Trustworthy Autonomic Computing
The concept of autonomic computing seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility for low-level tasks from humans to the system while allowing humans to concentrate on high-level tasks. This is achieved by building self-manag...
Saved in:
Main Author | |
---|---|
Format | eBook |
Language | English |
Published |
Stevenage
The Institution of Engineering and Technology
2022
Institution of Engineering and Technology (The IET) Institution of Engineering & Technology Institution of Engineering and Technology |
Edition | 1 |
Series | Computing and Networks |
Subjects | |
Online Access | Get full text |
ISBN | 1785618830 9781785618833 |
DOI | 10.1049/PBPC030E |
Cover
Loading…
Abstract | The concept of autonomic computing seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility for low-level tasks from humans to the system while allowing humans to concentrate on high-level tasks. This is achieved by building self-managing systems that are generally capable of self-configuring, self-healing, self-optimising, and self-protecting.
Trustworthy autonomic computing technologies are being applied in datacentre and cloud management, smart cities and autonomous systems including driverless cars. However, there are still significant challenges to achieving trustworthiness. This book covers challenges and solutions in autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system self-management. Researchers, developers and users need to be confident that an autonomic self-managing system will remain correct in the face of any possible contexts and environmental inputs.
The book is aimed at researchers in autonomic computing, autonomics and trustworthy autonomics. This will be a go-to book for foundational knowledge, proof of concepts and novel trustworthy autonomic techniques and approaches. It will be useful to lecturers and students of autonomic computing, autonomics and multi-agent systems who need an easy-to-use text with sample codes, exercises, use-case demonstrations. This is also an ideal tutorial guide for independent study with simple and well documented diagrams to explain techniques and processes. |
---|---|
AbstractList | The concept of autonomic computing seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility for low-level tasks from humans to the system while allowing humans to concentrate on high-level tasks. This is achieved by building self-managing systems that are generally capable of self-configuring, self-healing, self-optimising, and self-protecting.Trustworthy autonomic computing technologies are being applied in datacentre and cloud management, smart cities and autonomous systems including driverless cars. However, there are still significant challenges to achieving trustworthiness. This book covers challenges and solutions in autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system self-management. Researchers, developers and users need to be confident that an autonomic self-managing system will remain correct in the face of any possible contexts and environmental inputs.The book is aimed at researchers in autonomic computing, autonomics and trustworthy autonomics. This will be a go-to book for foundational knowledge, proof of concepts and novel trustworthy autonomic techniques and approaches. It will be useful to lecturers and students of autonomic computing, autonomics and multi-agent systems who need an easy-to-use text with sample codes, exercises, use-case demonstrations. This is also an ideal tutorial guide for independent study with simple and well documented diagrams to explain techniques and processes. The concept of autonomic computing seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility for low-level tasks from humans to the system while allowing humans to concentrate on high-level tasks. This is achieved by building self-managing systems that are generally capable of self-configuring, self-healing, self-optimising, and self-protecting. Trustworthy autonomic computing technologies are being applied in datacentre and cloud management, smart cities and autonomous systems including driverless cars. However, there are still significant challenges to achieving trustworthiness. This book covers challenges and solutions in autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system self-management. Researchers, developers and users need to be confident that an autonomic self-managing system will remain correct in the face of any possible contexts and environmental inputs. The book is aimed at researchers in autonomic computing, autonomics and trustworthy autonomics. This will be a go-to book for foundational knowledge, proof of concepts and novel trustworthy autonomic techniques and approaches. This book covers challenges and solutions of autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system self-management. This is an ideal tutorial guide for independent study with simple and well documented diagrams to explain techniques and processes. The concept of autonomic computing seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility for low-level tasks from humans to the system while allowing humans to concentrate on high-level tasks. This is achieved by building self-managing systems that are generally capable of self-configuring, self-healing, self-optimising, and self-protecting. Trustworthy autonomic computing technologies are being applied in datacentre and cloud management, smart cities and autonomous systems including driverless cars. However, there are still significant challenges to achieving trustworthiness. This book covers challenges and solutions in autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system self-management. Researchers, developers and users need to be confident that an autonomic self-managing system will remain correct in the face of any possible contexts and environmental inputs. The book is aimed at researchers in autonomic computing, autonomics and trustworthy autonomics. This will be a go-to book for foundational knowledge, proof of concepts and novel trustworthy autonomic techniques and approaches. It will be useful to lecturers and students of autonomic computing, autonomics and multi-agent systems who need an easy-to-use text with sample codes, exercises, use-case demonstrations. This is also an ideal tutorial guide for independent study with simple and well documented diagrams to explain techniques and processes. |
Author | Eze, Thaddeus |
Author_xml | – sequence: 1 givenname: Thaddeus surname: Eze fullname: Eze, Thaddeus organization: University of Chester, Computer Science Department, UK |
BookMark | eNqN0d9LwzAQB_CIP9DNgf-BexFUmOaaNEkftzJ_wMA9DF9D2qZbadfUJt3cf29nN3z16fgeH-7grofOSlNqhG4APwGmwfN8Mg8xwdMT1AMufAZC0OD0LxB80QbiM4w9wsglGlibRdjHFASlcIVuF3Vj3dbUbrUbjhtnSrPO4mFo1lXjsnJ5jc5TVVg9ONQ--nyZLsK30ezj9T0cz0YKALgbCYYFKO17aZDwOMWEBonPYpWKyKMKBLAoTlXEQTGR-JxrQWOlWEKSKIg9PyV99NANVjbXW7syhbNyU-jImNzKgAsQhHuUCvD-YY-3wK2972xVm69GWyd_WaxLV6tCTichwV5AGbCW3nU0L81GF7Kqs7Wqd3LvZV4txiFuz7hf_9i5TB-mWWnqpXQrve-YMvuWx8eQH6yPfVQ |
ContentType | eBook |
Copyright | 2022 |
Copyright_xml | – notice: 2022 |
DEWEY | 004 |
DOI | 10.1049/PBPC030E |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 1785618849 9781785618840 9781523153275 152315327X 9781837244812 1837244812 |
Edition | 1 |
ExternalDocumentID | 9781837244812 9781785618840 EBC30294616 book_kpTAC00022 org.theiet.onix.PBPC030E |
GroupedDBID | 38. AABBV ABIXB ACXXF ACYDS ALMA_UNASSIGNED_HOLDINGS APNQY BBABE CMZ CZZ DYXOI EBSCA K-E KT4 TD3 TF4 -VX ABMRC DUGUG |
ID | FETCH-LOGICAL-a1117t-86081ae52f9d7cf0349d56caf8b24a1816bcfab71a68d577e84caa6d3db9c25f3 |
IEDL.DBID | KT4 |
ISBN | 1785618830 9781785618833 |
IngestDate | Thu Jul 17 04:18:19 EDT 2025 Fri Nov 08 02:32:42 EST 2024 Fri May 30 23:59:58 EDT 2025 Sat Nov 23 14:04:52 EST 2024 Sun Apr 27 04:21:57 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-a1117t-86081ae52f9d7cf0349d56caf8b24a1816bcfab71a68d577e84caa6d3db9c25f3 |
OCLC | 1356002363 |
PQID | EBC30294616 |
PageCount | 264 |
ParticipantIDs | askewsholts_vlebooks_9781837244812 askewsholts_vlebooks_9781785618840 proquest_ebookcentral_EBC30294616 knovel_primary_book_kpTAC00022 iet_ebooks_org_theiet_onix_PBPC030E |
PublicationCentury | 2000 |
PublicationDate | 2022 2023 2022-11-22 |
PublicationDateYYYYMMDD | 2022-01-01 2023-01-01 2022-11-22 |
PublicationDate_xml | – year: 2022 text: 2022 |
PublicationDecade | 2020 |
PublicationPlace | Stevenage |
PublicationPlace_xml | – name: Stevenage |
PublicationSeriesTitle | Computing and Networks |
PublicationYear | 2022 2023 |
Publisher | The Institution of Engineering and Technology Institution of Engineering and Technology (The IET) Institution of Engineering & Technology Institution of Engineering and Technology |
Publisher_xml | – name: The Institution of Engineering and Technology – name: Institution of Engineering and Technology (The IET) – name: Institution of Engineering & Technology – name: Institution of Engineering and Technology |
SSID | ssib050418441 ssib056431669 |
Score | 2.3282564 |
Snippet | The concept of autonomic computing seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility... This book covers challenges and solutions of autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system... |
SourceID | askewsholts proquest knovel iet |
SourceType | Aggregation Database Publisher |
SubjectTerms | Autonomic computing Computer networking & communications COMPUTERS General Engineering & Project Administration General References Networking Software Engineering |
TableOfContents | Chapter 1: Trustworthy autonomics primer -- Chapter 2: Evolution of autonomic computing -- Chapter 3: Autonomic enabling techniques -- Chapter 4: Trustworthy autonomic computing -- Chapter 5: Trustworthy autonomic architecture implementations -- Chapter 6: Multi-agent interoperability -- Chapter 7: Level of autonomicity -- Chapter 8: Conclusions and future work Title Page Preface Table of Contents 1. Trustworthy Autonomics Primer 2. Evolution of Autonomic Computing 3. Autonomic Enabling Techniques 4. Trustworthy Autonomic Computing 5. Trustworthy Autonomic Architecture Implementations 6. Multi-Agent Interoperability 7. Level of Autonomicity 8. Conclusions and Future Work References Index 8.3 Techniques that power autonomic computing -- 8.4 Trustworthy autonomic architecture -- 8.5 Interoperability -- 8.6 Level of autonomicity (LoA) -- 8.7 Future work -- References -- Index Intro -- Contents -- Preface -- About the Author -- Chapter 1: Trustworthy autonomics primer -- 1.1 Introduction to autonomic computing -- 1.2 Foundations of trustworthy autonomics -- Chapter 2: Evolution of autonomic computing -- 2.1 Importance of understanding the evolution of autonomic computing -- 2.2 Autonomic Architecture -- 2.3 Autonomic computing: trends and direction -- 2.4 Trends, direction and open challenges -- 2.5 Conclusion -- Chapter 3: Autonomic enabling techniques -- 3.1 About autonomic enabling techniques -- 3.2 Simple exponential smoothing -- 3.3 Dead-zone logic -- 3.4 Stigmergy -- 3.5 Policy autonomics -- 3.6 Utility function -- 3.7 Fuzzy logic -- 3.8 Autonomic nervous system -- 3.9 Combining autonomic techniques -- 3.10 Conclusion -- Chapter 4: Trustworthy autonomic computing -- 4.1 About trustworthy autonomic computing -- 4.2 Trustworthy autonomic computing vs trusted computing -- 4.3 Trustworthy autonomic architecture -- 4.4 Conclusion -- Chapter 5: Trustworthy autonomic architecture implementations -- 5.1 Case example scenario 1: autonomic marketing system -- 5.2 Case example scenario 2: self-adapting resource allocation -- 5.3 Stability versus optimality -- 5.4 Conclusion -- Chapter 6: Multi-agent interoperability -- 6.1 Introduction to multi-agent interoperability -- 6.2 Multi-agent systems and multi-agent coordination -- 6.3 A review of autonomic interoperability solutions -- 6.4 The architecture-based interoperability -- 6.5 Complex interactions in multi-manager scenario -- 6.6 Conclusion -- Chapter 7: Level of autonomicity -- 7.1 Introduction to level of autonomicity -- 7.2 Measuring LoA -- 7.3 Methodology for measuring LoA -- 7.4 Evaluating autonomic systems -- 7.5 Conclusion -- Chapter 8: Conclusions and future work -- 8.1 A case for trustworthy autonomics -- 8.2 The autonomic computing state of the art |
Title | Trustworthy Autonomic Computing |
URI | https://dx.doi.org/10.1049/PBPC030E https://app.knovel.com/hotlink/toc/id:kpTAC00022/trustworthy-autonomic/trustworthy-autonomic?kpromoter=Summon https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=30294616 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781785618840 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781837244812 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwvV1Lb9QwEB71caEXQC1ieSxb2qu7ie04DhfURltVrVr1sKCKi-VXoErZrNi0An4Ev5mxs6EVVHDjEimObckzzsw39jwAdo3wzOZGk0RaSrhnhhQ-ZYSjdjKJS6mOSX1Oz8TRO358kV2swOc-FiYUt6pnzY2_imL6U9OGi8xx29jxpXtTz6f7ZczZMo4hCdGN7hvR120XxHt_69t6Hl3bcGt0R0ursI4wIwu22sn013bMEo7mDk9D-FcuEVdIyfqsUP076_PX8mJ8fnBe4i8y2YANvahRJKG4aheooy59AKndKv4Q8VFvHT6EH_2KO3eVeu-6NXv2-2_JIP8bSR7Bug_RFY9hxc824dX0dtRovx816ipNoE7dgveHk2l5RJYVG4hGmZm3RAqEGNpntCpcbquQ_MZlwupKGso1oglhbKVNnmohXZbnXnKrtXDMmcLSrGJPYG3WzPxTGBnkR-VDGSXtucuoYVZYh_YqKzijMhnA6ztkVzdX8XZ5oe6wi_-1E5rmiG0Q4AxgB1mmlp-aLx9VuKTBFpSqX1XP5gEMOy6oeZcHRIX-6pb-A9juWd3NtXSvVZODkiW04CIVz_41yXN4QEOARTzkeQFryD3_EmFPa4awWp5-wOcJmQzjxv0JOMEKPQ |
linkProvider | Knovel |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Trustworthy+Autonomic+Computing&rft.au=Eze%2C+Thaddeus&rft.date=2023-01-01&rft.pub=Institution+of+Engineering+%26+Technology&rft.isbn=9781785618833&rft_id=info:doi/10.1049%2FPBPC030E&rft.externalDocID=EBC30294616 |
thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97817856%2F9781785618840.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97818372%2F9781837244812.jpg |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fcontent.knovel.com%2Fcontent%2FThumbs%2Fthumb15106.gif |