SlideShare uma empresa Scribd logo
1 de 30
Addressing the QoS drift in
Specification Models of Self-adaptive
service-based systems
Romina Torres (1), Nelly Bencomo(2), Hernán Astudillo(1)
(1)Universidad Técnica Federico Santa María
(2)INRIA Paris-Rocquencourt
2nd International Workshop on Realizing Artificial Intelligence
Synergies in Software Engineering (RAISE – Mayo 2012)
1
CONTEXT
Self-adaptive Service based Systems
2
Introduction
• Dynamic adaptive systems must be able to
adapt themselves during runtime to cope with
the uncertainty associated with changes in
their goals or in the environment in which
they operate WITH NO (OR LIMITED) HUMAN
INTERVENTION.
3
Requirements (R):
Send the weather prediction for the weekend to
the user wherever he is as fast as possible.
Functional goals and non functional constraints
Specifications (S)
M. Mannion, B.Keepence. 1995. SMART requirements. SIGSOFT Softw. Eng. Notes, or GQM
4
Specifications (S)
Architectural Configuration (C)
 f(S)=C’
During Runtime
proactive
reactive 5
P. Zaveand M. Jackson, “Fourdarkcornersofrequirementsengineering,” 1997 ACM Txson SE &Metho
Adaptation
PROBLEM
Perceptual Systems under changing environments
6
Challenge
7
uncertainty
Challenge - uncertainty
t0
t1
t2
t3
Perceptual System
8
Problem
• Cause:
– Perceptual systems may be degraded when
environments are highly changing
• Implication
– Specification models (S) may be degraded due to
the highly changing service market
• Self-adaptive Service-based systems may miss
requirements violations because S is not
anymore a valid representation of R.
D. Hall, “Automaticparameterregulationofperceptualsystems,”
ImageandVisionComputing, vol. 24, no. 8, pp. 870 – 881, 2006.
9
The natural solution to the challenge
• Humans should regularly and manually
maintain their specification models in order to
ensure they are a valid representation of their
requirements during runtime
10
But…
• Dynamic adaptive systems must be able to
adapt themselves during runtime to cope with
the uncertainty associated with changes in
their goals or in the environment in which
they operate WITH NO (OR LIMITED) HUMAN
INTERVENTION.
• Humans cannot be aware of a huge and highly
dynamic operating environment (partial
views)
11
The real required solution
• Specification models must be automatically
maintained during runtime in order to
maintain them as valid representations of the
humans requirements
12
RELATED WORK
Keeping alive models
13
Related Work
I. Epifani, C. Ghezzi, R. Mirandola, G. Tamburrelli. “Modelevolution by run-time
parameteradaptation”. ICSE '09
[Firelli et al. 2011] [Cardenilli et al 2011] [Calinescu et al. 2011] [Calinescu et al. 2012]
• [Epifani et al. 2009]
– Humans estimations are seldom correct + in
dynamic environments, the value of parameters
may change over time
• keeping models alive during runtime and maintaining
updated the parameters by feeding a bayesian
estimator with data collected from the running system
• Parameters always are average values
– Problem: humans cannot constraint properly their
functional goals
14
PROPROSAL
Computing with words + strategy to detect drifts on words
15
Our proposal
• A constraint language for humans to specify the NFCs
in the specification models using concepts instead of
numerical ranges.
• Necessarily we also need
– An architecture capable to assess “abstract specification
models”
– An infrastructure capable to obtain from the NFPs of the
offerings of the service market the numerical meaning of
the concepts.
• Initial values
• Each time there is enough evidence a drift has occurred in the
NFPs
16
Preliminaries
• Computing with words (CWW)
• Words instead of numbers for computing and reasoning
• Words constrain linguistic variables
– Fuzzy sets
LoftiZadeh. “FuzzyLogic = ComputingwithWords”. IEEE TxsonFuzzy Systems 1996
Language to define NFCs
17
Proposal (1/3)
• Language
18
Preliminaries
• Specification models become linguistic
decisions models
• How do we assess them?
– Perceptual Computer – an architecture for CWW
J. M. Mendel, D. Wu. “ChallengesforPerceptualComputerApplicationsand How TheyWere
Overcome”. IEEE ComputationalIntelligence Magazine, 2012.
L. Martínez, D. Ruan, F. Herrera, E. Herrera-Viedma, P. P. Wang: Linguistic decision making:
Tools and applications. Inf. Sci. 179(14): 2297-2298 (2009) 19
Proposal(2/3)
20
Preliminaries
• Concept drift occurswhenthecontextshifts
induce changes in thetargetconcept
• Functionally-equivalentservices are
continuouslycompeting in
termsofQoStoachievetheirownsurvivalgoal: to
be selected
• Perceptionsaboutwhatmeanseachconceptofea
ch NFP
ofeachfunctionalgroupofserviceschange
21
Preliminaries
G. Leng, X.-J. Zeng, and J. A. Keane, “A hybridlearningalgorithmwith a similarity-
basedpruningstrategyforself-adaptiveneuro-fuzzysystems,” AppliedSoftComputing 2009.
– randomnoise,
– randomtrends (gradual
changes),
– randomsubstitutions
(abruptchanges),
– orsystematictrends
We record also the trend of the
drift and we base our decision
on the trend history of the past
“potential” drifts
22
Outliers?
Proposal (3/3)
23
24
VALIDATION
25
Validation Strategy
• Prototype Implementation of Adaptive
• Dataset from programmableweb.com
– 10 functional categories, 2 non-functional properties,
over 150 services (3000 “words”).
– 5 SBSs clients subscribing their adaptation needs
– 3 QoS drifts synthetically simulated in a window of 10
new NFP certifications.
• We were able to detect requirements violations where
configurations become relative violators because others
functionally-equivalent competitors improve their QoS. =>
reduction of false negative error
26
CONCLUSIONS & FUTURE WORK
27
Conclusions
• Current systems are being released too fragile
– Lack of self-monitoring and self-repairing
capabilities
– Lack of awareness
– Self-adaptive Systems demands systems
“maintainability” be performed automatically
– But even manually it is performed poorly
• So, still there is a lot of work on the SE side
28
Ongoing and future work
• Tuning Adaptive
• False positives?
• Stress testing - Scalability
• Sensitivity analysis - Parameters tradeoff
• New techniques to mitigate the obsolescence of
models during runtime
• Release dataset of measurements of NFPs of
services during a frame of time where several
QoS drifts may occur.
29
Acknowledgements
This work was partially funded by UTFSM DGIP
(PIIC and 241167), BASAL FB0821, Conicyt
Chile, the EU Connect project and the EU
Marie Curie Requirements@runtime.
30

Mais conteúdo relacionado

Destaque

In the age of Big Data, what role for Software Engineers?
In the age of Big Data, what role for Software Engineers?In the age of Big Data, what role for Software Engineers?
In the age of Big Data, what role for Software Engineers?
CS, NcState
 

Destaque (7)

In the age of Big Data, what role for Software Engineers?
In the age of Big Data, what role for Software Engineers?In the age of Big Data, what role for Software Engineers?
In the age of Big Data, what role for Software Engineers?
 
SE and AI: a two-way street
SE and AI: a two-way streetSE and AI: a two-way street
SE and AI: a two-way street
 
Talks2015 novdec
Talks2015 novdecTalks2015 novdec
Talks2015 novdec
 
Big Data: the weakest link
Big Data: the weakest linkBig Data: the weakest link
Big Data: the weakest link
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
Robust Design
Robust DesignRobust Design
Robust Design
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 

Semelhante a Requirements, Design and Data Repositories

Maintain, Modernize or Migrate- (1)
Maintain, Modernize or Migrate- (1)Maintain, Modernize or Migrate- (1)
Maintain, Modernize or Migrate- (1)
Noah Spahn
 
Multiprocessor scheduling 2
Multiprocessor scheduling 2Multiprocessor scheduling 2
Multiprocessor scheduling 2
mrbourne
 
resume v 5.0
resume v 5.0resume v 5.0
resume v 5.0
Ye Xu
 
Goal Decomposition and Abductive Reasoning for Policy Analysis and Refinement
Goal Decomposition and Abductive Reasoning for Policy Analysis and RefinementGoal Decomposition and Abductive Reasoning for Policy Analysis and Refinement
Goal Decomposition and Abductive Reasoning for Policy Analysis and Refinement
Emil Lupu
 
International Journal of Computer Science and Security Volume (1) Issue (1)
International Journal of Computer Science and Security Volume (1) Issue (1)International Journal of Computer Science and Security Volume (1) Issue (1)
International Journal of Computer Science and Security Volume (1) Issue (1)
CSCJournals
 
Model Manipulation for End-User Modelers
Model Manipulation for End-User ModelersModel Manipulation for End-User Modelers
Model Manipulation for End-User Modelers
Vlad Acretoaie
 

Semelhante a Requirements, Design and Data Repositories (20)

01_Principles.pdf rata Tata principles and rules
01_Principles.pdf rata Tata principles and rules01_Principles.pdf rata Tata principles and rules
01_Principles.pdf rata Tata principles and rules
 
Maintain, Modernize or Migrate- (1)
Maintain, Modernize or Migrate- (1)Maintain, Modernize or Migrate- (1)
Maintain, Modernize or Migrate- (1)
 
From Bugs to Decision Support - Selected Research Highlights
From Bugs to Decision Support - Selected Research HighlightsFrom Bugs to Decision Support - Selected Research Highlights
From Bugs to Decision Support - Selected Research Highlights
 
(Structural) Feature Interactions for Variability-Intensive Systems Testing
(Structural) Feature Interactions for Variability-Intensive Systems Testing (Structural) Feature Interactions for Variability-Intensive Systems Testing
(Structural) Feature Interactions for Variability-Intensive Systems Testing
 
Paderborn
PaderbornPaderborn
Paderborn
 
A PNML extension for the HCI design
A PNML extension for the HCI designA PNML extension for the HCI design
A PNML extension for the HCI design
 
Phd defence presentation
Phd defence presentationPhd defence presentation
Phd defence presentation
 
Multiprocessor scheduling 2
Multiprocessor scheduling 2Multiprocessor scheduling 2
Multiprocessor scheduling 2
 
resume v 5.0
resume v 5.0resume v 5.0
resume v 5.0
 
IEEE Fuzzy system Title and Abstract 2016
IEEE Fuzzy system Title and Abstract 2016 IEEE Fuzzy system Title and Abstract 2016
IEEE Fuzzy system Title and Abstract 2016
 
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-B...
 
Mise14 @ ICSE1 14 Uncertainty in Bidirectional Transformations
Mise14 @ ICSE1 14 Uncertainty in Bidirectional TransformationsMise14 @ ICSE1 14 Uncertainty in Bidirectional Transformations
Mise14 @ ICSE1 14 Uncertainty in Bidirectional Transformations
 
Goal Decomposition and Abductive Reasoning for Policy Analysis and Refinement
Goal Decomposition and Abductive Reasoning for Policy Analysis and RefinementGoal Decomposition and Abductive Reasoning for Policy Analysis and Refinement
Goal Decomposition and Abductive Reasoning for Policy Analysis and Refinement
 
Human-centered AI: how can we support end-users to interact with AI?
Human-centered AI: how can we support end-users to interact with AI?Human-centered AI: how can we support end-users to interact with AI?
Human-centered AI: how can we support end-users to interact with AI?
 
End-to-End Joint Learning of Natural Language Understanding and Dialogue Manager
End-to-End Joint Learning of Natural Language Understanding and Dialogue ManagerEnd-to-End Joint Learning of Natural Language Understanding and Dialogue Manager
End-to-End Joint Learning of Natural Language Understanding and Dialogue Manager
 
Week_03-Agile Developmnet.ppt
Week_03-Agile Developmnet.pptWeek_03-Agile Developmnet.ppt
Week_03-Agile Developmnet.ppt
 
Model Evaluation in the land of Deep Learning
Model Evaluation in the land of Deep LearningModel Evaluation in the land of Deep Learning
Model Evaluation in the land of Deep Learning
 
International Journal of Computer Science and Security Volume (1) Issue (1)
International Journal of Computer Science and Security Volume (1) Issue (1)International Journal of Computer Science and Security Volume (1) Issue (1)
International Journal of Computer Science and Security Volume (1) Issue (1)
 
Model Manipulation for End-User Modelers
Model Manipulation for End-User ModelersModel Manipulation for End-User Modelers
Model Manipulation for End-User Modelers
 
Mis
MisMis
Mis
 

Mais de CS, NcState

Ai4se lab template
Ai4se lab templateAi4se lab template
Ai4se lab template
CS, NcState
 
Dagstuhl14 intro-v1
Dagstuhl14 intro-v1Dagstuhl14 intro-v1
Dagstuhl14 intro-v1
CS, NcState
 
How to do better experiments in SE
How to do better experiments in SEHow to do better experiments in SE
How to do better experiments in SE
CS, NcState
 
Icse 2013-tutorial-data-science-for-software-engineering
Icse 2013-tutorial-data-science-for-software-engineeringIcse 2013-tutorial-data-science-for-software-engineering
Icse 2013-tutorial-data-science-for-software-engineering
CS, NcState
 
Dm sei-tutorial-v7
Dm sei-tutorial-v7Dm sei-tutorial-v7
Dm sei-tutorial-v7
CS, NcState
 

Mais de CS, NcState (19)

Future se oct15
Future se oct15Future se oct15
Future se oct15
 
GALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software EngineeringGALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software Engineering
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
 
Icse15 Tech-briefing Data Science
Icse15 Tech-briefing Data ScienceIcse15 Tech-briefing Data Science
Icse15 Tech-briefing Data Science
 
Kits to Find the Bits that Fits
Kits to Find  the Bits that Fits Kits to Find  the Bits that Fits
Kits to Find the Bits that Fits
 
Ai4se lab template
Ai4se lab templateAi4se lab template
Ai4se lab template
 
172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia
 
Automated Software Engineering
Automated Software EngineeringAutomated Software Engineering
Automated Software Engineering
 
Dagstuhl14 intro-v1
Dagstuhl14 intro-v1Dagstuhl14 intro-v1
Dagstuhl14 intro-v1
 
Know thy tools
Know thy toolsKnow thy tools
Know thy tools
 
The Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software DataThe Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software Data
 
What Metrics Matter?
What Metrics Matter? What Metrics Matter?
What Metrics Matter?
 
Sayyad slides ase13_v4
Sayyad slides ase13_v4Sayyad slides ase13_v4
Sayyad slides ase13_v4
 
Ase2013
Ase2013Ase2013
Ase2013
 
Warning: don't do CS
Warning: don't do CSWarning: don't do CS
Warning: don't do CS
 
How to do better experiments in SE
How to do better experiments in SEHow to do better experiments in SE
How to do better experiments in SE
 
Icse 2013-tutorial-data-science-for-software-engineering
Icse 2013-tutorial-data-science-for-software-engineeringIcse 2013-tutorial-data-science-for-software-engineering
Icse 2013-tutorial-data-science-for-software-engineering
 
Dm sei-tutorial-v7
Dm sei-tutorial-v7Dm sei-tutorial-v7
Dm sei-tutorial-v7
 
Franhouder july2013
Franhouder july2013Franhouder july2013
Franhouder july2013
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Requirements, Design and Data Repositories

  • 1. Addressing the QoS drift in Specification Models of Self-adaptive service-based systems Romina Torres (1), Nelly Bencomo(2), Hernán Astudillo(1) (1)Universidad Técnica Federico Santa María (2)INRIA Paris-Rocquencourt 2nd International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE – Mayo 2012) 1
  • 3. Introduction • Dynamic adaptive systems must be able to adapt themselves during runtime to cope with the uncertainty associated with changes in their goals or in the environment in which they operate WITH NO (OR LIMITED) HUMAN INTERVENTION. 3
  • 4. Requirements (R): Send the weather prediction for the weekend to the user wherever he is as fast as possible. Functional goals and non functional constraints Specifications (S) M. Mannion, B.Keepence. 1995. SMART requirements. SIGSOFT Softw. Eng. Notes, or GQM 4
  • 5. Specifications (S) Architectural Configuration (C)  f(S)=C’ During Runtime proactive reactive 5 P. Zaveand M. Jackson, “Fourdarkcornersofrequirementsengineering,” 1997 ACM Txson SE &Metho Adaptation
  • 6. PROBLEM Perceptual Systems under changing environments 6
  • 9. Problem • Cause: – Perceptual systems may be degraded when environments are highly changing • Implication – Specification models (S) may be degraded due to the highly changing service market • Self-adaptive Service-based systems may miss requirements violations because S is not anymore a valid representation of R. D. Hall, “Automaticparameterregulationofperceptualsystems,” ImageandVisionComputing, vol. 24, no. 8, pp. 870 – 881, 2006. 9
  • 10. The natural solution to the challenge • Humans should regularly and manually maintain their specification models in order to ensure they are a valid representation of their requirements during runtime 10
  • 11. But… • Dynamic adaptive systems must be able to adapt themselves during runtime to cope with the uncertainty associated with changes in their goals or in the environment in which they operate WITH NO (OR LIMITED) HUMAN INTERVENTION. • Humans cannot be aware of a huge and highly dynamic operating environment (partial views) 11
  • 12. The real required solution • Specification models must be automatically maintained during runtime in order to maintain them as valid representations of the humans requirements 12
  • 14. Related Work I. Epifani, C. Ghezzi, R. Mirandola, G. Tamburrelli. “Modelevolution by run-time parameteradaptation”. ICSE '09 [Firelli et al. 2011] [Cardenilli et al 2011] [Calinescu et al. 2011] [Calinescu et al. 2012] • [Epifani et al. 2009] – Humans estimations are seldom correct + in dynamic environments, the value of parameters may change over time • keeping models alive during runtime and maintaining updated the parameters by feeding a bayesian estimator with data collected from the running system • Parameters always are average values – Problem: humans cannot constraint properly their functional goals 14
  • 15. PROPROSAL Computing with words + strategy to detect drifts on words 15
  • 16. Our proposal • A constraint language for humans to specify the NFCs in the specification models using concepts instead of numerical ranges. • Necessarily we also need – An architecture capable to assess “abstract specification models” – An infrastructure capable to obtain from the NFPs of the offerings of the service market the numerical meaning of the concepts. • Initial values • Each time there is enough evidence a drift has occurred in the NFPs 16
  • 17. Preliminaries • Computing with words (CWW) • Words instead of numbers for computing and reasoning • Words constrain linguistic variables – Fuzzy sets LoftiZadeh. “FuzzyLogic = ComputingwithWords”. IEEE TxsonFuzzy Systems 1996 Language to define NFCs 17
  • 19. Preliminaries • Specification models become linguistic decisions models • How do we assess them? – Perceptual Computer – an architecture for CWW J. M. Mendel, D. Wu. “ChallengesforPerceptualComputerApplicationsand How TheyWere Overcome”. IEEE ComputationalIntelligence Magazine, 2012. L. Martínez, D. Ruan, F. Herrera, E. Herrera-Viedma, P. P. Wang: Linguistic decision making: Tools and applications. Inf. Sci. 179(14): 2297-2298 (2009) 19
  • 21. Preliminaries • Concept drift occurswhenthecontextshifts induce changes in thetargetconcept • Functionally-equivalentservices are continuouslycompeting in termsofQoStoachievetheirownsurvivalgoal: to be selected • Perceptionsaboutwhatmeanseachconceptofea ch NFP ofeachfunctionalgroupofserviceschange 21
  • 22. Preliminaries G. Leng, X.-J. Zeng, and J. A. Keane, “A hybridlearningalgorithmwith a similarity- basedpruningstrategyforself-adaptiveneuro-fuzzysystems,” AppliedSoftComputing 2009. – randomnoise, – randomtrends (gradual changes), – randomsubstitutions (abruptchanges), – orsystematictrends We record also the trend of the drift and we base our decision on the trend history of the past “potential” drifts 22 Outliers?
  • 24. 24
  • 26. Validation Strategy • Prototype Implementation of Adaptive • Dataset from programmableweb.com – 10 functional categories, 2 non-functional properties, over 150 services (3000 “words”). – 5 SBSs clients subscribing their adaptation needs – 3 QoS drifts synthetically simulated in a window of 10 new NFP certifications. • We were able to detect requirements violations where configurations become relative violators because others functionally-equivalent competitors improve their QoS. => reduction of false negative error 26
  • 28. Conclusions • Current systems are being released too fragile – Lack of self-monitoring and self-repairing capabilities – Lack of awareness – Self-adaptive Systems demands systems “maintainability” be performed automatically – But even manually it is performed poorly • So, still there is a lot of work on the SE side 28
  • 29. Ongoing and future work • Tuning Adaptive • False positives? • Stress testing - Scalability • Sensitivity analysis - Parameters tradeoff • New techniques to mitigate the obsolescence of models during runtime • Release dataset of measurements of NFPs of services during a frame of time where several QoS drifts may occur. 29
  • 30. Acknowledgements This work was partially funded by UTFSM DGIP (PIIC and 241167), BASAL FB0821, Conicyt Chile, the EU Connect project and the EU Marie Curie Requirements@runtime. 30