Efficiency Considerations in Policy Based Management in Resource Constrained Devices (Englisch)

In: Advances in Grid and Pervasive Computing   ,  4  ;  210-220  ;  2012

Wie erhalte ich diesen Titel?

Download
Kommerziell Vergütung an den Verlag: 24,95 € Grundgebühr: 4,00 € Gesamtpreis: 28,95 €
Akademisch Vergütung an den Verlag: 12,50 € Grundgebühr: 2,00 € Gesamtpreis: 14,50 €

Abstract

Policies are being widely used in a variety of applications such as healthcare, disaster management and mobile networking. In this paper, we show how policies can be used to manage the resources effectively and in a user friendly way. Further, we advocate that while an agent is required to obey a given policy requirement, there are situations where the agent may consider the possibility of violating the policy (policy deviation) such as in an emergency or during a disaster. Our simulation results show that sometimes policy violations can be beneficial to the community of (application) agents and such violations must be managed carefully.

Inhaltsverzeichnis E-Book

Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.

1
From Web Cache to Cloud Cache
Banditwattanawong, Thepparit | 2012
16
pCloud: An Adaptive I/O Resource Allocation Algorithm with Revenue Consideration over Public Clouds
Wang, Jianzong / Chen, Yanjun / Gmach, Daniel / Xie, Changsheng / Wan, Jiguang / Hua, Rui | 2012
31
A Gossip-Based Mutual Exclusion Algorithm for Cloud Environments
Lim, JongBeom / Chung, Kwang-Sik / Chin, Sung-Ho / Yu, Heon-Chang | 2012
46
An Effective Partition Approach for Elastic Application Development on Mobile Cloud Computing
Qin, Zhuoran / Zhang, Jixian / Zhang, Xuejie | 2012
54
Memory Virtualization for MIPS Processor Based Cloud Server
Ruan, Li / Wang, Huixiang / Xiao, Limin / Zhu, Mingfa / Li, Feibo | 2012
64
Implementation of a Distributed Data Storage System with Resource Monitoring on Cloud Computing
Yang, Chao-Tung / Shih, Wen-Chung / Huang, Chih-Lin | 2012
74
Design, Verification and Prototyping the Next Generation of Desktop Grid Middleware
Abidi, Leila / Cérin, Christophe / Klai, Kais | 2012
89
A Request Multiplexing Method Based on Multiple Tenants in SaaS
Gu, Pingli / Shang, Yanlei / Chen, Junliang / Cheng, Bo / Jiang, Yan | 2012
98
An Adaptive Design Pattern for Genetic Algorithm-Based Composition of Web Services in Autonomic Computing Systems Using SOA
Mannava, Vishnuvardhan / Ramesh, T. | 2012
109
Service-Oriented Ontology and Its Evolution
Pan, Weisen / Chen, Shizhan / Feng, Zhiyong | 2012
122
Energy Efficient Activity Recognition Based on Low Resolution Accelerometer in Smart Phones
Liang, Yunji / Zhou, Xingshe / Yu, Zhiwen / Guo, Bin / Yang, Yue | 2012
137
Energy Efficient Allocation of Virtual Machines in Cloud Computing Environments Based on Demand Forecast
Cao, Jian / Wu, Yihua / Li, Minglu | 2012
152
Energy Conservative Mobile Cloud Infrastructure
Chandrasekar, Ashok / Chandrasekar, Karthik / Ramasatagopan, Harini / Rahim, Rafica Abdul | 2012
162
Power-Constrained Actuator Coordination for Agricultural Sensor Networks
Lee, Junghoon / Park, Gyung-Leen / Kwak, Ho-Young / Han, Jikwang | 2012
172
Design and Evaluation of Mobile Applications with Full and Partial Offloadings
Kim, Jennifer | 2012
183
A Cross-Layer Scheme to Improve TCP Performance in Wireless Multi-hop Networks
Zhang, Fu-Quan / Joe, Inwhee | 2012
198
A Fully Abstract View for Local Cause Semantics
Xue, Jianxin / Dong, Xiaoju | 2012
210
Efficiency Considerations in Policy Based Management in Resource Constrained Devices
Kakkad, Jignesh / Parameswaran, Nandan | 2012
221
Agent Based Quality Management Middleware for Context-Aware Pervasive Applications
Zheng, Di / Wang, Jun / Ben, Ke-rong | 2012
231
A Virtual File System for Streaming Loading of Virtual Software on Windows NT
Cui, Yabing / Hu, Chunming / Wo, Tianyu / Wang, Hanwen | 2012
244
TBF: A High-Efficient Query Mechanism in De-duplication Backup System
Zhou, Bin / Jin, Hai / Xie, Xia / Yuan, PingPeng | 2012
254
Estimating Deadline-Miss Probabilities of Tasks in Large Distributed Systems
Wang, Dongping / Gong, Bin / Zhao, Guoling | 2012
264
Global Pricing in Large Scale Computational Markets
Chourou, Lilia / Elleuch, Ahmed / Jemni, Mohamed | 2012
279
A New RBAC Based Access Control Model for Cloud Computing
Tang, Zhuo / Wei, Juan / Sallam, Ahmed / Li, Kenli / Li, Ruixuan | 2012
289
QoS Monitoring and Dynamic Trust Establishment in the Cloud
Chandrasekar, Ashok / Chandrasekar, Karthik / Mahadevan, Malairaja / Varalakshmi, P. | 2012
302
Multihop-Based Key Management in Hierarchical Wireless Sensor Network
Zhang, Yiying / Li, Xiangzhen / Zhen, Yan / Zeng, Lingkang | 2012
312
A Bullet-Proof Verification Using Distributed Watchdogs (BPV-DW) to Detect Black Hole Attack in Mobile Ad Hoc Networks
Ahmed, Firoz / Yoon, Seok Hoon / Oh, Hoon | 2012
323
Performance Analysis for Workflow Management Systems under Role-Based Authorization Control
Liu, Limin / He, Ligang / Jarvis, Stephen A. | 2012
338
A Medical Image File Accessing System with Virtualization Fault Tolerance on Cloud
Yang, Chao-Tung / Kuo, Cheng-Ta / Hsu, Wen-Hung / Shih, Wen-Chung | 2012
350
Enhanced Password-Based User Authentication Using Smart Phone
Jeun, Inkyung / Kim, Mijin / Won, Dongho | 2012
361
Development of m-TMS for Trusted Computing in Mobile Cloud
Kim, Hyun-Woo / Song, Eun-Ha / Kim, Jun-Ho / Park, Sang Oh / Jeong, Young-Sik | 2012
370
An Efficient Cloud Storage Model for Cloud Computing Environment
Jeong, HwaYoung / Park, JongHyuk | 2012