Utility Computing
Editat de Akhil Sahai, Wu Felixen Limba Engleză Paperback – 27 oct 2004
Preț: 320.59 lei
Preț vechi: 400.73 lei
-20% Nou
Puncte Express: 481
Preț estimativ în valută:
56.73€ • 66.16$ • 49.81£
56.73€ • 66.16$ • 49.81£
Carte tipărită la comandă
Livrare economică 15-29 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540236313
ISBN-10: 3540236317
Pagini: 288
Ilustrații: XII, 276 p.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.44 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540236317
Pagini: 288
Ilustrații: XII, 276 p.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.44 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Management Architecture.- Requirements on Quality Specification Posed by Service Orientation.- Automating the Provisioning of Application Services with the BPEL4WS Workflow Language.- HiFi+: A Monitoring Virtual Machine for Autonomic Distributed Management.- SLA Based Management.- Defining Reusable Business-Level QoS Policies for DiffServ.- Policy Driven Business Performance Management.- Business Driven Prioritization of Service Incidents.- Policy Based Management.- A Case-Based Reasoning Approach for Automated Management in Policy-Based Networks.- An Analysis Method for the Improvement of Reliability and Performance in Policy-Based Management Systems.- Policy-Based Resource Assignment in Utility Computing Environments.- Automated Management.- Failure Recovery in Distributed Environments with Advance Reservation Management Systems.- Autonomous Management of Clustered Server Systems Using JINI.- Event-Driven Management Automation in the ALBM Cluster System.- Analysis and Reasoning.- A Formal Validation Model for the Netconf Protocol.- Using Object-Oriented Constraint Satisfaction for Automated Configuration Generation.- Problem Determination Using Dependency Graphs and Run-Time Behavior Models.- Trust and Security.- Role-Based Access Control for XML Enabled Management Gateways.- Spotting Intrusion Scenarios from Firewall Logs Through a Case-Based Reasoning Approach.- A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems.- Implementation, Instrumentation, Experience.- Using Process Restarts to Improve Dynamic Provisioning.- Server Support Approach to Zero Configuration In-Home Networking.- Rule-Based CIM Query Facility for Dependency Resolution.- Short Papers.- Work in Progress: Availability-Aware Self-Configuration in Autonomic Systems.- ABHA: AFramework for Autonomic Job Recovery.- Can ISPs and Overlay Networks Form a Synergistic Co-existence?.- Simplifying Correlation Rule Creation for Effective Systems Monitoring.
Caracteristici
Includes supplementary material: sn.pub/extras