The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Abstract-As cloud computing systems are reaching the stagewhere the human effort required to maintain them at anoperational level is unsupportable, one of the major challengesfaced by cloud computing providers is to develop appropriatemechanisms for run-time monitoring and adaptation, to preventcloud platforms from quickly dissolving into a non-reliableenvironment. In this context, the application...
The important, ambitious goals of autonomic management applications require complex, adaptable reasoning capabilities that prove extremely difficult to conceive and implement. An increasing number of Autonomic Computing projects have provided partial solutions and studies that brought significant contributions to the understanding of this domain. At the same time, little support is currently available...
Autonomic network management is viewed as the capability of network entities to self-government, which frees IT professionals from time-consuming and tedious configuration tasks. Hence, IT professionals can focus on high level management (business goals, for example). In this paper, we propose an approach of agent-based architecture for autonomic networking on the basis of Motorola's FOCALE architecture...
This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and user-controlled reactive adaptation to highly sophisticated autonomic and cognitively driven adaptation. The goal of intrusion-tolerance is to provide mission continuity even under conditions of sustained cyber attacks. We describe key themes of our previous work in adaptive cyber defense and...
A variety of frameworks, architectures and techniques have been proposed and used in the field of autonomic computing for self-management. There are also many applications and systems available that exhibit autonomic behavior. However all techniques and applications do not explicitly use autonomic or self-* terminologies to describe their autonomic characteristics. In this survey paper, a review of...
Nowadays, companies are becoming increasingly dependent on IT infrastructures as the automation of their business processes is widely supported by an ever growing number of software systems. However, the administration tasks of ensuring the proper functioning of system infrastructure are still a very labour intensive process that can put company's strategy at risk. This paper presents a proof of concept...
Autonomic computing has become more prevalent in recent years for its vision of developing applications with self-adaptive and self-managing behavior. Due to the inherent complexity of such applications and the nature of the built-in closed-loop feedback control, maintainability issues of autonomic systems are emerging as significant concerns in autonomic system designs. This paper identifies and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.