• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tong Yanxiang, Qin Yi, Ma Xiaoxing. Evaluating the Fitness of Model Deviation Detection Approaches on Self-Adaptive Software Systems[J]. Journal of Computer Research and Development, 2022, 59(9): 1929-1946. DOI: 10.7544/issn1000-1239.20220015
Citation: Tong Yanxiang, Qin Yi, Ma Xiaoxing. Evaluating the Fitness of Model Deviation Detection Approaches on Self-Adaptive Software Systems[J]. Journal of Computer Research and Development, 2022, 59(9): 1929-1946. DOI: 10.7544/issn1000-1239.20220015

Evaluating the Fitness of Model Deviation Detection Approaches on Self-Adaptive Software Systems

Funds: This work was supported by the National Natural Science Foundation of China (62025202, 61932021, 61902173) and the Natural Science Foundation of Jiangsu Province (BK20190299).
More Information
  • Published Date: August 31, 2022
  • Model deviations in self-adaptive software systems cause critical reliability issues. For control-based self-adaptive systems, model deviation roots in the drifting of the managed system’s nominal model in uncertain running environments, which causes the invalidation of provided formal guarantees, and may lead to system’s abnormal behavior. Existing model deviation detection approaches often ignore the characteristics of model deviations that emerge in different scenarios. This makes it difficult for users to choose an appropriate approach in a specific application scenario. We provide a framework to describe different detection approaches and propose three metrics to evaluate a detection approach’s fitness with respect to different types of model deviations. The provided framework is composed of four parts, namely system modelling, detection variable estimation, model deviation representation, and model deviation judgement, based on the process of model deviation detection. The proposed metrics, including control-signal-intensity, environmental-input-intensity, and uncertainty-intensity, concern three key factors in the process of model deviation detection, respectively. Using these metrics, a deviation scenario is quantified with a vector and is classified by the quantified values into a characteristic scenario according to control theory. A number of experiments are conducted to study the effectiveness of four mainstream model detection approaches in different scenarios, and their fitness to different characteristic scenarios of model deviations is summarized.
  • Related Articles

    [1]Gao Jiangang, Zheng Yan, Yu Kang, Peng Dajia, Li Hongliang, Liu Yong, He Wangquan, Chen Dexun, Wang Fei. Runtime Fault Location Method for Sunway Supercomputer[J]. Journal of Computer Research and Development, 2024, 61(1): 86-97. DOI: 10.7544/issn1000-1239.202220821
    [2]Shi Cunhui, Hu Yaokang, Feng Bin, Zhang Jin, Yu Xiaoming, Liu Yue, Cheng Xueqi. A Hierarchical Knowledge Based Topic Recommendation Method in Public Opinion Scenario[J]. Journal of Computer Research and Development, 2021, 58(8): 1811-1819. DOI: 10.7544/issn1000-1239.2021.20190749
    [3]Wang Shuo, Tang Guangming, Wang Jianhua, Sun Yifeng, Kou Guang. Attack Scenario Construction Method Based on Causal Knowledge Net[J]. Journal of Computer Research and Development, 2018, 55(12): 2620-2636. DOI: 10.7544/issn1000-1239.2018.20160940
    [4]Zhu Jun, Guo Changguo, Wu Quanyuan. A Runtime Monitoring Web Services Interaction Behaviors Method Based on CPN[J]. Journal of Computer Research and Development, 2011, 48(12): 2277-2289.
    [5]Wu Huaiguang, Wu Guoqing, Chen Shu, and Wan Li. A Software Behavior Oriented Requirements Model and Properties Verification[J]. Journal of Computer Research and Development, 2011, 48(5): 869-876.
    [6]Shao Jin, Deng Fang, and Wang Qianxiang. A Model-Based Software System Monitoring Approach[J]. Journal of Computer Research and Development, 2010, 47(7): 1175-1183.
    [7]Jia Qunlin and Zhou Baijia. Earthquake Disaster Scenario Simulation Technology[J]. Journal of Computer Research and Development, 2010, 47(6): 1038-1043.
    [8]Dong Xiaoshe, Feng Guofu, Wang Xuhao, Feng Jinghua, Hu Leijun. Research on Multilayer Runtime Library Technology for Cell/B.E. Processor[J]. Journal of Computer Research and Development, 2010, 47(4): 561-570.
    [9]Liu Linfeng, Jin Shan. A Clustering Control Algorithm of Wireless Sensor Networks in Low Probability Event Scenario[J]. Journal of Computer Research and Development, 2008, 45(10): 1662-1668.
    [10]Liu Yuling, Du Ruizhong, Zhao Weidong, and Cai Hongyun. BPCRISM: A New Intrusion Scenario Building Model[J]. Journal of Computer Research and Development, 2007, 44(4): 589-597.
  • Cited by

    Periodical cited type(1)

    1. 信文雪,程胜月. 基于复杂网络分析的嵌入式软件可信性评估模型. 信息与电脑(理论版). 2023(13): 43-45 .

    Other cited types(0)

Catalog

    Article views (208) PDF downloads (82) Cited by(1)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return