21.01.2014 Views

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

Xiao Liu PhD Thesis.pdf - Faculty of Information and Communication ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

time-series pattern based forecasting strategy (presented in Chapter 4) <strong>and</strong> the four<br />

basic building blocks (presented in Section 5.3.1), high quality coarse-grained<br />

temporal constraints can be assigned through effective negotiation process between<br />

service users <strong>and</strong> service providers. Afterwards, fine-grained temporal constraints<br />

can be derived <strong>and</strong> propagated along scientific cloud workflow in an automatic<br />

fashion. Therefore, given a set <strong>of</strong> high quality coarse-grained <strong>and</strong> fine-grained<br />

temporal constraints, the time overheads <strong>and</strong> computation cost for temporal<br />

constraints setting are much smaller compared with conventional manual settings.<br />

Therefore, we can claim that Component I is cost effective.<br />

For Component II (temporal consistency monitoring), with the novel probability<br />

based temporal consistency model (presented in Section 5.2) <strong>and</strong> the definition <strong>of</strong><br />

statistically recoverable <strong>and</strong> non-recoverable temporal violations (presented in<br />

Section 6.2), only one type <strong>of</strong> checkpoint needs to be selected <strong>and</strong> only one type <strong>of</strong><br />

temporal consistency state needs to be verified. Therefore, given the same necessity<br />

<strong>and</strong> sufficiency, the overall cost for checkpoint selection <strong>and</strong> temporal verification<br />

can be significantly reduced comparing with conventional multi-state based<br />

temporal consistency based strategies. Therefore, we can claim that Component II is<br />

cost effective.<br />

For Component III (temporal violation h<strong>and</strong>ling), with the novel adaptive<br />

temporal violation h<strong>and</strong>ling point selection strategy (presented in Chapter 7) which<br />

only selects a small subset <strong>of</strong> necessary <strong>and</strong> sufficient checkpoints, <strong>and</strong> the threelevel<br />

temporal violation h<strong>and</strong>ling strategy (presented in Chapter 8) which consists <strong>of</strong><br />

three light-weight h<strong>and</strong>ling strategies, viz. PTDA, ACOWR (based on the proposed<br />

general two-stage local workflow rescheduling strategy) <strong>and</strong> PTDA+ACOWR, the<br />

overall cost for temporal violation h<strong>and</strong>ing can be significantly reduced while<br />

maintaining high temporal QoS comparing with conventional temporal violation<br />

h<strong>and</strong>ling which is conducted at every necessary <strong>and</strong> sufficient checkpoint. Therefore,<br />

we can claim that Component III is cost effective.<br />

Note that the performance <strong>of</strong> the temporal framework may vary in different<br />

scientific cloud workflow system environments. Actually, in order to achieve the<br />

best performance, the settings <strong>and</strong> parameters for the components in our temporal<br />

framework can all be modified according to the real world system environments.<br />

Therefore, based on the statistics <strong>of</strong> system logs or other source <strong>of</strong> historical data in<br />

162

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!