From security to assurance in the cloud: A survey

CA Ardagna, R Asal, E Damiani, QH Vu - ACM Computing Surveys …, 2015 - dl.acm.org
The cloud computing paradigm has become a mainstream solution for the deployment of
business processes and applications. In the public cloud vision, infrastructure, platform, and …

A comparison framework for runtime monitoring approaches

R Rabiser, S Guinea, M Vierhauser, L Baresi… - Journal of Systems and …, 2017 - Elsevier
The full behavior of complex software systems often only emerges during operation. They
thus need to be monitored at run time to check that they adhere to their requirements …

[图书][B] Specification and verification of declarative open interaction models: a logic-based approach

M Montali - 2010 - books.google.com
Many novel application scenarios and architectures in business process management or
service composition are characterized by a distribution of activities and resources, and by …

Service mining: Using process mining to discover, check, and improve service behavior

W Van Der Aalst - IEEE transactions on services Computing, 2012 - ieeexplore.ieee.org
Web services are an emerging technology to implement and integrate business processes
within and across enterprises. Service orientation can be used to decompose complex …

Large-scale event detection using semi-hidden markov models

S Hongeng, R Nevatia - Computer Vision, IEEE International …, 2003 - computer.org
Process enactment technology provides native tools and add-ons for monitoring, such as
APIs and monitoring consoles, which are usually highly entangled with the underlying …

[HTML][HTML] Monitoring networks through multiparty session types

L Bocchi, TC Chen, R Demangeon, K Honda… - Theoretical Computer …, 2017 - Elsevier
In large-scale distributed infrastructures, applications are realised through communications
among distributed components. The need for methods for assuring safe interactions in such …

Requirements monitoring frameworks: A systematic review

M Vierhauser, R Rabiser, P Grünbacher - Information and Software …, 2016 - Elsevier
Context Software systems today often interoperate with each other, thus forming a system of
systems (SoS). Due to the scale, complexity, and heterogeneity of SoS, determining …

An automated approach to forecasting QoS attributes based on linear and non-linear time series modeling

A Amin, L Grunske, A Colman - Proceedings of the 27th IEEE/ACM …, 2012 - dl.acm.org
Predicting future values of Quality of Service (QoS) attributes can assist in the control of
software intensive systems by preventing QoS violations before they happen. Currently …

Model recommendation: Generating object detectors from few samples

YX Wang, M Hebert - … of the IEEE Conference on Computer …, 2015 - openaccess.thecvf.com
In this paper, we explore an approach to generating detectors that is radically different from
the conventional way of learning a detector from a large corpus of annotated positive and …

Denotational and operational semantics for interaction languages: Application to trace analysis

E Mahe, C Gaston, P Le Gall - Science of Computer Programming, 2024 - Elsevier
Graphical depictions of distributed systems' behaviors in the form of Sequence Diagrams
(SD) are widely used, with formalisms such as Message Sequence Charts (MSC) or UML …