2018
DOI: 10.1007/978-3-030-03596-9_58
|View full text |Cite
|
Sign up to set email alerts
|

Runtime Monitoring in Continuous Deployment by Differencing Execution Behavior Model

Abstract: DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…Indeed, as discussed by the interviewed developers, when logging software systems, developers need to make several trade-offs. A significant amount of effort has been made in the research community to study such questions as where to log (Fu et al 2014;Li et al 2018), what to log (Zhu et al 2015), how to log (Chen et al 2017) and how to use logs (Gupta et al 2018); and such challenges as absence of logs (Li et al 2020a), non-standard logging (Pecchia et al 2015), and presence of noise and incomplete logging (Li et al 2020a).…”
Section: Log Instrumentationmentioning
confidence: 99%
“…Indeed, as discussed by the interviewed developers, when logging software systems, developers need to make several trade-offs. A significant amount of effort has been made in the research community to study such questions as where to log (Fu et al 2014;Li et al 2018), what to log (Zhu et al 2015), how to log (Chen et al 2017) and how to use logs (Gupta et al 2018); and such challenges as absence of logs (Li et al 2020a), non-standard logging (Pecchia et al 2015), and presence of noise and incomplete logging (Li et al 2020a).…”
Section: Log Instrumentationmentioning
confidence: 99%
“…Execution logs are one of the sources that can be used to model the execution behavior [38]. Goldstein et al [39] present an algorithm to visualize behavioral differences using execution logs in four steps.…”
Section: B Execution Differencingmentioning
confidence: 99%
“…In addition, given the caused permissive verification is perceived as a risk by our interviewees, we suggest proposing possible alternatives to SSSM-IMs by investigating the order in which events are actually being called during system operation. One can consider analysing the execution traces of the generated code with pattern mining techniques widely studied in the field of model learning (Yang et al 2019;Wieman et al 2017;Aslam et al 2018), specification mining (Lemieux et al 2015;Lo et al 2011) andprocess mining (van der Aalst 2011;van der Werf et al 2009;Gupta et al 2018).…”
Section: H4mentioning
confidence: 99%