A Harmony Search Based Algorithm for Detecting Distributed Predicates
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 10
Abstract
Detection of distributed predicates (also referred to as runtime verification) can be used to verify that a particular run of a given distributed program satisfies certain properties (represented as predicates). Consequently, distributed predicates detection techniques can be used to effectively improve the dependability of a given distributed application. Due to concurrency, the detection of distributed predicates can incur significant overhead. Most of the effective techniques developed to solve this problem work efficiently for certain classes of predicates, like conjunctive predicates. In this paper, we have presented a technique based on harmony search to efficiently detect the satisfaction of a predicate under the possibly modality. We have implemented the proposed technique and we have conducted several experiments to demonstrate its effectiveness.
Authors and Affiliations
Eslam Maghayreh
User Perspective on External Value Creation Factors in Indonesia e-Commerce
Value creation is very important for the e-commerce companies in order to reach customers and increase company's value in the view of customer. Value creation mostly developed based on internal factor of the company. Thi...
Towards a Context-Dependent Approach for Evaluating Data Quality Cost
Data-related expertise is a central and determining factor in the success of many organizations. Big Tech companies have developed an operational environment that extracts benefit from collected data to increase the effi...
Fuzzy Based Evaluation of Software Quality Using Quality Models and Goal Models
Software quality requirements are essential part for the success of software development. Defined and guaranteed quality in software development requires identifying, refining, and predicting quality properties by approp...
Design of an Efficient Steganography Model using Lifting based DWT and Modified-LSB Method on FPGA
The data transmission with information hiding is a challenging task in today world. To protect the secret data or image from attackers, the steganography techniques are essential. The steganography is a process of hiding...
Developing a New Integrated Model to improve the using of Classical Approach in Designing Management Information Systems
Management information system (MIS) is used to solve management problems in the practical life, the designing and building of the management information systems is done by using one of the systems development methodologi...