Introduction to Multiagent Systems
Introduction to Multiagent Systems
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver
IEEE Transactions on Computers
AMUN-autonomic middleware for ubiquitous environments applied to the smart doorplate project
Advanced Engineering Informatics
Toward autonomic pervasive computing
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
ARCS'07 Proceedings of the 20th international conference on Architecture of computing systems
Macro and micro context-awareness for autonomic pervasive computing
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
A macro and micro context awareness model for the provision of services in smart spaces
ICOST'12 Proceedings of the 10th international smart homes and health telematics conference on Impact Ananlysis of Solutions for Chronic Disease Prevention and Management
Service delivery and provision in smart environment
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Hi-index | 0.00 |
The way computer systems are built dramatically changed over time. Starting from huge monolithic systems for many users up to ubiquitous computer environments with a lot of distributed and embedded computing power. Also the way these systems are configured has changed. The Autonomic and Organic Computing initiatives try to solve the upcoming management of complexity problems by utilizing biologically or sociologically inspired methods. One of the demands to the systems is self-configuration. This paper proposes a self-configuration process for the networked nodes of the AMUN middleware based on a social behavior. Aim of the self-configuration is to find a good distribution of services by calculating a quality of service based on the given resources and the required resources of the services. A configuration specification is provided and flooded into the network to start the cooperative job assignment algorithm. A terminal verification step guarantees the correctness of the found configuration. Evaluations of the completely distributed self-configuration process are provided.