|
Part I Autonomic Communication Infrastructure |
|
|
|
Bio-inspired Autonomic Structures: a middleware for Telecommunications Ecosystems |
|
|
3 | (28) |
|
|
|
|
|
4 | (2) |
|
|
6 | (4) |
|
|
6 | (3) |
|
|
9 | (1) |
|
Bio-inpired Autonomic Structures |
|
|
10 | (8) |
|
Concept of Autonomic Structures |
|
|
11 | (1) |
|
|
12 | (2) |
|
Data Components interactions: primitives |
|
|
14 | (1) |
|
Components interactions: mechanisms and algorithms |
|
|
15 | (3) |
|
Engineer self-organization |
|
|
18 | (5) |
|
Game Theory for cross-layer design |
|
|
20 | (2) |
|
Auctions for optimized resource allocation |
|
|
22 | (1) |
|
|
23 | (4) |
|
Self-Management for Telecommunications Networks |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (2) |
|
|
27 | (1) |
|
|
28 | (3) |
|
Social-based autonomic routing in opportunistic networks |
|
|
31 | (38) |
|
|
|
|
|
32 | (1) |
|
The opportunistic networking concept and its applications |
|
|
33 | (3) |
|
Opportunistic networking case studies and applications |
|
|
35 | (1) |
|
|
36 | (7) |
|
CMM and HCMM: functional description |
|
|
37 | (3) |
|
HCMM vs. CMM: Controlling Node Positions |
|
|
40 | (3) |
|
Routing in opportunistic networks |
|
|
43 | (5) |
|
Context-oblivious routing |
|
|
43 | (1) |
|
Partially context-aware routing |
|
|
44 | (2) |
|
Fully context-aware routing |
|
|
46 | (1) |
|
The History-based Opportunistic Routing protocol |
|
|
47 | (1) |
|
Performance of opportunistic routing approaches under social mobility patterns |
|
|
48 | (14) |
|
Performance evaluation strategy |
|
|
48 | (2) |
|
Impact of collective groups' movements (reconfigurations) |
|
|
50 | (4) |
|
Impact of User Sociability |
|
|
54 | (5) |
|
|
59 | (3) |
|
|
62 | (3) |
|
|
65 | (4) |
|
A Collaborative Knowledge Plane for Autonomic Networks |
|
|
69 | (24) |
|
|
|
|
69 | (2) |
|
|
71 | (2) |
|
|
71 | (1) |
|
|
71 | (2) |
|
Collaborative knowledge plane architecture |
|
|
73 | (5) |
|
|
73 | (1) |
|
|
74 | (2) |
|
Knowledge plane building blocks |
|
|
76 | (2) |
|
|
78 | (5) |
|
Machine learning algorithm for self-adaptation |
|
|
78 | (1) |
|
Study Case: self-adaptation of a DiffServ router |
|
|
79 | (4) |
|
|
83 | (7) |
|
Situated View and Basic concepts |
|
|
83 | (3) |
|
Situated Knowledge sharing algorithm |
|
|
86 | (2) |
|
Performance and guarantees |
|
|
88 | (2) |
|
|
90 | (1) |
|
|
90 | (3) |
|
A Rate Feedback Predictive Control Scheme Based on Neural Network and Control Theory for Autonomic Communication |
|
|
93 | (18) |
|
|
|
|
|
|
|
|
94 | (1) |
|
|
95 | (3) |
|
The Predictive Control Model of a Bottleneck Buffer |
|
|
95 | (3) |
|
The Predictive Control Technique |
|
|
98 | (1) |
|
The BP Neural Network Architecture |
|
|
98 | (1) |
|
Multi-step Neural Predictive Technique |
|
|
98 | (1) |
|
|
99 | (6) |
|
|
105 | (1) |
|
|
106 | (5) |
|
Part II Autonomic Communication Services and Middleware |
|
|
|
Hovering Information --- Self-Organizing Information that Finds its Own Storage |
|
|
111 | (36) |
|
Alfredo A. Villalba Castro |
|
|
Giovanna Di Marzo Serugendo |
|
|
|
|
111 | (2) |
|
|
113 | (3) |
|
Hovering Information Concept |
|
|
116 | (7) |
|
Coordinates, Distances and Areas |
|
|
116 | (1) |
|
|
116 | (2) |
|
|
118 | (2) |
|
|
120 | (1) |
|
Properties - Requirements |
|
|
121 | (2) |
|
Algorithms for Hovering Information |
|
|
123 | (10) |
|
|
124 | (1) |
|
Safe, Risk and Relevant Areas |
|
|
125 | (2) |
|
|
127 | (2) |
|
|
129 | (2) |
|
|
131 | (2) |
|
|
133 | (8) |
|
Simulation Settings and Scenarios |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (6) |
|
|
141 | (2) |
|
|
143 | (2) |
|
|
144 | (1) |
|
|
145 | (2) |
|
The CASCADAS Framework for Autonomic Communications |
|
|
147 | (22) |
|
|
|
|
|
|
148 | (1) |
|
Autonomic Communication Frameworks |
|
|
149 | (2) |
|
|
151 | (5) |
|
|
153 | (3) |
|
Semantic Self-Organization |
|
|
156 | (2) |
|
|
158 | (2) |
|
|
160 | (1) |
|
Security and Self-Preservation |
|
|
161 | (2) |
|
Pervasive Behavioral Advertisement Scenario |
|
|
163 | (2) |
|
|
165 | (1) |
|
|
166 | (3) |
|
Autonomic Middleware for Automotive Embedded Systems |
|
|
169 | (42) |
|
|
|
|
|
|
|
|
|
|
|
169 | (1) |
|
Automotive challenges and DySCAS |
|
|
170 | (3) |
|
Background and related work |
|
|
173 | (2) |
|
Middleware for distributed computer systems |
|
|
173 | (1) |
|
Policy-based configuration |
|
|
174 | (1) |
|
The DYSCAS Middleware Architecture |
|
|
175 | (3) |
|
The Component Model for DySCAS Middleware Services |
|
|
178 | (7) |
|
Policy-based configuration in the DySCAS component model |
|
|
181 | (4) |
|
Autonomic reconfiguration |
|
|
185 | (9) |
|
Task migration as an actuation mechanism |
|
|
186 | (1) |
|
Using policies for flexible reconfiguration mechanisms |
|
|
186 | (1) |
|
Algorithms and an approach for Dependability and Quality Management and Autonomic Configuration Management |
|
|
186 | (3) |
|
An Approach for Load Balancing |
|
|
189 | (5) |
|
A reference implementation of DySCAS |
|
|
194 | (3) |
|
Implementation of the DySCAS architecture |
|
|
194 | (3) |
|
A framework for modelling, designing and analysing dynamically configurable systems |
|
|
197 | (8) |
|
|
199 | (1) |
|
Safety analysis and formal verification |
|
|
200 | (5) |
|
Open issues and ongoing work |
|
|
205 | (1) |
|
Integration with a legacy statically reconfigurable platform |
|
|
205 | (1) |
|
Implementation on a resource-constrained platform |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (4) |
|
Social Opportunistic Computing: Design for Autonomic User-Centric Systems |
|
|
211 | (20) |
|
|
|
|
|
211 | (2) |
|
|
213 | (2) |
|
First Phase: Understanding the Technological and User constraints |
|
|
215 | (3) |
|
Assessing contact opportunities of an office environment |
|
|
215 | (2) |
|
Assessing users expectations |
|
|
217 | (1) |
|
Opportunistic Content Distribution Application |
|
|
218 | (6) |
|
The Technological Dimension |
|
|
219 | (3) |
|
Evaluating User Preferences |
|
|
222 | (2) |
|
Phase 3: combining users and technological constraints |
|
|
224 | (3) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
228 | (3) |
|
Programming and Validation Techniques for Reliable Goal-driven Autonomic Software |
|
|
231 | (20) |
|
|
|
|
|
|
231 | (1) |
|
Challenges for Mission Critical Autonomous Software |
|
|
232 | (2) |
|
Parallelism and Complexity |
|
|
233 | (1) |
|
Motivation and Contributions |
|
|
233 | (1) |
|
Temporal Constraint Networks |
|
|
234 | (1) |
|
Verification and Automatic Parallelization Framework |
|
|
235 | (6) |
|
The Problem of TCN Constraint Propagation |
|
|
235 | (3) |
|
Modeling, Formal Verification, and Automatic Parallelization |
|
|
238 | (3) |
|
Nonblocking Synchronization |
|
|
241 | (3) |
|
Practical Lock-Free Programming Techniques |
|
|
242 | (1) |
|
Overview of the Lock-free Operations |
|
|
242 | (2) |
|
Framework Application for Accelerated Testing |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
246 | (5) |
|
Part III Applications to Ad-Hoc (Sensor) Networks and Pervasive Systems |
|
|
|
Autonomic Communication in Pervasive Multimodal Multimedia Computing System |
|
|
251 | (34) |
|
|
|
|
|
|
252 | (1) |
|
|
253 | (1) |
|
Contribution and Novel Approaches |
|
|
254 | (1) |
|
|
255 | (8) |
|
Context Definition and Representation |
|
|
255 | (1) |
|
The Virtual Machine and the Incremental Interaction Context |
|
|
256 | (6) |
|
Context Storage and Dissemination |
|
|
262 | (1) |
|
Modalities, Media Devices and Context Suitability |
|
|
263 | (5) |
|
Classification of Modalities |
|
|
263 | (1) |
|
Classification of Media Devices |
|
|
263 | (1) |
|
Relationship between Modalities and Media Devices |
|
|
264 | (1) |
|
Measuring the Context Suitability of a Modality |
|
|
264 | (1) |
|
Optimal Modalities and Media Devices' Priority Rankings |
|
|
265 | (2) |
|
Rules for Priority Ranking of Media Devices |
|
|
267 | (1) |
|
Context Learning and Adaptation |
|
|
268 | (12) |
|
Specimen Interaction Context |
|
|
268 | (3) |
|
Scenarios and Case-Based Reasoning with Supervised Learning |
|
|
271 | (5) |
|
Assigning a Scenario's MDPT |
|
|
276 | (1) |
|
Finding Replacement to a Missing or Failed Device |
|
|
277 | (1) |
|
Media Devices' Priority Re-ranking due to a Newly-Installed Device |
|
|
278 | (1) |
|
Our Pervasive Multimodal Multimedia Computing System |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
281 | (4) |
|
Self-healing for Autonomic Pervasive Computing |
|
|
285 | (24) |
|
|
|
|
|
|
285 | (2) |
|
|
287 | (1) |
|
Characteristics of Self-healing Model |
|
|
288 | (1) |
|
|
288 | (4) |
|
Self-healing System of Autonomic Pervasive Computing |
|
|
288 | (2) |
|
|
290 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
292 | (1) |
|
Self Healing in Autonomic Pervasive Computing |
|
|
292 | (5) |
|
|
292 | (2) |
|
|
294 | (1) |
|
|
295 | (1) |
|
|
295 | (2) |
|
Attributes of Our Proposed Model |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (1) |
|
Non degradable performance |
|
|
298 | (1) |
|
|
298 | (2) |
|
|
300 | (4) |
|
|
301 | (2) |
|
|
303 | (1) |
|
Application that Uses Self-healing Model |
|
|
304 | (1) |
|
Conclusion and Future Work |
|
|
304 | (1) |
|
|
305 | (4) |
|
Map-based Design for Autonomic Wireless Sensor Networks |
|
|
309 | (18) |
|
|
|
|
|
|
Introduction and Chapter Structure |
|
|
309 | (2) |
|
|
311 | (2) |
|
Models for Sensing the Real World |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
The Map-based World Model |
|
|
313 | (4) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
Region and Map Construction Techniques |
|
|
316 | (1) |
|
|
317 | (4) |
|
Enhancement of WSN Autonomicity |
|
|
318 | (1) |
|
|
319 | (1) |
|
Case Study: Designing a Network Partitioning Prediction Technique |
|
|
319 | (2) |
|
MWM Implementation in OMNeT++ |
|
|
321 | (2) |
|
MWM Implementation Architecture |
|
|
321 | (1) |
|
Uses of Simulator Extension |
|
|
321 | (2) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
324 | (3) |
|
An Efficient, Scalable and Robust P2P Overlay for Autonomic Communication |
|
|
327 | (24) |
|
|
|
|
|
328 | (1) |
|
Background on P2P Overlay Networks |
|
|
328 | (1) |
|
Challenges and Requirements in Supporting P2P for AC |
|
|
329 | (2) |
|
Information reflection and collection |
|
|
329 | (1) |
|
Lack of Centralized Control |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
331 | (5) |
|
|
331 | (2) |
|
|
333 | (1) |
|
The selection and performance of ICs |
|
|
334 | (2) |
|
|
336 | (4) |
|
Two rules for maintenance |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
Evaluation and experimental results |
|
|
340 | (8) |
|
|
340 | (2) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
344 | (2) |
|
Fault-tolerance and robustness |
|
|
346 | (2) |
|
Conclusion and future directions |
|
|
348 | (1) |
|
|
348 | (3) |
|
Autonomic and Coevolutionary Sensor Networking |
|
|
351 | (22) |
|
|
|
|
351 | (2) |
|
|
353 | (4) |
|
Agent Structure and Behaviors |
|
|
353 | (2) |
|
Behavior Sequence for DAs |
|
|
355 | (1) |
|
Behavior Sequence for EAs |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (4) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (7) |
|
Data Collection Application |
|
|
363 | (1) |
|
Event Detection Application |
|
|
364 | (2) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (3) |
Index |
|
373 | |