Requirements monitoring frameworks: A systematic review

M Vierhauser, R Rabiser, P Grünbacher - Information and Software …, 2016 - Elsevier
Context Software systems today often interoperate with each other, thus forming a system of
systems (SoS). Due to the scale, complexity, and heterogeneity of SoS, determining …

Online QoS prediction for runtime service adaptation via adaptive matrix factorization

J Zhu, P He, Z Zheng, MR Lyu - IEEE Transactions on Parallel …, 2017 - ieeexplore.ieee.org
Cloud applications built on service-oriented architectures generally integrate a number of
component services to fulfill certain application logic. The changing cloud environment …

Dynamic adaptation of service compositions with variability models

GH Alférez, V Pelechano, R Mazo, C Salinesi… - Journal of Systems and …, 2014 - Elsevier
Web services run in complex contexts where arising events may compromise the quality of
the whole system. Thus, it is desirable to count on autonomic mechanisms to guide the self …

A framework for evaluating quality-driven self-adaptive software systems

NM Villegas, HA Müller, G Tamura, L Duchien… - Proceedings of the 6th …, 2011 - dl.acm.org
Over the past decade the dynamic capabilities of self-adaptive software-intensive systems
have proliferated and improved significantly. To advance the field of self-adaptive and self …

Testing in service oriented architectures with dynamic binding: A mapping study

M Palacios, J García-Fanjul, J Tuya - Information and Software Technology, 2011 - Elsevier
CONTEXT: Service Oriented Architectures (SOA) have emerged as a new paradigm to
develop interoperable and highly dynamic applications. OBJECTIVE: This paper aims to …

Mining alarm clusters to improve alarm handling efficiency

K Julisch - Seventeenth Annual Computer Security Applications …, 2001 - ieeexplore.ieee.org
It is a well-known problem that intrusion detection systems overload their human operators
by triggering thousands of alarms per day. As a matter of fact, IBM Research's Zurich …

Efficient query of quality correlation for service composition

Y Zhang, G Cui, S Deng, F Chen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As enterprises around the globe embrace globalization, strategic alliances among
enterprises have become an important means to gain competitive advantages. Enterprises …

Large-scale event detection using semi-hidden markov models

S Hongeng, R Nevatia - Computer Vision, IEEE International …, 2003 - computer.org
Process enactment technology provides native tools and add-ons for monitoring, such as
APIs and monitoring consoles, which are usually highly entangled with the underlying …

Axis: Automatically fixing atomicity violations through solving control constraints

P Liu, C Zhang - 2012 34th International Conference on …, 2012 - ieeexplore.ieee.org
Atomicity, a general correctness criterion in concurrency programs, is often violated in real-
world applications. The violations are difficult for developers to fix, making automatic bug …

ROD: reception-aware online distillation for sparse graphs

W Zhang, Y Jiang, Y Li, Z Sheng, Y Shen… - Proceedings of the 27th …, 2021 - dl.acm.org
Graph neural networks (GNNs) have been widely used in many graph-based tasks such as
node classification, link prediction, and node clustering. However, GNNs gain their …