Quality of service enabled database applications

S. Krompass, D. Gmach, A. Scholz, S. Seltzsam, A. Kemper

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations

Abstract

In today's enterprise service oriented software architectures, database systems are a crucial component for the quality of service (QoS) management between customers and service providers. The database workload consists of requests stemming from many different service classes, each of which has a dedicated service level agreement (SLA). We present an adaptive QoS management that is based on an economic model which adaptively penalizes individual requests depending on the SLA and the current degree of SLA conformance that the particular service class exhibits. For deriving the adaptive penalty of individual requests, our model differentiates between opportunity costs for underachieving an SLA threshold and marginal gains for (re-)achieving an SLA threshold. Based on the penalties, we develop a database component which schedules requests depending on their deadline and their associated penalty. We report experiments of our operational system to demonstrate the effectiveness of the adaptive QoS management.

Original languageEnglish
Title of host publicationService-Oriented Computing - ICSOC 2006 - 4th International Conference, Proceedings
Pages215-226
Number of pages12
DOIs
StatePublished - 2006
Event4th International Conference on Service-Oriented Computing, ICSOC 2006 - Chicago, IL, United States
Duration: 4 Dec 20067 Dec 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4294 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Service-Oriented Computing, ICSOC 2006
Country/TerritoryUnited States
CityChicago, IL
Period4/12/067/12/06

Fingerprint

Dive into the research topics of 'Quality of service enabled database applications'. Together they form a unique fingerprint.

Cite this