Computer Science ›› 2019, Vol. 46 ›› Issue (11): 145-155.doi: 10.11896/jsjkx.181102210
• Software & Database Technology • Previous Articles Next Articles
LI Wen-hai, PENG Xin, DING DAN, XIANG Qi-lin, GUO Xiao-feng, ZHOU Xiang, ZHAO Wen-yun
CLC Number:
[1]JAMES L,MARTIN F.“Microservices” [EB/OL].[2018-715].https://martinfowler.com/articles/microservices.html. [2]ZIMMERMANN O.Microservices tenets[J].Computer Science-Research and Development,2017,32(3/4):301-310. [3]FRANCESCO P D,MALAVOLTA I,LAGO P.Research onArchitecting Microservices:Trends,Focus,and Potential for Industrial Adoption[C]∥IEEE International Conference on Software Architecture.2017:21-30. [4]HEORHIADI V,RAJAGOPALAN S,JAMJOOM H,et al.Gremlin:Systematic Resilience Testing of Microservices[C]∥IEEE International Conference on Distributed Computing Systems.2016:57-66. [5]ZHENG H,LI D,LIANG B,et al.Automated Test Input Generation for Android:Towards Getting There in an Industrial Case[C]∥IEEE/ACM International Conference on Software Engineering:Software Engineering in Practice Track.2017:253-262. [6]RUSLAN M.Microservices at Netflix Scale[EB/OL].[2018-715].https://gotocon.com/dl/goto-amsterdam-2016/slides/Rus-lanMeshenberg_MicroservicesAtNetflixScaleFirstPrinciplesTrade-offsLessonsLearned.pdf. [7]JAMSHIDI P,PAHL C,MENDONCA N C,et al.Microservices:The Journey So Far and Challenges Ahead[J].IEEE Software,2018,35(3):24-35. [8]ZHOU X,PENG X,XIE T,et al.Benchmarking Microservice Systems for Software Engineering Research[C]∥Proceedings of International Conference on Software Engineering:Companion Proceeedings.2018:323-324. [9]DO N H,DO T V,XUAN T T,et al.A scalable routing mechanism for stateful microservices[C]∥Innovations in Clouds,Internet & Networks.2017:72-78. [10]SHASHA M.Application Delivery Service Challenges in Microservices-based Applications[EB/OL].[2018-7-21].http://www.thefabricnet.com/application-delivery-service-challenges-in-microservices-based-applications/. [11]ZHOU X,PENG X,XIE T,et al.Delta debugging microservice systems[C]∥Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering.2018:802-807. [12]ZELLER A,HILDEBR R.Simplifying and Isolating Failure-Inducing Input[J].IEEE Transactions on Software Engineering,2002,28(2):183-200. [13]ZIPKIN.Zipkin[EB/OL].[2018-7-20].https://zipkin.io/. [14]JAEGER.Jaeger[EB/OL].[2018-7-20].https://www.jaegertracing.io/. [15]ELK.ELK Stack[EB/OL].[2018-7-20].https://www.elastic.co/elk-stack. [16]SHIVIZ.Shiviz[EB/OL].[2018-7-20].https://bestchai.bitbucket.io/shiviz/. [17]PAHL C,JAMSHIDI P.Microservices:A Systematic MappingStudy[C]∥International Conference on Cloud Computing & Services Science.2016:137-146. [18]HASSAN S,BAHSOON R.Microservices and Their DesignTrade-Offs:A Self-Adaptive Roadmap[C]∥IEEE International Conference on Services Computing.2016:813-818. [19]CAMARGO A D,SALVADORI I,MELLO R D S,et al.An architecture to automate performance tests on microservices[C]∥International Conference on Information Integration & Web-based Applications & Services.2016:422-429. [20]HEINRICH R,HOORN A V,KNOCHE H,et al.Performance Engineering for Microservices:Research Challenges and Directions[C]∥International Conference on Performance Enginee-ring Companion.2017:223-226. [21]SCHERMANN G,SCHÖNI D,LEITNER P,et al.Bifrost:Supporting Continuous Deployment with Automated Enactment of Multi-Phase Live Testing Strategies[C]∥International Middleware Conference.2016:12. [22]HASSELBRING W.Microservices for scalability:keynote talkabstract[C]∥Proceedings of the 7th ACM/SPEC on International Conference on Performance Engineering.2016:133-134. [23]KLOCK S,VAN DER WERF J M E M,GUELEN J P,et al.Workload-Based Clustering of Coherent Feature Sets in Microservice Architectures[C]∥IEEE International Conference on Software Architecture.2017:11-20. [24]LEITNERP,JURGEN C,EMANUEL S.Modelling and managing deployment costs of microservice-based cloud applications[C]∥International Conference on Utility & Cloud Computing.2016:165-174. [25]LIN J,LIN L C,HUANG S.Migrating web applications toclouds with microservice architectures[C]∥International Conference on Applied System Innovation (ICASI).2016:1-4. [26]百度百科.可视化[EB/OL].[2018-7-25].https://baike.baidu.com/item/%E5%8F%AF%E8%A7%86%E5%8C%96. [27]AntV.数据可视化概览[EB/OL].[2018-7-25].https://antv.alipay.com/zh-cn/vis/blog/vis-introduce.html. [28]YANG H.The Research and Implementation of Visual Log Analysis System[D].Xi’an:Xidian University,2010.(in Chinese) 杨华.可视化日志分析系统的研究与实现[D].西安:西安电子科技大学,2010. [29]ZHANG S,ZHAO J.Research advances on network securitylogs visualization[J].Journal of Frontiers of Computer Science and Technology,2018(5):681-696.(in Chinese) 张胜,赵珏.网络安全日志可视化分析研究进展[J].计算机科学与探索,2018(5):681-696. [30]HU G.Research and Implementation of The Network Security Log Data Analysis System[D].Beijing:Beijing University of Posts and Telecommunications,2012.(in Chinese) 胡钢.网络安全日志数据可视分析系统的研究与实现[D].北京:北京邮电大学,2012. [31]DONG Z W.Design and Implementation of Visual Analysis and Monitoring System for National Domain Name Log[D].Beijing:University of Chinese Academy of Sciences(School of Enginee-ring Science),2014.(in Chinese) 董再旺.国家域名日志可视化分析监控系统设计与实现[D].北京:中国科学院大学,2014. [32]CHEN W W,WU K C.Research and application of massiveDNS log data analysis and visualization[J].Application Research of Computers,2016,33(2):335-338.(in Chinese) 陈文文,吴开超.海量域名日志数据分析与可视化研究及应用[J].计算机应用研究,2016,33(2):335-338. [33]ZHAO G.Visualization Analysis Research of Website Usability and User Behavior Based on Web Server Log[D].Taiyuan:Shanxi University,2007.(in Chinese) 赵刚.基于Web日志的网站可用性及用户行为可视化分析方法研究[D].太原:山西大学,2007. [34]LU D.Implementation and Design of OPAC Search Log Visualize System[J].Modern Computer,2016(12):67-70.(in Chinese) 鲁丹.OPAC搜索日志可视化系统的设计与实现[J].现代计算机,2016(12):67-70. [35]APACHE FLUME.Welcome to Apache Flume[EB/OL].[2018-7-26].https://flume.apache.org/. [36]GITHUB.facebookarchive/scribe[EB/OL].[2018-7-26].https://github.com/facebookarchive/scribe/wiki. [37]LIU K.Architecture analysis and application of massive data log system[J].Journal of Changchun University of Technology,2016,37(6):581-586.(in Chinese) 刘锴.海量数据日志系统架构分析与应用[J].长春工业大学学报(自然科学版),2016,37(6):581-586. [38]CHEN J J,LIU H H.Distributed ELK log analysis systembased on Kubernetes[J].Electronic Technology & Software Engineering,2016(15):211-212.(in Chinese) 陈建娟,刘行行.基于Kubernetes的分布式ELK日志分析系统[J].电子技术与软件工程,2016(15):211-212. [39]BESCHASTNIKH I,WANG P,BRUN Y,et al.Debugging Distributed Systems[J].Queue,2016,14(2):91-110. [40]OPENTRACING.The OpenTracing Semantic Specification[EB/OL].[2018-7-26].https://opentracing.io/specification/. [41]SIGELMAN B H,BARROSO L A,BURROWS M.Dapper,a Large-Scale Distributed Systems Tracing Infrastructure[EB/OL].[2018-7-26].https://storage.googleapis.com/pub-tools-public-publication-data/pdf/36356.pdf. [42]JAEGER.Introduction[EB/OL].[2018-7-26].https://www.jaegertracing.io/docs/. [43]SEMATEXT.Jaeger vs Zipkin-OpenTracing Distributed Tracers[EB/OL].[2018-7-28].https://sematext.com/blog/jaeger-vs-zipkin-opentracing-distributed-tracers/. [44]INSTANA[EB/OL].[2018-7-28].https://www.instana.com/. [45]LUXBURG U V.A tutorial on spectral clustering[J].Statistics &Computing,2007,17(4):395-416. [46]TECHBEACON.3 reasons why you should always run microservices apps in containers[EB/OL].[2018-7-28].https://techbeacon.com/3-reasons-why-you-should-always-run-microserv-ices-apps-containers. [47]BUOYANT.What’s a service mesh? And why do I need one?[EB/OL].[2018-7-28].https://blog.buoyant.io/2017/04/25/whats-a-service-mesh-and-why-do-i-need-one/. [48]KUBERNETES[EB/OL].[2018-7-28].https://kubernetes.io/. [49]ISTIO[EB/OL].[2018-7-28].https://istio.io/. [50]SUGIYAMA K,TAGAWA S,TODA M.Methods for VisualUnderstanding of Hierarchical System Structures[J].IEEE Transactions on Systems,Man and Cybernetics,1981,11(2):109-125. [51]沪江网.以红色为主的色彩搭配,值得推荐[EB/OL].[2018-7-28].https://www.hujiang.com/fyuid_s/p886132/. [52]新浪博客.用户体验设计之圆角和直角[EB/OL].[2018-7-28].http://blog.sina.com.cn/s/blog_5d7170af0101dnpk.html. [53]GITHUB.Dagrejs[EB/OL].[2018-7-29].https://github.com/dagrejs/dagre-d3. [54]GITHUB.Rogen319/logvisualization_trainticket[EB/OL].[2018-7-28].https://github.com/Rogen319/logvisualization_trainticket.git. |
[1] | WU Zi-yi, LI Shao-mei, JIANG Meng-han, ZHANG Jian-peng. Ontology Alignment Method Based on Self-attention [J]. Computer Science, 2022, 49(9): 215-220. |
[2] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[3] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[4] | WANG Yan-song, QIN Yun-chuan, CAI Yu-hui, LI Ken-li. Design and Implementation of RPA System Based on UIA Interface [J]. Computer Science, 2022, 49(8): 225-229. |
[5] | YANG Xiao, WANG Xiang-kun, HU Hao, ZHU Min. Survey on Visualization Technology for Equipment Condition Monitoring [J]. Computer Science, 2022, 49(7): 89-99. |
[6] | LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339. |
[7] | XIAO Zhi-hong, HAN Ye-tong, ZOU Yong-pan. Study on Activity Recognition Based on Multi-source Data and Logical Reasoning [J]. Computer Science, 2022, 49(6A): 397-406. |
[8] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[9] | CHEN Hui-pin, WANG Kun, YANG Heng, ZHENG Zhi-jie. Visual Analysis of Multiple Probability Features of Bluetongue Virus Genome Sequence [J]. Computer Science, 2022, 49(6A): 27-31. |
[10] | LI Jie, ZHONG Xiao-mei. Redundant Literals of Ternary Clause Sets in Propositional Logic [J]. Computer Science, 2022, 49(6A): 109-112. |
[11] | XU Si-yu, QIN Ke-yun. Topological Properties of Fuzzy Rough Sets Based on Residuated Lattices [J]. Computer Science, 2022, 49(6A): 140-143. |
[12] | WANG Wen-qiang, JIA Xing-xing, LI Peng. Adaptive Ensemble Ordering Algorithm [J]. Computer Science, 2022, 49(6A): 242-246. |
[13] | XIE Bai-lin, LI Qi, KUANG Jiang. Microblog Popular Information Detection Based on Hidden Semi-Markov Model [J]. Computer Science, 2022, 49(6A): 291-296. |
[14] | CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543. |
[15] | WANG Yu-jue, LIANG Yu-hao, WANG Su-qin, ZHU Deng-ming, SHI Min. Construction of Ontology Library for Machining Process of Mechanical Parts [J]. Computer Science, 2022, 49(6A): 661-666. |
|