高级检索
    邵 津 邓 芳 王千祥. 一种基于模型的软件系统监测方法[J]. 计算机研究与发展, 2010, 47(7): 1175-1183.
    引用本文: 邵 津 邓 芳 王千祥. 一种基于模型的软件系统监测方法[J]. 计算机研究与发展, 2010, 47(7): 1175-1183.
    Shao Jin, Deng Fang, and Wang Qianxiang. A Model-Based Software System Monitoring Approach[J]. Journal of Computer Research and Development, 2010, 47(7): 1175-1183.
    Citation: Shao Jin, Deng Fang, and Wang Qianxiang. A Model-Based Software System Monitoring Approach[J]. Journal of Computer Research and Development, 2010, 47(7): 1175-1183.

    一种基于模型的软件系统监测方法

    A Model-Based Software System Monitoring Approach

    • 摘要: 软件系统在运行过程中的状态和行为是否与其需求规约一致是衡量软件系统服务质量的一个关键指标.提出了一种使用基于模型的软件系统监测技术来保障软件质量的方法,其基本思路是及时发现系统在运行过程中出现的异常,为调整系统、保障软件服务质量提供依据.该方法以包含约束描述信息的监测模型为基础,基于一系列的转换规则,自动、半自动地将监测模型转换成相应的监测代码,并以合适的实现机制部署到被监测系统之上,从而提高软件系统监测的效果.

       

      Abstract: The degree to which internal states and behavior of software systems conform to their requirement is a key issue to evaluate whether a software system can provide services of high quality consistently. Software monitoring is an effective approach to help ensure such integrity of large-scale software systems. But it is usually time-consuming and error-prone to code and deploy the monitors manually. Proposed in this paper is an approach which utilizes model-based software monitoring techniques to ensure the high quality of software. The basic idea is to capture concerned events from runtime software and discover errors that occur during its execution, in order to rapidly adjust the system and guarantee the quality of software services. In this paper a monitoring model is proposed to present the monitoring requirements. By adopting the monitoring model, this approach facilitates the process of equipping a software system with monitoring capability. Based on the included constraint descriptions and a series of transformation rules, the monitoring model is transformed into corresponding bunch of monitoring code semi-automatically or automatically. In addition, these codes will be deployed to the monitored system in an appropriate mechanism, either in the way of bytecode instrumentation or by adding interceptors. Experimental results show that both the performance of these two methods is affordable.

       

    /

    返回文章
    返回