21.01.2014 Views

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

100 times each. All the activity durations are generated by the normal distribution<br />

model. The st<strong>and</strong>ard deviation is set as 10% <strong>of</strong> the mean activity duration to<br />

represent dynamic system performance. We have also implemented other<br />

representative distribution models such as exponential, uniform <strong>and</strong> a mixture <strong>of</strong><br />

them (as will be demonstrated in Figure 6.3). Since the experimental results are<br />

similar, this section only demonstrates the results with normal distribution.<br />

The constraint setting utilises the strategy introduced in [55] <strong>and</strong> the initial<br />

probability is set reasonably as 90% to serve as a type <strong>of</strong> QoS contract between<br />

users <strong>and</strong> service providers which is agreed at scientific workflow build time. Here<br />

the initial probability means that a scientific workflow has a 90% probability to<br />

finish on time, or in other words, 90% workflow instances can finish on time.<br />

Therefore, in our experiment, we specify the “satisfactory temporal correctness” as a<br />

temporal violation rate below 10% so as to meet the QoS contract. Here, we conduct<br />

three rounds <strong>of</strong> independent experiments where the temporal constraints are set with<br />

different normal percentiles <strong>of</strong> 1.00, 1.15 <strong>and</strong> 1.28 which denotes the probability <strong>of</strong><br />

84.1%, 87.5% <strong>and</strong> 90.0% for on-time completion without any h<strong>and</strong>ling strategies on<br />

temporal violations (denoted as COM(1.00), COM(1.15) <strong>and</strong> COM(1.28)).The<br />

average length <strong>of</strong> the workflow segments is set as 20 which is a moderate size for a<br />

workflow sub-process similar to those high-level activities depicted in Figure 1.1.<br />

Meanwhile, although under normal circumstances, the experiments can be<br />

conducted without noises (i.e. 0% noise), to simulate some worse case scenarios,<br />

r<strong>and</strong>om noises (i.e. a fixed rate <strong>of</strong> delays at r<strong>and</strong>om activities) are also injected to<br />

simulate extra delays accordingly along workflow execution due to potential<br />

unpredictable causes such as system overload <strong>and</strong> resource unavailability. For the<br />

comparison purpose, four rounds <strong>of</strong> simulation experiments with different r<strong>and</strong>om<br />

noise levels <strong>of</strong> 0%, 10%, 20% <strong>and</strong> 30% are conducted. Since the st<strong>and</strong>ard deviation<br />

<strong>of</strong> activity durations are set as 10% <strong>of</strong> the mean values, according to the “ 3 σ ” rule,<br />

there is a scarce chance that the noises, i.e. the delays, would exceed 30% <strong>of</strong> the<br />

mean durations [87]. Therefore, we set the upper bound <strong>of</strong> noises as 30% to<br />

investigate the effectiveness <strong>of</strong> our strategy under extreme situations. As for<br />

h<strong>and</strong>ling temporal violations, there are many temporal violation h<strong>and</strong>ling strategies<br />

available (as will be overviewed in Section 8.2). In our experiments, we choose<br />

workflow local rescheduling which is one <strong>of</strong> the most widely applied temporal<br />

99

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!