Home | Sitemap | Index | Contact | Legals | KIT

Publications of Axel Busch

Refereed conference/Workshop papers

[1] Kiana Rostami, Robert Heinrich, Axel Busch, and Ralf Reussner. Architecture-based Change Impact Analysis in Information Systems and Business Processes. In 2017 IEEE International Conference on Software Architecture (ICSA2017), 2017, pages 179-188. IEEE. 2017. [ bib ]
[2] Axel Busch, Robert Heinrich, Jörg Henss, Martin Küster, Sebastian Lehrig, Misha Strittmatter, Max Kramer, Erik Burger, and Ralf H. Reussner. Architectural viewpoints. In Modeling and Simulating Software Architectures - The Palladio Approach, Ralf H. Reussner, Steffen Becker, Jens Happe, Robert Heinrich, Anne Koziolek, Heiko Koziolek, Max Kramer, and Klaus Krogmann, editors, chapter 3, pages 37-73. MIT Press, Cambridge, MA, October 2016. [ bib | http ]
[3] Jörg Kienzle, Anne Koziolek, Axel Busch, and Ralf Reussner. Towards concern-oriented design of component-based systems. In 3rd International Workshop on Interplay of Model-Driven and Component-Based Software Engineering, October 2016. CEUR. October 2016. [ bib | Abstract ]
Component-based software engineering (CBSE) is a modern way of developing software that is based on defining, implementing and composing loosely coupled, independent components, thus increasing modularity, analysability, separation of concerns and reuse. However, separation of concerns is sometimes difficult to achieve in CBSE, as some concerns might crosscut several components. Furthermore, reuse of components is sometimes limited, in particular because component developers make certain implementation choices that are incompatible with the non-functional requirements of the application that is being built. In this paper we outline how to integrate CBSE and concern-oriented reuse (CORE), a novel reuse paradigm that extends Model-Driven Engineering (MDE) with best practices from aspect-oriented software composition and Software Product Lines (SPL). Concretely, we outline how to combine the Palladio Component Model (PCM) capable of expressing complex software architectures with CORE class and sequence diagrams for low-level design. As a result, multiple solutions for addressing concerns that might even crosscut component boundaries can be modularized in a reusable way, and integrated with applications that reuse them using aspect-oriented techniques. Additionally, thanks to CORE, component developers can avoid premature decision making when reusing existing libraries during implementation.
[4] Axel Busch and Anne Koziolek. Considering Not-quantified Quality Attributes in an Automated Design Space Exploration. In Proceedings of the 12th International ACM SIGSOFT Conference on the Quality of Software Architectures, Venice, Italy, 2016, QoSA'16, pages 50-59. IEEE. 2016. [ bib | DOI | .pdf | Abstract ]
In a software design process, the quality of the resulting software system is highly driven by the quality of its software architecture. In such a process trade-off decisions must be made between multiple quality attributes, such as performance or security, that are often competing. Several approaches exist to improve software architectures either quantitatively or qualitatively. The first group of approaches requires to quantify each single quality attribute to be considered in the design process, while the latter group of approaches are often fully manual processes. However, time and cost constraints often make it impossible to either quantify all relevant quality attributes or manually evaluate candidate architectures. Our approach to the problem is to quantify several most important quality requirements, combine them with several not-quantified quality attributes and use them together in an automated design space exploration process. As our basis, we used the PerOpteryx design space exploration approach, which requires quantified measures for its optimization engine, and extended it in order to combine them with not-quantified quality attributes. By this, our approach allows optimizing the design space by considering even quality attributes that can not be quantified due to cost constraints or lack of quantification methodologies. We applied our approach to two case studies to demonstrate its benefits. We showed how performance can be balanced against not-quantified quality attributes, such as security, using an example derived from an industry case study.
[5] Axel Busch, Qais Noorshams, Samuel Kounev, Anne Koziolek, Ralf Reussner, and Erich Amrehn. Automated workload characterization for i/o performance analysis in virtualized environments. In Software Engineering 2016, Fachtagung des GI-Fachbereichs Softwaretechnik, 2016, pages 27-28. [ bib | .html | .pdf ]
[6] Axel Busch, Yves Schneider, Anne Koziolek, Kiana Rostami, and Jörg Kienzle. Modelling the Structure of Reusable Solutions for Architecture-based Quality Evaluation. In Proceedings of the 2nd Workshop on Cloud Security and Data Privacy by Design co-located with the 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016), Luxembourg, 2016, CloudSPD'16, pages 521-526. IEEE. 2016. [ bib | DOI | http | .pdf | Abstract ]
When designing cloud applications many decisions must be made like the selection of the right set of software components. Often, there are several third-party implementations on the market from which software architects have the choice between several solutions that are functionally very similar. Even though they are comparable in functionality, the solutions differ in their quality attributes, and in their software architecture. This diversity hinders automated decision support in model-driven engineering approaches, since current state-of-the-art approaches for automated quality estimation often rely on similar architecture to compare several solutions. In this paper, we address this problem by contributing with a metamodel that unifies the architecture of several functional similar solutions, and describes the different solutions' architectural degrees of freedom. Such a model can later be used to extend the process of reuse from reusing libraries to reusing the corresponding models of these libraries with the lasting benefit of automated decision support at design-time that supports decisions when deploying applications into the cloud. Finally, we apply our approach on two intrusion detection systems.
[7] Qais Noorshams, Axel Busch, Samuel Kounev, and Ralf Reussner. The Storage Performance Analyzer: Measuring, Monitoring, and Modeling of I/O Performance in Virtualized Environments. In Proceedings of the 6th ACM/SPEC International Conference on Performance Engineering, Austin, Texas, USA, 2015, ICPE '15. [ bib | DOI | http | .pdf ]
[8] Axel Busch, Qais Noorshams, Samuel Kounev, Anne Koziolek, Ralf Reussner, and Erich Amrehn. Automated Workload Characterization for I/O Performance Analysis in Virtualized Environments. In Proceedings of the ACM/SPEC International Conference on Performance Engineering, Austin, Texas, USA, 2015, ICPE '15, pages 265-276. ACM, New York, NY, USA. 2015, Acceptance Rate (Full Paper): 15/56 = 27%. [ bib | DOI | http | .pdf | Abstract ]
Next generation IT infrastructures are highly driven by virtualization technology. The latter enables flexible and efficient resource sharing allowing to improve system agility and reduce costs for IT services. Due to the sharing of resources and the increasing requirements of modern applications on I/O processing, the performance of storage systems is becoming a crucial factor. In particular, when migrating or consolidating different applications the impact on their performance behavior is often an open question. Performance modeling approaches help to answer such questions, a prerequisite, however, is to find an appropriate workload characterization that is both easy to obtain from applications as well as sufficient to capture the important characteristics of the application. In this paper, we present an automated workload characterization approach that extracts a workload model to represent the main aspects of I/O-intensive applications using relevant workload parameters, e.g., request size, read-write ratio, in virtualized environments. Once extracted, workload models can be used to emulate the workload performance behavior in real-world scenarios like migration and consolidation scenarios. We demonstrate our approach in the context of two case studies of representative system environments. We present an in-depth evaluation of our workload characterization approach showing its effectiveness in workload migration and consolidation scenarios. We use an IBM System z equipped with an IBM DS8700 and a Sun Fire system as state-of-the-art virtualized environments. Overall, the evaluation of our workload characterization approach shows promising results to capture the relevant factors of I/O-intensive applications.
[9] Axel Busch. Automated decision support for recurring design decisions considering non-functional requirements. In Software Engineering 2015 - Workshopband, 2015, GI Lecture Notes in Informatics. Doctoral Symposium. [ bib | .pdf ]
[10] Axel Busch, Misha Strittmatter, and Anne Koziolek. Assessing Security to Compare Architecture Alternatives of Component-Based Systems. In Proceedings of the IEEE International Conference on Software Quality, Reliability & Security, Vancouver, British Columbia, Canada, 2015, QRS '15, pages 99-108. IEEE Computer Society. 2015, Acceptance Rate (Full Paper): 20/91 = 22%. [ bib | DOI | .pdf | Abstract ]
Modern software development is typically performed by composing a software system from building blocks. The component-based paradigm has many advantages. However, security quality attributes of the overall architecture often remain unspecified and therefore, these cannot be considered when comparing several architecture alternatives. In this paper, we propose an approach for assessing security of component-based software architectures. Our hierarchical model uses stochastic modeling techniques and includes several security related factors, such as attackers, his goals, the security attributes of a component, and the mutual security interferences between them. Applied on a component-based architecture, our approach yields its mean time to security failure, which assesses its degree of security. We extended the Palladio Component Model (PCM) by the necessary information to be able to use it as input for the security assessment. We use the PCM representation to show the applicability of our approach on an industry related example.
[11] Qais Noorshams, Axel Busch, Andreas Rentschler, Dominik Bruhn, Samuel Kounev, Petr Tůma, and Ralf Reussner. Automated Modeling of I/O Performance and Interference Effects in Virtualized Storage Systems. In 34th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops). 4th International Workshop on Data Center Performance, DCPerf '14, Madrid, Spain, 2014, pages 88-93. [ bib | DOI | http | .pdf ]

Books and Book Chapters

[1] Axel Busch, Robert Heinrich, Jörg Henss, Martin Küster, Sebastian Lehrig, Misha Strittmatter, Max Kramer, Erik Burger, and Ralf H. Reussner. Modeling and Simulating Software Architectures - The Palladio Approach, chapter Architectural Viewpoints, pages 37-73. MIT Press, Cambridge, MA, October 2016. to appear. [ bib | http ]

Technical Reports

[1] Axel Busch and Julien Leduc. Evaluation of energy consumption and performance of Intel's Nehalem architecture. openlab report, CERN, October 2009. [ bib | .pdf ]


[1] Axel Busch. Workload Characterization for I/O Performance Analysis on IBM System z. Master's thesis, Karlsruhe Institute of Technology (KIT), Am Fasanengarten 5, 76131 Karlsruhe, Germany, May 2013. [ bib | .pdf ]
[2] Axel Busch. Performance Assessment of State-of-the-Art Computing Servers for Scientific Applications. Bachelor's thesis, Fachhochschule Kaiserslautern, Campus Zweibruecken, Amerikastrasse 1, 66482 Zweibruecken, Germany, October 2009. [ bib ]