Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Optimization of High-Concurrency Conflict Issues in Execute-Order-Validate Blockchain
MA Qianli, ZHANG Shengli, WANG Taotao, YANG Qing, WANG Jigang
ZTE Communications    2024, 22 (2): 19-29.   DOI: 10.12142/ZTECOM.202402004
Abstract8)   HTML0)    PDF (1237KB)(2)       Save

With the maturation and advancement of blockchain technology, a novel execute-order-validate (EOV) architecture has been proposed, allowing transactions to be executed in parallel during the execution phase. However, parallel execution may lead to multi-version concurrency control (MVCC) conflicts during the validation phase, resulting in transaction invalidation. Based on different causes, we categorize conflicts in the EOV blockchain into two types: within-block conflicts and cross-block conflicts, and propose an optimization solution called FabricMan based on Fabric v2.4. For within-block conflicts, a reordering algorithm is designed to improve the transaction success rate and parallel validation is implemented based on the transaction conflict graph. We also merge transfer transactions to prevent triggering multiple version checks. For cross-block conflicts, a cache-based version validation mechanism is implemented to detect and terminate invalid transactions in advance. Experimental comparisons are conducted between FabricMan and two other systems, Fabric and Fabric++. The results show that FabricMan outperforms the other two systems in terms of throughput, transaction abort rate, algorithm execution time, and other experimental metrics.

Table and Figures | Reference | Related Articles | Metrics
Log Anomaly Detection Through GPT-2 for Large Scale Systems
JI Yuhe, HAN Jing, ZHAO Yongxin, ZHANG Shenglin, GONG Zican
ZTE Communications    2023, 21 (3): 70-76.   DOI: 10.12142/ZTECOM.202303010
Abstract115)   HTML9)    PDF (537KB)(209)       Save

As the scale of software systems expands, maintaining their stable operation has become an extraordinary challenge. System logs are semi-structured text generated by the recording function in the source code and have important research significance in software service anomaly detection. Existing log anomaly detection methods mainly focus on the statistical characteristics of logs, making it difficult to distinguish the semantic differences between normal and abnormal logs, and performing poorly on real-world industrial log data. In this paper, we propose an unsupervised framework for log anomaly detection based on generative pre-training-2 (GPT-2). We apply our approach to two industrial systems. The experimental results on two datasets show that our approach outperforms state-of-the-art approaches for log anomaly detection.

Table and Figures | Reference | Related Articles | Metrics