... | ... | @@ -54,16 +54,15 @@ The detailed results of the vulnerability prediction analysis are also provided |
|
|
|
|
|
Suppose that the user selects the "Optimal Checkpoint" option from the drop-down list of the Dependability Menu Item. Then he/she is navigated to the page presented in the figure below.
|
|
|
|
|
|
![DT-7](uploads/78d254c1a9f29c359d0df71cf52ce0bf/DT-7.PNG)
|
|
|
![DT-7](uploads/70038d658a271ea65be305426b3393c4/DT-7.png)
|
|
|
|
|
|
Similarly to the Security Page the user needs to choose one of the available software project to analyze from the "Select Project" drop-down list. For the purposes of the present walkthrough , and in order to be in line with the examples presented in the previous section, we select the "Holisun" software project from the drop-down list and we click the "New Analysis" button. Behind the scenes the *Optimum Checkpoint Recommendation* web service is invoked for the "Holisun" project (see the [Usage](dependability-toolbox-usage) Wiki page for more information regarding this web service). When the analysis is complete, the page is rendered and the results are visualized.
|
|
|
Similarly to the Security Page the user needs to choose one of the available software project to analyze from the Projects Page. For the purposes of the present walkthrough, we select the "Neurasmus" software project from the projects page and we click the New Analysis button. Behind the scenes the *Optimum Checkpoint Recommendation* web service is invoked for the "Neurasmus" project (see the [Usage](dependability-toolbox-usage) Wiki page for more information regarding this web service). When the analysis is complete, the page is rendered and the results are visualized.
|
|
|
|
|
|
At the top part of the page (see figure below), the checkpoint interval that minimizes the execution time of the application is presented, along with some detailed results that were produced by the analysis and that were necessary for the calculation of the optimum checkpoint interval.
|
|
|
|
|
|
![DT-8](uploads/5c8719781a3bb01eac96470899889b82/DT-8.PNG)
|
|
|
![DT-8](uploads/103e62a38ad397b9b0b62e4c786fb708/DT-8.png)
|
|
|
|
|
|
At the lower part of the page (see figure below), the checkpoint interval that minimizes the energy consumption of the application is presented, along with some detailed results that were produced by the analysis and that were necessary for the calculation of the optimum checkpoint interval.
|
|
|
|
|
|
![DT-9](uploads/1bdf8806d3655e3efd588e8102bf3177/DT-9.PNG)
|
|
|
|
|
|
![DT-9](uploads/31cbca8e71379b2459fa69c767e8eb51/DT-9.png)
|
|
|
|