\u3cp\u3eContinuous deployment techniques support rapid deployment of new software versions. Usually a new version is deployed on a limited scale, its behavior is monitored and compared against the previously deployed version and either the deployment of the new version is broadened, or one reverts to the previous version. The existing monitoring approaches, however, do not capture the differences in the execution behavior between the new and the previously deployed versions. We propose an approach to automatically discover execution behavior models for the deployed and the new version using the execution logs. Differences between the two models are identified and enriched such that spurious differences, e.g., due to logging statement modif...
Software performance anomaly detection is a major challenge in complex industrial cyber-physical sys...
Developers evolve a software system by changing the pro-gram source code, by modifying its context b...
Computer applications, such as servers, databases and middleware, ubiquitously emit execution traces...
Continuous deployment techniques support rapid deployment of new software versions. Usually a new ve...
The common and most often used models of software’s behavior are described and examined, advantages ...
A number of hardware and software techniques have been proposed to detect dynamic program behaviors ...
Software Testing is the process used to assure the correctness, completeness, performance, security ...
This paper presents a scenario-based approach for the evaluation of the quality attribute of perform...
Software updates made by developers often achieve their intendedpurpose, but these updates may also ...
Modern software systems are composed of several services which may be developed and maintained by th...
Abstract—Failure of application operations is one of the main causes of system-wide outages in cloud...
It is important to detect problems fast and to have a clear overview of what is happening within a s...
Abstract. Software fault localization involves locating the exact cause of error for a “failing ” ex...
UML sequence diagrams have been widely used during requirements analysis and design for specifying ...
The full behavior of complex software systems often only emerges during operation. They thus need to...
Software performance anomaly detection is a major challenge in complex industrial cyber-physical sys...
Developers evolve a software system by changing the pro-gram source code, by modifying its context b...
Computer applications, such as servers, databases and middleware, ubiquitously emit execution traces...
Continuous deployment techniques support rapid deployment of new software versions. Usually a new ve...
The common and most often used models of software’s behavior are described and examined, advantages ...
A number of hardware and software techniques have been proposed to detect dynamic program behaviors ...
Software Testing is the process used to assure the correctness, completeness, performance, security ...
This paper presents a scenario-based approach for the evaluation of the quality attribute of perform...
Software updates made by developers often achieve their intendedpurpose, but these updates may also ...
Modern software systems are composed of several services which may be developed and maintained by th...
Abstract—Failure of application operations is one of the main causes of system-wide outages in cloud...
It is important to detect problems fast and to have a clear overview of what is happening within a s...
Abstract. Software fault localization involves locating the exact cause of error for a “failing ” ex...
UML sequence diagrams have been widely used during requirements analysis and design for specifying ...
The full behavior of complex software systems often only emerges during operation. They thus need to...
Software performance anomaly detection is a major challenge in complex industrial cyber-physical sys...
Developers evolve a software system by changing the pro-gram source code, by modifying its context b...
Computer applications, such as servers, databases and middleware, ubiquitously emit execution traces...