Zobrazeno 1 - 10
of 32
pro vyhledávání: '"K. Twidle"'
Publikováno v:
6th IEEE Int. Conference on Network and Service Management
Niagara Falls, Canada
CNSM
Niagara Falls, Canada
CNSM
Event-Condition-Action (ECA) policies are often used to manage various aspects of adaptation and execution of pervasive systems. Such policies are well suited for services where: 1) given actions are reliably executed when they are requested, 2) ther
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3f33c4657b0a169778e8de97786664bc
http://hdl.handle.net/10044/1/10258
http://hdl.handle.net/10044/1/10258
Publikováno v:
POLICY
Policies could potentially be an important and cost-effective technique for building and managing pervasive systems. Historically, policy-based systems have been built using a policy environment that supports the specification and enforcement of poli
Publikováno v:
PerCom Workshops
There is growing interest in using workflows to describe, monitor and direct a wide-range of medical procedures in hospitals. Unlike their well-established business counterparts, medical workflows require a high degree of execution flexibility since
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::01bba038ccd7e13d975afe97af8362a9
Publikováno v:
The Fifth International Conference on Autonomic and Autonomous Systems
ICAS
ICAS
Policies form an important part of management and can be an effective means of implementing self-adaptation in pervasive systems. Most policy-based systems focus on large-scale networks and distributed systems. Consequently, they are often fragmented
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::677e8eda3a4731a5db78f5998287b074
http://hdl.handle.net/10044/1/4335
http://hdl.handle.net/10044/1/4335
Publikováno v:
POLICY
IEEE International Workshop on Policies for Distributed Systems and Networks
IEEE International Workshop on Policies for Distributed Systems and Networks
Policies form an important part of management activities and are an effective means of implementing self-adaptation in pervasive systems. Many policy- based systems designed to date focus on large-scale networks and distributed systems. Consequently,
Publikováno v:
Computer Communications. 13:571-580
This paper discusses a proposed framework for specifying access control policy for very large distributed processing systems. These typically consist of multiple interconnected networks and span the computer systems belonging to different organizatio
Publikováno v:
Inter-Domain Management ISBN: 9783540729853
AIMS
AIMS
Pervasive systems require minimal user intervention while constantly adapting their configuration and behaviour. For example, a personal area network of sensors and computational devices monitoring the health of a patient needs to be able to reconfig
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::78ee0d4944d21841b4cebc6ee2f6011d
https://doi.org/10.1007/978-3-540-72986-0_33
https://doi.org/10.1007/978-3-540-72986-0_33
Autor:
Emil Lupu, S. Heeps, K. Twidle, Alberto Schaeffer-Filho, Sye Loong Keoh, Stephen D. Strowes, Naranker Dulay, Morris Sloman, Joe Sventek
Publikováno v:
SASO
FIRST IEEE INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS
Boston, MA
1st IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007)
FIRST IEEE INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS
Boston, MA
1st IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007)
Management in pervasive systems cannot rely on human intervention or centralised decision-making functions. It must be devolved, based on local decision-making and feedback control-loops embedded in autonomous components. We have previously proposed
Autor:
K. Twidle, Stephen D. Strowes, Joe Sventek, S. Heeps, Alberto Schaeffer-Filho, Sye Loong Keoh, Morris Sloman, Naranker Dulay, Emil Lupu
Publikováno v:
MobiQuitous
Body sensor networks consisting of low-power on- body wireless sensors attached to mobile users will be used in the future to monitor the health and well being of patients in hospitals or at home. Such systems need to adapt autonomously to changes in
Autor:
Morris Sloman, K. Twidle
Publikováno v:
[1988] Proceedings. Workshop on the Future Trends of Distributed Computing Systems in the 1990s.
An overview is given of the conic configuration environment, which applies the domain concept to the structuring of configuration and name management in a distributed system. The use of access-control lists as a security mechanism is shown. Inheritan