Distributed resource administration using Cfengine
Software—Practice & Experience
LISA '98 Proceedings of the 12th Conference on Systems Administration
Theoretical System Administration
LISA '00 Proceedings of the 14th USENIX conference on System administration
Seeking Closure in an Open World: A Behavioral Agent Approach to Configuration Management
LISA '03 Proceedings of the 17th USENIX conference on System administration
Experience in Implementing an HTTP Service Closure
LISA '04 Proceedings of the 18th USENIX conference on System administration
Experience implementing an IP address closure
LISA '06 Proceedings of the 20th conference on Large Installation System Administration
Modeling next generation configuration management tools
LISA '06 Proceedings of the 20th conference on Large Installation System Administration
Dynamic Consistency Analysis for Convergent Operators
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
An approach to understanding policy based on autonomy and voluntary cooperation
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Dynamic Consistency Analysis for Convergent Operators
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
Dynamics of Resource Closure Operators
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
Management without (Detailed) Models
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Combining Learned and Highly-Reactive Management
MACE '09 Proceedings of the 4th IEEE International Workshop on Modelling Autonomic Communications Environments
Scalable mining of frequent tri-concepts from folksonomies
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II
Hi-index | 0.00 |
We explore how fixed-point operators can be designed to interact and be composed to form autonomic control mechanisms. We depart from the idea that an operator is idempotent only for the states that it assures, and define a more general concept in which acceptable states are a superset of assurable states. This modified definition permits operators to make arbitrary choices that are later changed by other operators, easing their composition and allowing them to maintain aspects of a configuration. The result is that operators can be used to implement closures, which can in turn be used to build self-managing systems.