Do We Need to Handle Every Temporal Violation in Scientific Workflow Systems?

被引:58
作者
Liu, Xiao [1 ,2 ]
Yang, Yun [2 ,3 ]
Yuan, Dong [2 ]
Chen, Jinjun [4 ]
机构
[1] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Inst Software Engn, Shanghai 200062, Peoples R China
[2] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
[3] Anhui Univ, Sch Comp Sci & Technol, Hefei 230039, Peoples R China
[4] Univ Technol Sydney, Fac Engn & Informat Technol, Sydney, NSW 2007, Australia
基金
澳大利亚研究理事会;
关键词
Algorithms; Performance; Reliability; Verification; Scientific workflows; temporal constraints; temporal verification; violation handling point selection; quality of service; DYNAMIC VERIFICATION; CONSTRAINTS; TAXONOMY;
D O I
10.1145/2559938
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Scientific processes are usually time constrained with overall deadlines and local milestones. In scientific workflow systems, due to the dynamic nature of the underlying computing infrastructures such as grid and cloud, execution delays often take place and result in a large number of temporal violations. Since temporal violation handling is expensive in terms of both monetary costs and time overheads, an essential question aroused is "do we need to handle every temporal violation in scientific workflow systems?" The answer would be "true" according to existing works on workflow temporal management which adopt the philosophy similar to the handling of functional exceptions, that is, every temporal violation should be handled whenever it is detected. However, based on our observation, the phenomenon of self-recovery where execution delays can be automatically compensated for by the saved execution time of subsequent workflow activities has been entirely overlooked. Therefore, considering the nonfunctional nature of temporal violations, our answer is "not necessarily true." To take advantage of self-recovery, this article proposes a novel adaptive temporal violation handling point selection strategy where this phenomenon is effectively utilised to avoid unnecessary temporal violation handling. Based on simulations of both real-world scientific workflows and randomly generated test cases, the experimental results demonstrate that our strategy can significantly reduce the cost on temporal violation handling by over 96% while maintaining extreme low violation rate under normal circumstances.
引用
收藏
页数:34
相关论文
共 43 条
  • [1] MAINTAINING KNOWLEDGE ABOUT TEMPORAL INTERVALS
    ALLEN, JF
    [J]. COMMUNICATIONS OF THE ACM, 1983, 26 (11) : 832 - 843
  • [2] [Anonymous], 2009, GRID COMPUTING INFRA
  • [3] [Anonymous], 2007, Workflows for E-Science: Scientific Workflows for Grids
  • [4] Advanced exception handling mechanisms
    Buhr, PA
    Mok, WYR
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2000, 26 (09) : 820 - 836
  • [5] Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    Buyya, Rajkumar
    Yeo, Chee Shin
    Venugopal, Srikumar
    Broberg, James
    Brandic, Ivona
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06): : 599 - 616
  • [6] Adaptive Selection of Necessary and Sufficient Checkpoints for Dynamic Verification of Temporal Constraints in Grid Workflow Systems
    Chen, Jinjun
    Yang, Yun
    [J]. ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2007, 2 (02)
  • [7] A taxonomy of grid workflow verification and validation
    Chen, Jinjun
    Yang, Yun
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2008, 20 (04) : 347 - 360
  • [8] Multiple states based temporal consistency for dynamic verification of fixed-time constraints in Grid workflow systems
    Chen, Jinjun
    Yang, Yun
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2007, 19 (07) : 965 - 982
  • [9] Temporal Dependency-Based Checkpoint Selection for Dynamic Verification of Temporal Constraints in Scientific Workflow Systems
    Chen, Jinjun
    Yang, Yun
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2011, 20 (03)
  • [10] Chen JJ, 2008, ICSE'08 PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, P141, DOI 10.1145/1368088.1368108