Structured and Flexible Gray-box Composition Using Invasive Distributed Patterns
نویسنده
چکیده
The evolution of complex distributed software systems often requires intricate composition operations in order to adapt or add functionalities, to react to unanticipated changes, or to apply performance improvements that cannot be modularized in terms of existing services and components. These evolutions often need controlled access to selected parts of the implementation, e.g., to manage exceptional situations and crosscutting within services and their compositions. However, existing composition techniques typically support only interface-level (black-box) composition or arbitrary access to the implementation (gray-box or white-box composition). In this paper, we present a structured approach to the composition of complex software systems that require invasive modifications. Concretely, we provide three contributions: (i) we present a small kernel composition language for structured gray-box composition using invasive distributed patterns; (ii) we motivate that gray-box composition approaches should be defined and evaluated in terms of the flexibility and control they provide, a notion of degrees of invasiveness is introduced to help assess this trade-off; (iii) we apply our approach to a new case study of evolution and evaluate it in the context of two previous studies involving two real-world software systems: benchmarking of grid algorithms with NASGrid and transactional replication with JBoss Cache. As a main result, we show that gray-box composition using invasive distributed patterns allows the declarative and modular definition of evolutions of real-world applications that need moderate to high degrees of invasive modifications.
منابع مشابه
Structured and Flexible Gray-box Composition: Application to Task Rescheduling for Grid Benchmarking
The evolution of complex distributed software systems often requires intricate composition operations in order to adapt or add functionalities, react to unanticipated changes to security policies, or do performance improvements, which cannot be modularized in terms of existing services or components. They often need controlled access to selected parts of the implementation, e.g., to manage exce...
متن کاملGray Box Identification of State-Space Models Using Difference of Convex Programming
Gray-box identification is prevalent in modeling physical and networked systems. However, due to the nonconvex nature of the gray-box identification problem, good initial parameter estimates are crucial for a successful application. In this paper, a new identification method is proposed by exploiting the low-rank and structured Hankel matrix of impulse response. This identification problem is r...
متن کاملInvasive Composition By Transformation Systems
The most important strategy to deal with complex systems in computer science is the divide and conquer design paradigm. It works by recursively breaking down a problem into sub-problems until they become simple enough to be solved directly. The solutions to the sub-problems are then composed to give a solution for the whole problem. There are two kinds of composition: non-invasive and invasive ...
متن کاملSynthesis of Nano-Structured La0.6Sr0.4Co0.2Fe0.8O3 Perovskite by Co-Precipitation Method
Nano-structured lanthanum strontium cobalt ferrite, La0.6Sr0.4Co0.2Fe0.8O3 (LSCF), was successfully synthesized via co-precipitation method using metal nitrates as starting materials. Effects of precipitating agent and calcination temperature on the phase composition and morphology of synthesized powders were systematically studied using X-ray diffraction (XRD) and field emission scanning elect...
متن کاملDeveloping Reliable yet Flexible Software through If-Then Model Transformation Rules
Developing reliable yet flexible software is a hard problem. Although modeling methods enjoy a lot of advantages, the exclusive use of just one of them, in many cases, may not guarantee the development of reliable and flexible software. Formal modeling methods ensure reliability because they use a rigorous approach to software development. However, lack of knowledge and high cost practically fo...
متن کامل