首页> 外文会议>IEEE/ACM International Conference on Software Engineering >Dataflow Tunneling: Mining Inter-Request Data Dependencies for Request-Based Applications
【24h】

Dataflow Tunneling: Mining Inter-Request Data Dependencies for Request-Based Applications

机译:DataFlow隧道:用于基于请求的应用程序的挖掘Inter-Request数据依赖关系

获取原文

摘要

Request-based applications, e.g., most server-side applications, expose services to users in a request-based paradigm, in which requests are served by request-handler methods. An important task for request-based applications is inter-request analysis, which analyzes request-handler methods that are related by inter-request data dependencies together. However, in the request-based paradigm, data dependencies between related request-handler methods are implicitly established by the underlying frameworks that execute these methods. As a result, existing analysis tools are usually limited to the scope of each single method without the knowledge of dependencies between different methods. In this paper, we design an approach called dataflow tunneling to capture inter-request data dependencies from concrete application executions and produce data-dependency specifications. Our approach answers two key questions: (1) what request-handler methods have data dependencies and (2) what these data dependencies are. Our evaluation using applications developed with two representative and popular frameworks shows that our approach is general and accurate. We also present a characteristic study and a use case of cache tuning based on the mined specifications. We envision that our approach can provide key information to enable future inter-request analysis techniques.
机译:基于请求的应用程序,例如,大多数服务器端应用程序,在基于请求的范例中向用户公开服务,其中请求由请求处理程序提供服务。基于Lequest的应用程序的一个重要任务是Inter-Request分析,它分析了由请求间数据依赖关系相关的请求处理程序方法。但是,在基于请求的范例中,由执行这些方法的基础框架隐式建立相关请求 - 处理程序方法之间的数据依赖性。因此,现有的分析工具通常限于每个方法的范围,而不知道不同方法之间的依赖性的知识。在本文中,我们设计了一种名为DataFlow隧道的方法,以捕获来自具体应用程序执行的禁止帧间数据依赖性,并产生数据依赖性规范。我们的方法答案了两个关键问题:(1)什么请求处理程序方法具有数据依赖性和(2)这些数据依赖项是什么。我们使用与两个代表性和流行框架开发的应用程序的评估表明我们的方法是一般和准确的。我们还基于开采规范呈现了一个特征研究和高速缓存调整的用例。我们设想我们的方法可以提供关键信息,以实现未来的请求间分析技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号