[1] VERMA A, PEDROSA L, KORUPOLU M, et al. Large-scale cluster management at Google with Borg[C]//Proceedings of the 10th European Conference on Computer Systems. New York: ACM, 2015: 1-17.
[2] MEDEL V, RANA O, BA?ARES J á, et al. Modelling performance & resource management in kubernetes[C]//Proceedings of the 9th International Conference on Utility and Cloud Computing. New York: ACM, 2016: 257-262.
[3] ABDULLAH M T, QIDRI S, NURYADI W, et al. Failover cluster nodes and ISCSI storage area network on virtualization Windows server 2016[J]. Jurnal Online Informatika, 2020, 5(1): 89-96.
[4] JEFFORD-BAKER J. ALCOL: probabilistic threat modelling of the Amazon elastic container service domain[D]. Stockholm: KTH Royal Institute of Technology, 2019.
[5] JIN X, LI X, ZHANG H, et al. NetChain: scale-free sub-RTT coordination[C]//Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation, Renton, Apr 9-11, 2018: 35-49.
[6] LIU Z, BAI Z, LIU Z, et al. DistCache: provable load balancing for large-scale storage systems with distributed caching[C]//Proceedings of the 17th USENIX Conference on File and Storage Technologies, Boston, Feb 25-28, 2019: 143-157.
[7] LENKA R K, PADHI S, NAYAK K M. Fault injection techniques—a brief review[C]//Proceedings of the 2018 International Conference on Advances in Computing, Communication Control and Networking. Piscataway: IEEE, 2018: 832-837.
[8] TASKINSOY J. Typology of stress testing: microprudential vs. macroprudential stress testing of risk exposures[J]. SSRN Electronic Journal, 2019. DOI: 10.2139/ssrn.3361528.
[9] ZAMPETTI F, SCALABRINO S, OLIVETO R, et al. How open source projects use static code analysis tools in continuous integration pipelines[C]//Proceedings of the 2017 IEEE/ACM 14th International Conference on Mining Software Repositories. Piscataway: IEEE, 2017: 334-344.
[10] PASCARELLA L, SPADINI D, PALOMBA F, et al. Information needs in contemporary code review[J]. Proceedings of the ACM on Human-Computer Interaction, 2018, 2: 1-27.
[11] 祝义, 黄志球, 周航. 采用函数式语言的BPEL模型形式化验证方法[J]. 计算机科学与探索, 2018, 12(2): 185-196.
ZHU Y, HUANG Z Q, ZHOU H. Formal method for verifying BPEL model used by functional programming language[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(2): 185-196.
[12] EICHENBAUM B. The theory of the formal method[J]. Readings in Russian Poetics, 1965: 6.
[13] FAINEKOS G E, PAPPAS G J. Robustness of temporal logic specifications[M]//Formal Approaches to Software Testing and Runtime Verification. Berlin, Heidelberg: Springer, 2006: 178-192.
[14] PETRI C A, REISIG W. Petri net[J]. Scholarpedia, 2008, 3(4): 6477.
[15] VAN DER AALST W M P. Workflow verification: finding control-flow errors using petri-net-based techniques[M]//Business Process Management. Berlin, Heidelberg: Springer, 2000: 161-183.
[16] JENSEN K, KRISTENSEN L M. Colored Petri nets: a graphical language for formal modeling and validation of concurrent systems[J]. Communications of the ACM, 2015, 58(6): 61-70.
[17] JENSEN K, KRISTENSEN L M. Coloured Petri nets: modelling and validation of concurrent systems[M]. Springer Science & Business Media, 2009.
[18] JENSEN K, KRISTENSEN L M, WELLS L. Coloured Petri nets and CPN tools for modelling and validation of concurrent systems[J]. International Journal on Software Tools for Technology Transfer, 2007, 9(3): 213-254.
[19] SOURAVLAS S, KATSAVOUNIS S, ANASTASIADOU S. On modeling and simulation of resource allocation policies in cloud computing using colored Petri nets[J]. Applied Sciences, 2020, 10(16): 5644.
[20] SHAHIDINEJAD A, GHOBAEI-ARANI M, ESMAEILI L. An elastic controller using colored Petri nets in cloud computing environment[J]. Cluster Computing, 2020, 23(2): 1045-1071.
[21] KAID H, AL-AHMARI A, LI Z, et al. Single controller-based colored Petri nets for deadlock control in automated manufacturing systems[J]. Processes, 2019, 8(1): 21.
[22] QI L, LUAN W, LU X S, et al. Shared P-type logic Petri net composition and property analysis: a vector computational method[J]. IEEE Access, 2020, 8: 34644-34653.
[23] LUAN W, QI L, DU Y. Composition of logical Petri nets and compatibility analysis[J]. IEEE Access, 2017, 5: 9152-9162.
[24] LUAN W, QI L, ZHAO Z, et al. Logic Petri net synthesis for cooperative systems[J]. IEEE Access, 2019, 7: 161937-161948.
[25] ZHENG W, DU Y, QI L, et al. A method for repairing process models containing a choice with concurrency structure by using logic Petri nets[J]. IEEE Access, 2019, 7: 13106-13120.
[26] SHA J, DU Y, QI L. A user requirement oriented web service discovery approach based on logic and threshold Petri net[J]. IEEE/CAA Journal of Automatica Sinica, 2019, 6(6): 1528-1542.
[27] LIU L, LIU W, DU Y. Business process modeling and analysis based on queue logical Petri nets[J]. International Journal of Software Engineering and Knowledge Engineering, 2019, 29(1): 115-137.
[28] WANG J, DU Y Y, YU S X. Coloured logic Petri nets and analysis of their reachable trees[J]. Enterprise Information Systems, 2015, 9(8): 900-919.
[29] WANG Z, LUAN W, DU Y, et al. Composition and application of extended colored logic Petri nets to E-commerce systems[J]. IEEE Access, 2020, 8: 36386-36397. |