Necessary and sufficient checkpoint selection for temporal verification of high-confidence cloud workflow systems

Wang, Fu Tian, Liu, Xiao and Yang, Yun 2015, Necessary and sufficient checkpoint selection for temporal verification of high-confidence cloud workflow systems, Science China information sciences, vol. 58, no. 5, pp. 1-16, doi: 10.1007/s11432-015-5317-7.

Attached Files
Name Description MIMEType Size Downloads

Title Necessary and sufficient checkpoint selection for temporal verification of high-confidence cloud workflow systems
Author(s) Wang, Fu Tian
Liu, XiaoORCID iD for Liu, Xiao
Yang, Yun
Journal name Science China information sciences
Volume number 58
Issue number 5
Start page 1
End page 16
Total pages 16
Publisher Springer
Place of publication Berlin, Germany
Publication date 2015
ISSN 1674-733X
Keyword(s) Science & Technology
Computer Science, Information Systems
Computer Science
workflow system
workflow temporal verification
temporal checkpoint selection
business workflow
scientific workflow
quality of service
Summary On-time completion is an important temporal QoS (Quality of Service) dimension and one of the fundamental requirements for high-confidence workflow systems. In recent years, a workflow temporal verification framework, which generally consists of temporal constraint setting, temporal checkpoint selection, temporal verification, and temporal violation handling, has been the major approach for the high temporal QoS assurance of workflow systems. Among them, effective temporal checkpoint selection, which aims to timely detect intermediate temporal violations along workflow execution plays a critical role. Therefore, temporal checkpoint selection has been a major topic and has attracted significant efforts. In this paper, we will present an overview of work-flow temporal checkpoint selection for temporal verification. Specifically, we will first introduce the throughput based and response-time based temporal consistency models for business and scientific cloud workflow systems, respectively. Then the corresponding benchmarking checkpoint selection strategies that satisfy the property of “necessity and sufficiency” are presented. We also provide experimental results to demonstrate the effectiveness of our checkpoint selection strategies, and finally points out some possible future issues in this research area.
Language eng
DOI 10.1007/s11432-015-5317-7
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1.1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2015, Springer
Persistent URL

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 4 times in TR Web of Science
Scopus Citation Count Cited 10 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 128 Abstract Views, 4 File Downloads  -  Detailed Statistics
Created: Mon, 18 Apr 2016, 14:24:09 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact