By Topic

2009 Fifth International Conference on Autonomic and Autonomous Systems

Date 20-25 April 2009

Filter Results

Displaying Results 1 - 25 of 67
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (300 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (74 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2009, Page(s):xii - xvi
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xvii - xxi
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Real-Time Chain-Structured Synchronous Dataflow: Latency and Data Memory Requirement Formal Determination

    Publication Year: 2009, Page(s):1 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    We consider in this paper a synchronous dataflow (SDF) scheduling problem in the context of a multimedia real-time application. A SDF is in our context a chain of non-preemptive processing tasks in charge of the treatment of multimedia data blocks, denoted tokens. SDF has been wildly used in DSP (digital signal processor) design environments over the past ten years. The application relies on sourc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transferring Instantly the State of a Linear Singular Descriptor Differential System

    Publication Year: 2009, Page(s):10 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    In numerous computational applications in mechanics, in engineering, as well as, in financial issues, the ability of manipulating instantly the state vector from the input is more than significant. Thus, in this paper, we extend a method for the instantly state transferring of linear singular descriptor differential systems, which is based on impulsive distributions. Using linear algebra technique... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithm for Generating Safe and Execution-Optimized Paths

    Publication Year: 2009, Page(s):16 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    This paper describes a new scheme for generating paths that are optimized for faster execution while keeping a certain amount of clearance away from obstacles. An optimized path is first extracted from multiple query PRM using a Lazy A* algorithm with a weighted Linfin norm, this latter is post-processed to correct its clearance to over a desired threshold in regions where it is geometrically poss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for Multi-project with Resource Constraints Based on Greedy Strategy

    Publication Year: 2009, Page(s):22 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Resource conflict is an outstanding problem in concurrent multiple projects with sharing a common and limited resource pool, and it often results in lower performance of these projects. Therefore, it is important and urgent to find an effective method for scheduling multiple projects with limited resources. A mathematical model for the multi-project scheduling problem with resource-constrained is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Adaptive Techniques for the Load Trend Evaluation of Internal System Resources

    Publication Year: 2009, Page(s):28 - 33
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    Modern distributed systems that have to avoid performance degradation and system overload require several runtime management decisions for load balancing and load sharing, overload and admission control, job dispatching and request redirection. As the external workload and the internal resource behavior of the modern system is highly complex and variable, self-adaptive techniques require a stable ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Assessment of Self-Managed P2P Streaming

    Publication Year: 2009, Page(s):34 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Peer-to-Peer (P2P) IPTV applications have increasingly been considered as a potential approach to online broadcasting. These overcome fundamental client-server issues and introduce new, self-management features that help improving performance. Recently, many applications such as PPlive, PPStream, Sopcast, and Joost have been deployed to deliver live and video on demand streaming via P2P. However, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building a Context-Aware Ambient Assisted Living Application Using a Self-Adaptive Distributed Model

    Publication Year: 2009, Page(s):40 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    Ambient assisted living (AAL) applications are intended to allow elderly people to stay at home while connected to their family and medical staff. These applications involve several services as health-care services or infotainment, which are executed on different environments such as hospital, proximity doctor, family homes. These environments constitute a distributed, heterogeneous, highly dynami... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Sensor-Based Approach to Symptom Recognition for Autonomic Systems

    Publication Year: 2009, Page(s):45 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (466 KB) | HTML iconHTML

    The increased complexity of today's distributed, composite, Web-based systems presents difficult and unique systems management problems. The way these systems interact, and the fact that they often span organizational boundaries, render them difficult to monitor and manage. Autonomic computing has emerged as a promising approach to the management of complex systems. A key to realizing fully autono... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Learning Based Method for Topology Control in Wireless Sensor Networks

    Publication Year: 2009, Page(s):51 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Topology Control (TC) is one of the most important techniques used in wireless ad hoc and sensor networks to reduce energy consumption and radio interference, The goal of this technique is to control the topology of the graph representing the communication links between network nodes with the purpose of maintaining some global graph property (e.g., connectivity), while reducing energy consumption ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Self-Recovery Method Based on Mixed Reboot

    Publication Year: 2009, Page(s):56 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    Microreboot is one of the most efficient self recovery technologies for mission-critical system. But some limitations still exist in the existing microreboot methods such as demand of componentization and loosing coupling etc. In order to eliminate these limitations, we propose a more flexible and usable microreboot method called mixed reboot in this paper, which systematically combines coarse-gra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Context-Aware System for Mobile Data Sharing in Hybrid P2P Environment

    Publication Year: 2009, Page(s):63 - 68
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (710 KB) | HTML iconHTML

    With the emergence of pervasive computing environments, mobile information sharing and retrieval is becoming an exciting domain that challenges information scientists. In this paper, we describe a hybrid peer to peer context-aware framework for building mobile information sharing applications. A scalable and flexible architecture based on JXTA is presented. The architecture called "JHPeer" allows ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heterogeneous QoS Resource Manager with Prediction

    Publication Year: 2009, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2539 KB) | HTML iconHTML

    As long as computers continue to get more CPU processing power, data centers need to optimize their power usage. We can do this and maintain the same complexity level as before by using virtualized environments. We can put a large number of small isolated servers, inside a large one and improve a large number of values like the wattage or power consumption, space usage, and resource usage. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component-Based Self-Healing via Cellular Adaptation

    Publication Year: 2009, Page(s):75 - 81
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (566 KB) | HTML iconHTML

    Self-healing is a way for tackling the ever increasing complexities to manage and fix manually computer software. This paper proposes a cellular adaptation inspired mechanism to make a component based distributed system self heal. In this mechanism components of distributed system are seen as cellules of body. Environmental changes in our body cause cellular adaptations; similarly, changes incompo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Community for the Dynamic Management of NGN Mobility

    Publication Year: 2009, Page(s):82 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    The more and more mobility requirements raise the flexibility and complexity of resource management in the NGN context. The autonomic management of this mobility with high ability of adaptation becomes a key challenge. In this paper, according to our generic architecture, we propose the community of common interest by layer. The criterion of regrouping organizes the ambient resources to reach an e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Estimation of Aggregates in Unstructured Networks

    Publication Year: 2009, Page(s):88 - 93
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Aggregation of data values plays an important role on distributed computations, in particular over peer-to-peer and sensor networks, as it can provide a summary of some global system property and direct the actions of self-adaptive distributed algorithms. Examples include using estimates of the network size to dimension distributed hash tables or estimates of the average system load to direct load... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Classification and Graphical Representation of Interactive User Activity via .NET Windows Service Agent Technology

    Publication Year: 2009, Page(s):94 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB) | HTML iconHTML

    The paper describes the design and implementation of a .NET windows service based agent which functions autonomously and automatically collects data for subsequent analysis and graphical presentation of spreadsheet data. The approach used to develop the automation aspects of the agent implementation is also presented, together with features of the graphical tool developed using this approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlling the Event Streams to Become More Autonomous

    Publication Year: 2009, Page(s):100 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    Autonomous systems should deal with many and various data coming from the environment. In order to be able to process efficient and quick on-line and real-time analysis, it is necessary to have the capability of control on the input event streams in order to focus the processing mainly on the relevant data. The protocol introduced in this paper is devoted to give control and focus capabilities to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.