Heuristics: intelligent search strategies for computer problem solving
Heuristics: intelligent search strategies for computer problem solving
Approximation algorithms for bin packing: a survey
Approximation algorithms for NP-hard problems
Best-fit bin-packing with random order
Proceedings of the seventh annual ACM-SIAM symposium on Discrete algorithms
Average-case analyses of first fit and random fit bin packing
Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms
High Availability Network Fundamentals: A Practical Guide to Predicting Network Availability
High Availability Network Fundamentals: A Practical Guide to Predicting Network Availability
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Checking Service Instance Protection for AMF Configurations
SSIRI '09 Proceedings of the 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement
A model driven approach for AMF configuration generation
SAM'10 Proceedings of the 6th international conference on System analysis and modeling: about models
Vector bin packing with multiple-choice
SWAT'10 Proceedings of the 12th Scandinavian conference on Algorithm Theory
The tight bound of first fit decreasing bin-packing algorithm is FFD(I) ≤ 11/9OPT(I) + 6/9
ESCAPE'07 Proceedings of the First international conference on Combinatorics, Algorithms, Probabilistic and Experimental Methodologies
Hi-index | 0.00 |
AMF (Availability Management Framework) is a middleware service that manages the availability of applications. AMF has been defined by the Service Availability Forum (SA Forum). An AMF configuration for an application running on top of AMF is a logical organization of hardware and software resources to provide and protect services. Resources, namely components, are grouped into logical entities such as service units and service groups and are set together at configuration time to provide and protect services represented as component service instances and service instances. The assignment of component service instances and service instances to components and service units, respectively, is performed at runtime by the AMF middleware. However, the configuration is valid if and only if it satisfies all AMF constraints, including the provisioning and protection of the services. Therefore, the problem is how to ensure at configuration time that the services will be protected at runtime. In a previous work, we tackled this problem and proved it to be NP-hard in general for most redundancy models. Here, we tackle the problem of AMF configuration validation further with heuristics using extended versions of heuristics developed for the bin-packing problem. We consider all the redundancy models for which the problem is NP-hard. In addition, we propose an approach which incrementally adds resources to a "likely" invalid configuration and transforms it into a valid one.