Utility Computing 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2004, Davis, CA, USA, November 15-17, 2004. Proceedings /
This volume of the Lecture Notes in Computer Science series contains all the papersacceptedforpresentationatthe13thIFIP/IEEEInternationalWorkshop on Distributed Systems: Operations and Management (DSOM 2004), which was held at the University of California, Davis during November 15-17, 2004. DSOM2004...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2004.
|
Έκδοση: | 1st ed. 2004. |
Σειρά: | Lecture Notes in Computer Science,
3278 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Management Architecture
- Requirements on Quality Specification Posed by Service Orientation
- Automating the Provisioning of Application Services with the BPEL4WS Workflow Language
- HiFi+: A Monitoring Virtual Machine for Autonomic Distributed Management
- SLA Based Management
- Defining Reusable Business-Level QoS Policies for DiffServ
- Policy Driven Business Performance Management
- Business Driven Prioritization of Service Incidents
- Policy Based Management
- A Case-Based Reasoning Approach for Automated Management in Policy-Based Networks
- An Analysis Method for the Improvement of Reliability and Performance in Policy-Based Management Systems
- Policy-Based Resource Assignment in Utility Computing Environments
- Automated Management
- Failure Recovery in Distributed Environments with Advance Reservation Management Systems
- Autonomous Management of Clustered Server Systems Using JINI
- Event-Driven Management Automation in the ALBM Cluster System
- Analysis and Reasoning
- A Formal Validation Model for the Netconf Protocol
- Using Object-Oriented Constraint Satisfaction for Automated Configuration Generation
- Problem Determination Using Dependency Graphs and Run-Time Behavior Models
- Trust and Security
- Role-Based Access Control for XML Enabled Management Gateways
- Spotting Intrusion Scenarios from Firewall Logs Through a Case-Based Reasoning Approach
- A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems
- Implementation, Instrumentation, Experience
- Using Process Restarts to Improve Dynamic Provisioning
- Server Support Approach to Zero Configuration In-Home Networking
- Rule-Based CIM Query Facility for Dependency Resolution
- Short Papers
- Work in Progress: Availability-Aware Self-Configuration in Autonomic Systems
- ABHA: A Framework for Autonomic Job Recovery
- Can ISPs and Overlay Networks Form a Synergistic Co-existence?
- Simplifying Correlation Rule Creation for Effective Systems Monitoring.