Constraint-based runtime prediction of SLA violations in service orchestrations

Ivanovic, Dragan and Carro Liñares, Manuel and Hermenegildo, Manuel V. (2011). Constraint-based runtime prediction of SLA violations in service orchestrations. In: "Service-Oriented Computing". Lecture Notes in Computer Science (7084). Springer Berlin Heidelberg, Heidelberg, Alemania, pp. 62-76. ISBN 978-3-642-25534-2. https://doi.org/10.1007/978-3-642-25535-9_5.

Description

Title: Constraint-based runtime prediction of SLA violations in service orchestrations
Author/s:
  • Ivanovic, Dragan
  • Carro Liñares, Manuel
  • Hermenegildo, Manuel V.
Editor/s:
  • Kappel, Gerti
  • Maamar, Zakaria
  • Motahari-Nezhad, Hamid R.
Item Type: Book Section
Title of Book: Service-Oriented Computing
Date: 2011
ISBN: 978-3-642-25534-2
Subjects:
Freetext Keywords: Service orchestrations, Quality of service, Service level agreements, Monitoring, Prediction, Constraints, Servicio instrumentado, Calidad del servicio, Niveles acordados de servicio, Monitorización, Predicción, Restricciones.
Faculty: Facultad de Informática (UPM)
Department: Inteligencia Artificial
Creative Commons Licenses: Recognition - No derivative works - Non commercial

Full text

[img]
Preview
PDF - Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (930kB) | Preview

Abstract

Service compositions put together loosely-coupled component services to perform more complex, higher level, or cross-organizational tasks in a platform-independent manner. Quality-of-Service (QoS) properties, such as execution time, availability, or cost, are critical for their usability, and permissible boundaries for their values are defined in Service Level Agreements (SLAs). We propose a method whereby constraints that model SLA conformance and violation are derived at any given point of the execution of a service composition. These constraints are generated using the structure of the composition and properties of the component services, which can be either known or empirically measured. Violation of these constraints means that the corresponding scenario is unfeasible, while satisfaction gives values for the constrained variables (start / end times for activities, or number of loop iterations) which make the scenario possible. These results can be used to perform optimized service matching or trigger preventive adaptation or healing.

More information

Item ID: 14829
DC Identifier: http://oa.upm.es/14829/
OAI Identifier: oai:oa.upm.es:14829
DOI: 10.1007/978-3-642-25535-9_5
Official URL: http://link.springer.com/chapter/10.1007%2F978-3-642-25535-9_5
Deposited by: Biblioteca Facultad de Informatica
Deposited on: 12 Apr 2013 07:54
Last Modified: 21 Apr 2016 14:40
  • Logo InvestigaM (UPM)
  • Logo GEOUP4
  • Logo Open Access
  • Open Access
  • Logo Sherpa/Romeo
    Check whether the anglo-saxon journal in which you have published an article allows you to also publish it under open access.
  • Logo Dulcinea
    Check whether the spanish journal in which you have published an article allows you to also publish it under open access.
  • Logo de Recolecta
  • Logo del Observatorio I+D+i UPM
  • Logo de OpenCourseWare UPM