2015
DOI: 10.1007/s11334-015-0270-6
|View full text |Cite
|
Sign up to set email alerts
|

Run-time monitoring using bounded constraint instance discovery within big data streams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…This section presents the contributions related to the monitoring of service-oriented systems. The market for monitoring systems and tools that observe the run-time behavior is evolving rapidly [8,19,21]. However, most of existing solutions have not been designed and implemented with SOA applications in focus.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This section presents the contributions related to the monitoring of service-oriented systems. The market for monitoring systems and tools that observe the run-time behavior is evolving rapidly [8,19,21]. However, most of existing solutions have not been designed and implemented with SOA applications in focus.…”
Section: Related Workmentioning
confidence: 99%
“…If the RM U module obtains the client's request, to which the response has already been saved, then such a saved response is sent to the client, and there is no necessity to send this request once again to the service (in this way the mechanism of communication history is also used to ensure idempotency of all requests). However, when client B invokes service X (client and invoked service have separate default RM U modules), then a client obtains the URI of requested service default RM U from its default RM U (7,8), and sends back this information to the CIM (9), which reissues the request to a proper RM U (10,11).…”
Section: Outline Of Reserve Processingmentioning
confidence: 99%
“…DStreams can be created either from input data stream from sources such as Kafka, Flume, and Twitter, or by applying high-level operations on other DStreams. More details about Spark Streaming are presented by Drusinsky (2016).…”
Section: Related Workmentioning
confidence: 99%