, due to the dynamic nature of the underlying computing infrastructures such as grid and cloud, execution delays often take place and result in a large number of Temporal Violations. Since Temporal Violation handling is expensive in terms of both monetary costs and time overheads, an essential question aroused is “do we need to handle every Temporal Violation in scientific workflow systemsq” The answer would be “true” according to existing works on workflow Temporal management which adopt the philosophy similar to the handling of functional exceptions, that is, every Temporal Violation should be handled whenever it is detected. However, based on our observation, the phenomenon of self-recovery where execution delays can be automatically compensated for by the saved execution time of subsequent workflow activities has been entirely overlooked. Therefore, considering the nonfunctional nature of Temporal Violations, our answer is “not necessarily true.” To take advantage of self-recovery, this article proposes a novel adaptive Temporal Violation handling point selection strategy where this phenomenon is effectively utilised to avoid unnecessary Temporal Violation handling. Based on simulations of both real-world scientific workflows and randomly generated test cases, the experimental results demonstrate that our strategy can significantly reduce the cost on Temporal Violation handling by over 96p while maintaining extreme low Violation rate under normal circumstances.

  • Temporal Violation Handling
    Temporal QOS Management in Scientific Cloud Workflow Systems, 2012
    Co-Authors: Xiao Liu
    Abstract:

    Temporal Violation handling is the key of the last component in our Temporal framework for scientific cloud workflow systems. Clearly, whether a detected Temporal Violation can be recovered or not mainly depends on the performance of Temporal Violation handling strategies employed in the system. Meanwhile, since the time overheads and monetary cost for Temporal Violation handling strategies are usually much more expensive than that of its precedent steps such as checkpoint selection and Temporal verification, cost-effective Temporal Violation handling strategies are required to be employed or designed to reduce the overall cost of the Temporal framework.

Haoyu Luo - One of the best experts on this subject based on the ideXlab platform.

  • adaptive Temporal verification and Violation handling for time constrained business cloud workflows
    International Conference on Service Oriented Computing, 2018
    Co-Authors: Xiao Liu, Haoyu Luo, Jin Liu, Bo Han
    Abstract:

    To achieve on-time completion of time-constrained business cloud workflows, a large number of parallel cloud workflow instances need to be constantly monitored so that Temporal Violations (namely intermediate runtime delays) can be detected and handled timely. Over the last few years, many strategies have been proposed but they are not adaptive enough to capture the dynamic behaviors of business cloud workflows. In this paper, we introduce the idea of “adaptiveness” into our strategy design. Specifically, we first present an adaptive Temporal checkpoint selection strategy where the time intervals between checkpoints are adaptively determined at runtime, and then propose a matching Temporal Violation handling strategy which can determine the required lifecycle of cloud services. The evaluation results demonstrate that our adaptive strategy can achieve both higher efficiency and better cost effectiveness compared with conventional strategies.

  • A sufficient and necessary Temporal Violation handling point selection strategy in cloud workflow
    Future Generation Computer Systems, 2018
    Co-Authors: Yeguo Wang, Futian Wang, Haoyu Luo, Ying Xie, Xiao Liu
    Abstract:

    Abstract To deliver high QoS (quality of service) for business process participants, workflow Temporal verification is conducted to provide satisfactory on-time completion rate of business process in the cloud. Temporal Violation handling is the last task in a typical workflow Temporal verification framework to deal with detected time delays. However, there are very few existing studies regarding Temporal Violation handling for cloud business workflows. In this paper, queuing theory is first employed to simulate time features of parallel workflow instances. Then, propagation effect based Temporal consistency model for business workflows and Temporal consistency model for workflow activities in the same queuing system are presented respectively. Finally, a promising Temporal Violation handling point selection strategy for cloud business workflows is proposed and proved to satisfy the property of sufficiency and necessity. Compared with other representative strategies, experimental results show that our novel handling point selection strategy can reduce the monitoring and handling cost while maintaining the target on-time completion rate agreed between users and service providers.

Yeguo Wang - One of the best experts on this subject based on the ideXlab platform.

  • A sufficient and necessary Temporal Violation handling point selection strategy in cloud workflow
    Future Generation Computer Systems, 2018
    Co-Authors: Yeguo Wang, Futian Wang, Haoyu Luo, Ying Xie, Xiao Liu
    Abstract:

    Abstract To deliver high QoS (quality of service) for business process participants, workflow Temporal verification is conducted to provide satisfactory on-time completion rate of business process in the cloud. Temporal Violation handling is the last task in a typical workflow Temporal verification framework to deal with detected time delays. However, there are very few existing studies regarding Temporal Violation handling for cloud business workflows. In this paper, queuing theory is first employed to simulate time features of parallel workflow instances. Then, propagation effect based Temporal consistency model for business workflows and Temporal consistency model for workflow activities in the same queuing system are presented respectively. Finally, a promising Temporal Violation handling point selection strategy for cloud business workflows is proposed and proved to satisfy the property of sufficiency and necessity. Compared with other representative strategies, experimental results show that our novel handling point selection strategy can reduce the monitoring and handling cost while maintaining the target on-time completion rate agreed between users and service providers.

Futian Wang - One of the best experts on this subject based on the ideXlab platform.

  • a novel throughput based Temporal Violation handling strategy for instance intensive cloud business workflows
    International Conference on the Digital Society, 2019
    Co-Authors: Futian Wang, Xiao Liu, Wei Zhang, Cheng Zhang
    Abstract:

    Temporal Violations take place during the batch-mode execution of instance-intensive business workflows running in the cloud environments which may significantly affect the QoS (Quality of Service) of cloud workflow system. However, currently most research in the area of workflow Temporal QoS focuses on single scientific workflow rather than business workflow with a batch of parallel workflow instances. Therefore, how to handle Temporal Violations of instance-intensive cloud business workflows is a new challenge. To address such a problem, in this paper, we propose a novel throughput based Temporal Violation handling strategy. Specifically, firstly we present a definition of throughput based Temporal Violation handling point to determine where Temporal Violation handling should be conducted, and secondly we design a new method for adding necessary cloud computing resources for recovering detected Temporal Violations. Experimental results show that our Temporal Violation handling strategy can effectively handle Temporal Violations in cloud business workflow and thus guarantee satisfactory on-time completion rate.

  • A sufficient and necessary Temporal Violation handling point selection strategy in cloud workflow
    Future Generation Computer Systems, 2018
    Co-Authors: Yeguo Wang, Futian Wang, Haoyu Luo, Ying Xie, Xiao Liu
    Abstract:

    Abstract To deliver high QoS (quality of service) for business process participants, workflow Temporal verification is conducted to provide satisfactory on-time completion rate of business process in the cloud. Temporal Violation handling is the last task in a typical workflow Temporal verification framework to deal with detected time delays. However, there are very few existing studies regarding Temporal Violation handling for cloud business workflows. In this paper, queuing theory is first employed to simulate time features of parallel workflow instances. Then, propagation effect based Temporal consistency model for business workflows and Temporal consistency model for workflow activities in the same queuing system are presented respectively. Finally, a promising Temporal Violation handling point selection strategy for cloud business workflows is proposed and proved to satisfy the property of sufficiency and necessity. Compared with other representative strategies, experimental results show that our novel handling point selection strategy can reduce the monitoring and handling cost while maintaining the target on-time completion rate agreed between users and service providers.

Ying Xie - One of the best experts on this subject based on the ideXlab platform.

  • A sufficient and necessary Temporal Violation handling point selection strategy in cloud workflow
    Future Generation Computer Systems, 2018
    Co-Authors: Yeguo Wang, Futian Wang, Haoyu Luo, Ying Xie, Xiao Liu
    Abstract:

    Abstract To deliver high QoS (quality of service) for business process participants, workflow Temporal verification is conducted to provide satisfactory on-time completion rate of business process in the cloud. Temporal Violation handling is the last task in a typical workflow Temporal verification framework to deal with detected time delays. However, there are very few existing studies regarding Temporal Violation handling for cloud business workflows. In this paper, queuing theory is first employed to simulate time features of parallel workflow instances. Then, propagation effect based Temporal consistency model for business workflows and Temporal consistency model for workflow activities in the same queuing system are presented respectively. Finally, a promising Temporal Violation handling point selection strategy for cloud business workflows is proposed and proved to satisfy the property of sufficiency and necessity. Compared with other representative strategies, experimental results show that our novel handling point selection strategy can reduce the monitoring and handling cost while maintaining the target on-time completion rate agreed between users and service providers.