The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a policy-based framework that supports automated dynamic resource management in a virtualized environment. This allows for flexibility in how resources are allocated. We show how this framework can be used to support memory management through the use of migration and making local resource adjustments.
Trust is often calculated based on evidence which may come from a set of diverse sources. Challenges in trust calculation include the lack of a standard way to access evidence sources, lack of a standard for presenting evidence, unreliable evidence sources and differences of opinion on how evidence should be interpreted. This work shows that there are aspects of trust calculation that can be abstracted...
Policies enable management systems to adapt to changes in management strategies. At run time, management agents use information from the policies to monitor attributes of managed objects, to determine if specific events have occurred and to take management actions. In order to do this, information from the policies must first be extracted. The extracted information is then used to configure management...
Policies have been identified as one possible way to specify to management systems the operational constraints of a system or systems being managed. Such policies, often characterized as event-triggered condition actions rules, are frequently defined via policy languages and or user interface tools in order to simplify their expression and understanding by system administrators. The underlying assumption...
Policy-based network management (PBNM) in mobile ad-hoc networks (MANETs) requires additional reliable and efficient mechanisms over PBNM in wired networks. Thus, it is important that the management system in MANETs should cluster the moving nodes and manage their movements in an effective manner. In the paper, a scalable framework is proposed for the policy-based management in ad hoc networks in...
This paper presents a distributed file-system for the present day medium-sized network. Existing servers and workstations pool their unused storage resources to form a communal share. Erasure codes provide fault tolerance and eliminate the need for replication. Middleware libraries facilitate object routing on an overlay network.
One challenge in the automation of policy-based management (PBM) systems is to bridge the gap between specifying policies and realizing them in the actual implementation of a management system, which makes use of those policies. Systems as well as policies change dynamically. This paper introduces a PBM System Architecture that can automatically map the specified policy elements to be realized and...
A policy can be defined as any type of formal behavioural guide that is input to the system. Examples of policies that can be found in data center management systems include SLA, traditional event-triggered rules and business objectives. Specified policies are mapped to executable elements in the system. Usually each policy is mapped separately. This work shows how a set of policy can be considered...
This paper discusses why trust is an essential aspect for business-driven IT management, as well as how it impacts management of Web services and their compositions. We summarize two ongoing projects which will enable the use of trust for business-driven management of web services.
This paper is a discussion at a theoretical level of creating trust in autonomic systems. The paper focuses especially in creating trust in the policies being used. Policies are an integral part of autonomic systems since they allow for adaptability.
WS-Policy 4MASC is an XML language for specification of policies for run-time Web service management (monitoring and control) activities executed by the manageable and adaptable services compositions (MASC) middleware. Among its original contributions are specification of diverse business values (benefits or costs, tangible or intangible, agreed or possible, absolute or relative) and specification...
There exists a multitude of location-sensing systems utilizing wireless technology, though varying in cost, coverage and accuracy. In this paper we will introduce WLocator, a system that aims to strike a balance between these areas. WLocator will provide location information relative to symbolic, user-created "landmarks". These landmarks are easily created and maintained, thus reducing short...
This paper applies the use of control-theoretic techniques and feedback consisting of current system behaviour to implement policies such that threshold values specified in the policies are optimized. The proposed approach in this paper is compared to other dynamic feedback control approaches. Results show that the proposed approach outperforms the other dynamic feedback control approaches. It managed...
Data centers make decisions about the allocation of resources to application providers based on policies. Policies are any type of formal behavioural guide and are input to the component that makes resource allocation decisions. This paper describes a system that use policies from different source e.g., SLAs (negotiated between the application provider and the data center), and business objectives...
Cyberforaging refers to the temporary extension of the computing resources of a mobile device with remote computing resources on a wired machine. This machine is referred to as a surrogate. This paper describes a cyberforaging architecture that focuses on surrogate discovery, load balancing and the use of Web services to hide the heterogeneity of hardware and operating systems. A prototype is then...
One challenge associated with developing autonomic systems is that the system has multiple elements that should be autonomic but must also interoperate with each other. This paper addresses this problem within the context of dynamic resource allocation within a data center based on control-theoretic techniques.
The management of extensible markup language (XML) Web services executing in mobile and/or embedded environments poses new challenges that result from the limited availability of computing resources and from the need for characteristic management activities, such as handling context sensitivity. This paper briefly describes management requirements for and design of our management infrastructure for...
The goal of distributed systems management is to provide reliable, secure and efficient utilization of the network, processors and devices that comprise those systems. The management system makes use of management agents to collect events and data from managed objects while policies provide information on how to modify the behaviour of a management system. Systems, as well as policies governing the...
Policy-based network management (PBNM) in the mobile ad-hoc networks (MANETs) requires additional reliable and efficient mechanism over PBNM in wired networks. Thus, it is important that the management system in MANETs should cluster the moving nodes and manage their movements in an effective manner. In this paper, we propose a mechanism for the policy-based management in ad hoc networks in which...
A data center is defined as a set of computing resources that is owned by an organization and shared among multiple applications from different client organizations. Applications often have non-functional run time requirements for different classes of users. These are referred to as service level objectives (SLO) and are considered part of a service level agreement (SLA). Allocating resources to an...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.