Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
A pervasive system features a plethora of devices, services and applications organized as a large distributed system. One approach to managing such systems is by policies where ad...
We consider the task of assigning experts from a portfolio of specialists in order to solve a set of tasks. We apply a Bayesian model which combines collaborative filtering with a...
David H. Stern, Horst Samulowitz, Ralf Herbrich, T...
Distributed constraint optimization (DCOP) provides a framework for coordinated decision making by a team of agents. Often, during the decision making, capacity constraints on age...
The paper discusses the potential usage of principles from General System Theory (GST) and Cybernetics for design of Autonomic Software. Motivated by the characteristics of open s...
Emil A. Stoyanov, Dieter Roller, Markus Alexander ...