You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
We present a novel performance modeling approach tailored to I/O performance prediction in virtualized environments. The main idea is to identify important performance-influencing factors and to develop storage-level I/O performance models. To increase the practical applicability of these models, we combine the low-level I/O performance models with high-level software architecture models. Our approach is validated in a variety of case studies in state-of-the-art, real-world environments.
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.
Die modellbasierte Performancevorhersage ist ein bekanntes Konzept zur Gewährleistung der Softwarequalität. Derzeitige Ansätze basieren auf einem Modell mit einer Metrik, was zu ungenauen Vorhersagen für moderne Architekturen führt. In dieser Arbeit wird ein Multi-Strategie-Ansatz zur Erweiterung von Performancevorhersagemodellen zur Unterstützung von Multicore-Architekturen vorgestellt, in Palladio implementiert und dadurch die Genauigkeit der Vorhersage deutlich verbessert. - Model-based performance prediction is a well-known concept to ensure the quality of software. Current approaches are based on a single-metric model, which leads to inaccurate predictions for modern architectures. This thesis presents a multi-strategies approach to extend performance prediction models to support multicore architectures. We implemented the strategies into Palladio and significantly increased the performance prediction power.
Complex software systems are described with multiple artifacts, such as code, design diagrams and others. Ensuring their consistency is crucial and can be automated with transformations for pairs of artifacts. We investigate how developers can combine independently developed and reusable transformations to networks that preserve consistency between more than two artifacts. We identify synchronization, compatibility and orchestration as central challenges, and we develop approaches to solve them.
In this book, we introduce an automatic, experiment-based approach for performance problem diagnostics in enterprise software systems. The proposed approach systematically searches for root causes of detected performance problems by executing series of systematic performance tests. The presented approach is evaluated by various case studies showing that the presented approach is applicable to a wide range of contexts.
In this work, the authors analysed the co-dependency between models and analyses, particularly the structure and interdependence of artefacts and the feature-based decomposition and composition of model-based analyses. Their goal is to improve the maintainability of model-based analyses. They have investigated the co-dependency of Domain-specific Modelling Languages (DSMLs) and model-based analyses regarding evolvability, understandability, and reusability.
This cumulative habilitation thesis, proposes concepts for (i) modelling and analysing dependability based on architectural models of software-intensive systems early in development, (ii) decomposition and composition of modelling languages and analysis techniques to enable more flexibility in evolution, and (iii) bridging the divergent levels of abstraction between data of the operation phase, architectural models and source code of the development phase.
Previously, software architects were unable to effectively and efficiently apply reusable knowledge (e.g., architectural styles and patterns) to architectural analyses. This work tackles this problem with a novel method to create and apply templates for reusable knowledge. These templates capture reusable knowledge formally and can efficiently be integrated in architectural analyses.
This work introduces architectural security analyses for detecting access violations and attack paths in software architectures. It integrates access control policies and vulnerabilities, often analyzed separately, into a unified approach using software architecture models. Contributions include metamodels for access control and vulnerabilities, scenario-based analysis, and two attack analyses. Evaluation demonstrates high accuracy in identifying issues for secure system development.