PERFORMANCE MODELING AND ANALYSIS OF SOFTWARE ARCHITECTURES SPECIFIED THROUGH GRAPH TRANSFORMATIONS

被引:0
作者
Naddaf, Mahdi Rahimi [1 ]
Rafe, Vahid [1 ]
机构
[1] Arak Univ, Fac Engn, Dept Comp Engn, Arak 3815688349, Iran
关键词
Graph transformation system; PEPA; performance model; software architecture; SYSTEMS; LANGUAGE;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Software architecture plays an important role in the success of modern, large and distributed software systems. For many of the software systems - especially safety-critical ones - it is important to specify their architectures using formal modeling notations. In this case, it is possible to assess different functional and nonfunctional properties on the designed models. Graph Transformation System (GTS) is a formal yet understandable language which is suitable for architectural modeling. Most of the existing works done on architectural modeling and analysis by GTS are concentrated on functional aspects, while for many systems it is crucial to consider non-functional aspects for modeling and analysis at the architectural level. In this paper, we present an approach to performance analysis of software architectures specified through GTS. To do so, we first enrich the existing architectural style specified through GTS - with performance information. Then, the performance models are generated in PEPA (Performance Evaluation Process Algebra) - a formal language based on the stochastic process algebra - using the enriched GTS models. Finally, we analyze different features like throughput, utilization of different software components, etc. on the generated performance models. All the main concepts are illustrated through a case study.
引用
收藏
页码:797 / 826
页数:30
相关论文
共 50 条
[41]   Using deep reinforcement learning to search reachability properties in systems specified through graph transformation [J].
Mehrabi, Mohammad Javad ;
Rafe, Vahid .
SOFT COMPUTING, 2022, 26 (18) :9635-9663
[42]   Using deep reinforcement learning to search reachability properties in systems specified through graph transformation [J].
Mohammad Javad Mehrabi ;
Vahid Rafe .
Soft Computing, 2022, 26 :9635-9663
[43]   Efficient deadlock analysis of component-based software architectures [J].
Lambertz, Christian ;
Majster-Cederbaum, Mila .
SCIENCE OF COMPUTER PROGRAMMING, 2013, 78 (12) :2488-2510
[44]   Self-healing based software architecture modeling and analysis through a case study [J].
Wang, JW ;
Guo, CH ;
Liu, FY .
2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, 2005, :873-877
[45]   Leveraging Software Architectures through the ISO/IEC 42010 Standard: A Feasibility Study [J].
Tamburri, Damien A. ;
Lago, Patricia ;
Muccini, Henry .
TRENDS IN ENTERPRISE ARCHITECTURE RESEARCH, 2010, 70 :71-+
[46]   MODELING THE PERFORMANCE OF GEOMETRIC MULTIGRID STENCILS ON MULTICORE COMPUTER ARCHITECTURES [J].
Ghysels, Pieter ;
Vanroose, Wim .
SIAM JOURNAL ON SCIENTIFIC COMPUTING, 2015, 37 (02) :C194-C216
[47]   What is the performance in public hospitals? A longitudinal analysis of performance plans through topic modeling [J].
Noto, Guido ;
Lo Verso, Andrea Carlo ;
Barresi, Gustavo .
BMC HEALTH SERVICES RESEARCH, 2021, 21 (01)
[48]   From monolithic to component-based performance evaluation of software architectures A series of experiments analysing accuracy and effort [J].
Martens, Anne ;
Koziolek, Heiko ;
Prechelt, Lutz ;
Reussner, Ralf .
EMPIRICAL SOFTWARE ENGINEERING, 2011, 16 (05) :587-622
[49]   xNet: Modeling Network Performance With Graph Neural Networks [J].
Huang, Sijiang ;
Wei, Yunze ;
Peng, Lingfeng ;
Wang, Mowei ;
Hui, Linbo ;
Liu, Peng ;
Du, Zongpeng ;
Liu, Zhenhua ;
Cui, Yong .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (02) :1753-1767
[50]   MBTA: A Model-Based Threat Analysis Approach for Software Architectures [J].
Motii, Anas .
COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2023, 2023, 14181 :121-134