throbber
Chapman &. Hall/CRC
`Studies in Informatics Series
`
`CONTEXT-AWARE
`COMPUTING AND
`SELF-
`NAGING
`SYSTEMS
`
`• ' Sensor
`
`, Effector
`
`. . . .. . ..
`
`..
`
`Edited by
`Waltenegus Dargie
`
`Page 1 of 202
`
`SNAP EXHIBIT 1018
`
`

`

`CONTEXT-AWARECOMPUTINGAND
`
`
`
`SELF-MANAGINGSYSTEMS
`
`
`
`a
`
`BeVea
`
`Page 2 of 202
`
`Page 2 of 202
`
`

`

`CONTEXT-AWARE
`COMPUTING AND
`SELF-MANAGING
`SYSTEMS
`
`Page 3 of 202
`
`

`

`Chapman & Hall/CRC
`Studies in Informatics Series
`
`SERIES EDITOR
`G. Q. Zhang
`Case Western Reserve University
`Department of EECS
`Cleveland, Ohio, U.S.A
`
`PUBLISHED TITLES
`
`Stochastic Relations: Foundations for Markov Transition Systems
`Ernst-Erich Doberkat
`
`Conceptual Structures in Practice
`Pascal Hitzler and Henrik Scharfe
`
`Context-Aware Computing and Self-Managing Systems
`Waltenegus Dargie
`
`Page 4 of 202
`
`

`

`Chapman & Hall/ CRC
`Studies in Informatics Series
`
`CONTEXT-AWARE
`COMPUTING AND
`SELF-MANAGING
`SYSTEMS
`
`Edited by
`Waltenegus Dargie
`
`0 CRC Press
`
`Taylor & Francis Group
`Boca Raton London New York
`
`CRC Press is an imprint of the
`Taylor & Francis Group, an informa business
`A CHAPMAN & HALL BOOK
`
`Page 5 of 202
`
`

`

`CRC Press
`Taylor & Francis Group
`6000 Broken Sound Parkway NW, Suite 300
`Boca Raton, FL 33487-2742
`
`·First issued in paperback 2019
`
`© 2009 by Taylor & Francis Group, LLC
`CRC Press is an imprint of Taylor & Francis Group, an Informa business
`No claim to original U.S. Government works
`
`ISBN-13: 978-1-4200-7771-1 (hbk)
`ISBN-13: 978-0-367-38584-2 (pbk)
`
`This book contains information obtained from authentic and highly regarded sources. Reasonable
`efforts have been made to publish reliable data and information, but the author and publisher can(cid:173)
`not assume responsibility for the validity of all materials or the consequences of their use. The
`authors and publishers have attempted to trace the copyright holders of all material reproduced
`in this publication and apologize to copyright holders if permission to publish in this form has not
`been obtained. If any copyright material has not been acknowledged please write and let us know so
`we may rectify in any future reprint.
`
`Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
`transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
`hereafter invented, including photocopying, microfilming, and recording, or in any information
`storage or retrieval system, without written permission from the publishers.
`For permission to photocopy or use material electronically from this work, please access www.copy(cid:173)
`right.com(http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222
`Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro(cid:173)
`vides licenses and registration for a variety of users. For organizations that have been granted a
`photocopy license by the CCC, a separate system of payment has been arranged.
`Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and
`are used only for identification and explanation without intent to infringe.
`
`Library of Congress Cataloging-in-Publication Data
`
`Context-aware computing and self-managing systems / [edited by] Waltenegus
`Dargie. -- 1st ed.
`p. cm. -- (Context-aware computing and self-managing systems)
`Includes bibliographical references and index.
`ISBN 978-1-4200-7771-1 (alk. paper)
`1. Autonomic computing. I. Dargie, Waltenegus.
`
`QA76.9.A97C65 2009
`004--dc22
`
`Visit the Taylor & Francis Web site at
`http:/ /www.taylorandfrancis.com
`
`and the CRC Press Web site at
`http:/ /www.crcpress.com
`
`2008038056
`
`Page 6 of 202
`
`

`

`To Pheben, with love. Welcome to the world.
`
`V
`
`Page 7 of 202
`
`

`

`Page 8 of 202
`
`Page 8 of 202
`
`

`

`Preface
`
`This book brings two research issues together: context-aware computing and
`the self-managing aspect of autonomous computing. Context-aware com(cid:173)
`puting is an extensively researched area, while self-managing systems are
`emerging. The goal of this book is to investigate the various roles context(cid:173)
`aware computing can play to develop self-managing systems, where a self(cid:173)
`management system can be a device, a middleware, an application, or a net(cid:173)
`work.
`The first chapter of the book identifies aspects that are common to both
`context-aware computing and autonomous computing. It offers a basic def(cid:173)
`inition of context-awareness and provides several examples ~ more focus is
`given to the acquisition, presentation and management of context informa(cid:173)
`tion. It presents as well basic aspects of self-managing systems and offers a
`few examples of self-managing systems.
`The remaining part of the book is divided into context-awareness and self(cid:173)
`management. The context-awareness subpart demonstrates how a context
`can be employed to make systems smart; how a context can be captured
`and represented; and how dynamic binding of context sources can be pos(cid:173)
`sible. The self-management subpart of the book demonstrates the need for
`"implicit-knowledge" to develop fault-tolerant and self-protective systems. It
`also presents a higher-level vision of future large-scale networks.
`Several researchers have participated in editing this book. I would like to
`acknowledge the contributions of Prof. Noriaki Kuwahara (Kyoto Institute
`of Technology), Prof. Ren Ohmura (Keio University), Prof. Markus Endler
`( Catholic University of Rio de Janeiro), Prof. Antonio Alfredo F. Loureiro
`(The Federal University of Minas Gerais), Prof. Mieso Denko (University
`of Guelph), and Dr. Daniel Schuster (Technical University of Dresden) for
`reviewing some of the chapters. Of course, there were also a plethora of
`reviewers whose names I have not mentioned here, but who have reviewed
`each chapter of the book and provided critical feedbacks.
`I would _like to acknowledge the contribution of my former post graduate
`student, Rami Mochaourab, who worked tirelessly with LaTeX to provide the
`book the shape it now has. He was always available, always willing to try
`new ideas, and always on time. Without his support, the book would never
`be finished on time.
`
`Dr. Waltenegus Dargie
`Technical University of Dresden
`Germany
`
`vii
`
`Page 9 of 202
`
`

`

`Page 10 of 202
`
`Page 10 of 202
`
`

`

`Contributors
`
`Abe, Akinori
`ATR Knowledge Science
`Laboratories
`Kyoto, Japan
`
`Catalan, Marisa
`Wireless Networks Group
`Department of Telematics
`Technical University of Catalonia
`Barcelona, Spain
`
`Beltran, Victoria
`Wireless Networks Group
`Department of Telematics
`Technical University of Catalonia
`Barcelona, · Spain
`
`Charif, Yasmine
`Laboratoire d'Informatique de Paris
`Universite Paris
`Paris, France
`
`Breitman, Karin
`Departamento de Informatica
`Pontificia Universidade Cat6lica
`(PUC-RJ)
`Rio de Janeiro, Brazil
`
`Dargie, Waltenegus
`Chair of Computer Networks
`Faculty of Computer Science
`Technical University of Dresden
`Dresden, Germany
`
`Briot, Jean-Pierre
`Departamento de Informatica
`Pontificia Universidade Cat6lica
`(PUC-RJ)
`Rio de Janeiro, Brazil
`
`Davoli, Franco
`Department of Communications,
`Computer, and Systems Science
`University of Genoa
`Genoa Italy
`
`Bouvry, Pascal
`University of Luxemburg
`Luxemburg
`
`Ding, Jianguo
`University of Luxembourg
`Luxembourg
`
`Casademont, Jordi
`Wireless Networks Group
`Department of Telematics
`Technical University of Catalonia
`Barcelona, Spain
`
`El Fallah Seghrouchni, Amal
`Laboratoire d'Informatique de Paris
`U niversite Paris
`Paris, France
`
`ix
`
`Page 11 of 202
`
`

`

`X
`
`Endler, Markus
`Departamento de Informatica
`Pontificia U niversidade Catolica
`(PUC-RJ)
`Rio de Janeiro, Brazil
`
`Guan, Haibing
`School of Information Security
`Engineering
`Shanghai Jiao Tong University
`Shanghai, P. R. China
`
`Hadjiantonis, Antonis M
`Centre for Communication Systems
`Research
`Department of Electronic
`Engineering,
`University of Surrey
`Guildford, UK
`
`Hartel, Pieter
`University of Twente
`Enschede, The Netherlands
`
`Klauser, Bruno
`Cisco Europe
`Glattzentrum, Switzerland
`
`Kogure, Kiyoshi
`ATR Knowledge Science
`Laboratories
`Kyoto, Japan
`
`Kramer, Bernd J.
`Fern U niversitat in Hagen
`Hagen, Germany
`
`Kuwahara, Noriaki
`Kyoto Institute of Technology
`Kyoto, Japan
`
`Liang, Alei
`Software School
`Shanghai Jiao Tong University
`Shanghai, P. R. China
`
`Liu, Lei
`Sun Microsystems, Inc.
`Menlo Park, CA, USA
`
`Luis Ferrer, Jose
`Wireless Networks Group
`Department of Telematics
`Technical University of Catalonia
`Barcelona, Spain
`
`Mazuel, Laurent
`Laboratoire d'Informatique de Paris
`Universite Paris
`Paris, France
`
`N aya, Futoshi
`ATR Knowledge Science
`Laboratories
`Kyoto, Japan
`
`Ohboshi, Naoki
`Kinki University
`Osaka, Japan
`
`Page 12 of 202
`
`

`

`Ozaku, Hiromi Itoh
`ATR Knowledge Science
`Laboratories
`Kyoto, Japan
`
`xi
`
`Sanchez-Loro, Xavier
`Wireless Networks Group
`Department of Telematics
`Technical University of Catalonia
`Barcelona, Spain
`
`Paradells, Josep
`Wireless Networks Group
`Department of Telematics
`Technical University of Catalonia
`Barcelona, Spain
`
`Pavlou, George
`Centre for Communication Systems
`Research
`Department of Electronic
`Engineering
`University of Surrey
`Guildford, UK
`
`Scholten, Hans
`University of Twente
`Enschede, The Netherlands
`
`Sundramoorthy, Vasughi
`Lancaster University
`Lancaster, UK
`
`Viterbo, Jose
`Departamento de Informatica
`Pontificia U niversidade Catolica
`(PUC-RJ)
`Rio de Janeiro, Brazil
`
`Sabouret, Nicolas
`Laboratoire d'Informatique de Paris,
`Universite Paris
`Paris, France
`
`Wolter, Ralf
`Cisco Systems
`Duesseldorf, Germany
`
`Page 13 of 202
`
`

`

`Page 14 of 202
`
`Page 14 of 202
`
`

`

`Contents
`
`1 Context and Self-Management
`W altenegus Dargie
`Introduction .
`1.1
`1.2 Aspects of Self-Management .
`1.3 Examples of Self-Managing Systems
`1.3.1 Self-Managing Chaotic Networks
`1.3.2 Recovery-Oriented Computing
`1.4 Context-Aware Computing
`1.4.1 Context-Awareness .
`1.4.2 Surrounding Context .
`1.4.3 Activity on a Street
`1.4.4 User's Attention in a Meeting .
`1.4.5 Activity Context from Multiple Sensors
`!Badge.
`1.4.6
`1.4.7 Mediacup
`1.5 Context-Aware, Self-Managing Systems
`1.6 Organization of the Book
`Refere.nces .
`;
`2 Verifying Nursing Activities Based on Workflow Model
`Noriaki Kuwahara, Naoki Ohboshi, Hiromi Itoh Ozaku, Futoshi Naya,
`Akinori Abe, and Kiyoshi Kogure
`Introduction . . . . . . . . .
`2.1
`. . . . . . .
`2.2 Related Works
`2.3 Overview of Research Goals
`2.4 Case Study of Intravenous Medication Process Performed by
`Nurses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`2.4.1 Survey Method and Results . . . . . . . . . . . . . . .
`2.4.2 Possible Solutions from Ubiquitous Computing Point of
`View. . . . . . . . . . . . . . . . . . . . .
`2.5 Prototype of Ubiquitous Sensor Network System
`. . . . .
`2.5.1 Experimental Room Description
`2.5.2 Location Tracking by IR-ID . . . . . . . .
`2.5.3 Activity Data Collection with Bluetooth-Based Wire-
`less Accelerometers . . . . . . . . . . . . . . .
`2.5.4 Feature Extraction for Activity Recognition .
`2.6 Algorithm for Detecting Errors in Nursing Activities
`
`1
`
`1
`2
`3
`3
`4
`5
`5
`7
`8
`9
`10
`10
`11
`11
`12
`12
`
`15
`
`16
`17
`19
`
`21
`22
`
`23
`26
`26
`27
`
`27
`29
`29
`
`xiii
`
`Page 15 of 202
`
`

`

`xiv
`
`2.6.1 Nursing Workflow Model
`2.6.2 Error Detection Algorithm
`2.7 Testing Our Proposed Algorithm
`2. 7 .1 Data Correction Method for Recording History of N urs-
`ing Activities . . . . .
`2.7.2 Test Results . . . . . .
`2.8 Conclusion and Future Works
`References . . . . . . . . . . . . . .
`
`3 A Taxonomy of Service Discovery Systems
`Vasughi Sundramoorthy, Pieter Hartel, and Hans Scholten
`3.1
`Introduction . . . . . . . . . . . . . . . . . . . . . . . .
`3.2 Service Discovery: Third Generation Name Discovery
`3.3 Service Discovery Architecture
`. . .
`3.3.1 Logical Topologies (Overlays)
`3.3.2 Non-Registry Topologies . .
`3.3.3 Registry-Based Topologies . .
`3.4 Service Discovery Functions . . . . .
`3.5 Operational Aspects of Service Discovery
`3.6 State of the Art . . . .
`3.6.1 Small Systems
`. . . .
`3.6.2 Large Systems
`. . . .
`3. 7 Taxonomy of State of the Art
`3.7.1 Taxonomy of State of the Art Solutions to Operational
`Aspects
`. . . . . . . . . . . . . . . . . . . . . . . . . .
`3.7.2 Taxonomy of Service Discovery Functions and Methods
`3.8 Conclusion
`References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`
`4 Managing Distributed and Heterogeneous Context for Am-
`bient Intelligence
`Jose Viterbo, Markus Endler, Karin Breitman and Laurent Mazuel,
`Yasmine Charif, Nicolas Sabouret, Amal El Fallah Seghrouchni, and
`Jean-Pierre Briot
`4.1
`Introduction . .
`4.1.1 Scenario
`4.1.2 Outline
`4.2 Fundamental Concepts .
`4.2.1 Ambient Intelligence
`4.2.2 Context Awareness .
`4.2.3 Ontology
`. . . . . .
`4.2.4 Context Reasoning .
`4.3 Ontological Representation and Reasoning about Context
`4.3.1 Evaluation Criteria and Taxonomy
`4.3.2 Gaia . .
`4.3.3 CoBrA . . . . . . . . . . . . . . . .
`
`30
`31
`34
`
`35
`35
`37
`38
`
`43
`
`44
`47
`49
`50
`50
`51
`54
`57
`59
`61
`64
`66
`
`66
`68
`72
`73
`
`79
`
`79
`81
`83
`83
`83
`83
`84
`85
`86
`87
`88
`90
`
`I
`
`Page 16 of 202
`
`

`

`4.3.4 Semantic Space .
`4.3.5 CHIL
`4.3.6 SAMOA.
`4.3.7 CAMUS.
`4.3.8 OWL-SF
`4.3.9 DRAGO.
`4.3.10 Conclusion
`4.4 Approaches for Ontology Alignment
`4.4.1 Lexics1J Alignment
`4.4.2 Structural Approaches .
`Instances-Based Approaches .
`4.4.3
`4.4.4 Mediated Approaches
`4.4.5 Alignment Based on Semantic Similarity .
`4.4.6 Conclusion
`4.5 The Campus Approach .
`4.5.1 Context Types
`4.5.2 Ontologies .
`4.5.3 Reasoning .
`4.5.4 Ontology Alignment
`4.6 Conclusion and Open Problems
`4.6.1 Discussion and Future Work.
`References .
`5 Dynamic Content ·Negotiation in Web Environments
`Xavier Sanchez-Laro, Jordi Casademont, Jose Luis Ferrer, Victoria
`Beltran, Marisa Catalan and Iosep Paradells
`Introduction .
`5.1
`5.2 Ubiquitous Web .
`5.2.1 Related Concepts .
`5.2.2 Protocols Overview .
`5.3 A Proxy-Based Solution for the Detection of Device Capabili-
`ties .
`5.3.1 System Description .
`5.3.2 System Deployment
`5.3.3 Vocabulary
`5.4 Collaborative Optimization, Context Acquisition and Provi-
`. .
`sioning .
`5.4.1 Application Layer Optimization .
`5.4.2 System Description .
`5.4.3 Header Restoring Policies and Context Provisioning
`5.4.4 Collaborative Device Capabilities Detection Service
`5.4.5 Optimization Results .
`5.5 Conclusion
`References .
`
`xv
`
`92
`93
`95
`97
`99
`101
`102
`104
`105
`107
`107
`108
`109
`111
`111
`112
`113
`113
`116
`120
`120
`122
`
`129
`
`130
`131
`133
`135
`
`142
`143
`151
`152
`
`154
`155
`157
`160
`165
`168
`170
`171
`
`Page 17 of 202
`
`

`

`xvi
`
`177
`
`6 The Road towards Self-Management in Communication Net-
`works
`Ralf Wolter and Bruno Klauser
`6.1
`Introduction . . . . . . . . . . . . . . . . . .
`177
`6.2 Self-Management in Networks . . . . . . . .
`179
`6.3 Defining Concrete Steps towards the Vision
`184
`6.3.1 Define Business Objectives in a Business Language
`184
`6.3.2 Translate the Business Objectives into Technical Terms 185
`6.3.3 Derive Rules and Policies for Systems
`. . . . . . . . .
`188
`6.3.4 Automatically Breakdown Goals
`. . . . . . . . . . . .
`190
`6.3.5 Enable Network Elements to Interpret, Deploy, and Com-
`ply with These Goals .
`6.4 Research Outlook .
`References . . . . . . . . . . . . . .
`
`193
`197
`199
`
`7
`
`7.4
`
`202
`202
`205
`208
`208
`214
`
`Policy-Based Self-Management in Wireless Networks
`Antonis M. Hadjiantonis and George Pavlou
`7.1
`Introduction, Background and State-of-the-Art
`7.1.1 Self-Management Concepts and Challenges
`..
`7.1.2 Open Issues and Motivation .
`7.2 Policies and Context for Self-Management
`7.2.1 Policy-Based Management (PBM) Principles
`7.2.2 Context and Context-Awareness
`7.2.3 Management of Wireless Ad Hoc Networks and Self-
`Management Capabilities
`219
`7.3 A Framework for the Self-Management of Wireless Networks
`223
`7.3.1 High Level Framework Overview and Design
`224
`7.3.2 Policy-Based and Context-Aware Organizational Model 225
`7.3.3 Policy-Based Design for Autonomic Decision Making .
`229
`7.3.4 Context-Aware Platform for Information Collection and
`Modeling
`7.3.5 Distributed Policy and Context Repositories - The Im-
`portance of Knowledge Management
`7.3.6 Context and Policies Interaction for Closed-Loop Auto-
`..
`nomic Management
`7.3.7 Overview of Applicability and Policy Examples
`Implementation and Evaluation of Self-Management Capabili-
`ties .
`7.4.1 Self-Configuration and Self-Optimization in Wireless Ad
`Hoc Networks .
`..
`7.4.2 Self-Configuration of a Distributed Policy Repository .
`7.4.3 Self-Protection of User Privacy and Preferences
`7.5 Conclusions and the Future of Self-management .
`7.5.1 Summary and Concluding Remarks
`7.5.2 Future Trends and Challenges .
`
`201
`
`233
`
`236
`
`238
`239
`
`243
`
`244
`253
`256
`258
`258
`260
`
`Page 18 of 202
`
`

`

`xvii
`
`262
`262
`264
`
`273
`
`7.6 Acknowledgments.
`7.7 Abbreviations .
`References . . . . . . . .
`8 Autonomous Machine Learning Networks
`Lei Liu
`Introduction . . . . . . . . . . . . .
`8.1
`8.2 Problem Formulation . . . . . . . .
`8.2.1 Attack Prediction Problem
`8.2.2 Attack Class Discovery Problem
`8.3 Related Work
`8.4 Methodology
`8.5 Evaluation . .
`8.6 Experiment
`8.6.1 Data Samples .
`8.6.2 Sample Reduction
`Initial Arbitrary Network
`8.6.3
`8.6.4 Tuning . . . . . . . . . . .
`8.6.5 Comparison of Class Prediction .
`8.6.6 Comparison of Cluster Prediction .
`8.7 Conclusions
`References . . . . . . . . . . . . . . . . . . . . .
`309
`9 Probabilistic Fault Management
`Jianguo Ding, Pascal Bouvry, Bernd J. Kramer, Haibing Guan, Alei
`Liang, and Franco Davoli
`309
`Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`9.1
`312
`. . . . . . . . .
`9.2 Probabilistic Inference in Fault Management
`9.2.l The Characteristics of the Faults in Distributed Systems 312
`315
`9.2.2 Bayesian Networks for Fault Management . . . . . . .
`9.2.3 Probabilistic Inference for Distributed Fault Manage-
`ment. . . . . . . . . . . . . . . . . . . . . . . . . . . .
`9.3 Prediction Strategies for Fault Management in Dynamic Net-
`320
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`works
`320
`9.3.1 Dynamic Characteristics in Networks.. . . . . . . . .
`322
`9.3.2 Dynamic Bayesian Networks for Fault Management
`322
`9.3.3 Prediction Strategies for Network Management . . .
`9.4 Application Investigations for Probabilistic Fault Management 325
`325
`9.4.1 Architecture for Network Management . . . . . . . . .
`328
`9.4.2 The Structure and Function of Fault Diagnosis Agent
`340
`9.4.3 Discussion of Application Issues.
`342
`9.5 Conclusions
`342
`References .
`
`274
`277
`279
`280
`282
`286
`288
`291
`291
`292
`295
`295
`295
`301
`301
`302
`
`318
`
`Index
`
`349
`
`Page 19 of 202
`
`

`

`Page 20 of 202
`
`Page 20 of 202
`
`

`

`List of Tables
`
`2.1 Top five categories of collected cases of nurses' awareness
`..
`2.2 Nurse's contexts and their features
`2.3 Test results verifying nursing activities based on nursing work-
`flow model.
`
`3.1 Service discovery functionalities
`
`4.1 Benefits of adopting formal ontology to model ambient knowl-
`edge in Campus.
`4.2 Classification of middleware systems for context-oriented onto-
`logical reasoning.
`4.3 A short example of the code for ontology alignment.
`
`5.1 Detection processes supported by type of device.
`. . . . . .
`5.2 Size in bytes of the Google search engine.
`5.3 Size· in bytes of detection-related transactions over each net-
`work section.
`
`24
`25
`
`36
`
`56
`
`85
`
`103
`119
`
`147
`163
`
`166
`
`6.1 Summary of existing self-management solutions building blocks 195
`222
`247
`250
`252
`255
`
`7.1 Taxonomy of related work on MANET management
`7.2 Wireless ad hoc networks self-management policies
`7.3 Wireless testbed specifications .
`Initial channel assignment measurements .
`7.4
`7.5 DPR management policies .
`
`9.1 The structure of event database.
`9.2 The JPD obtaining between every pair of parent nodes (X) and
`their son node (Y).
`
`336
`
`338
`
`xix
`
`Page 21 of 202
`
`

`

`Page 22 of 202
`
`Page 22 of 202
`
`

`

`List of Figures
`
`2.1 Overview of E-Nightingale Project's target systems
`2.2 Modular structure of proposed systems . . . . . . .
`. . . . .
`"Nursing Resource" and rule descriptions
`2.3
`2.4 Scheduled IV drip process and possible errors in each step
`2.5 Experimental room layout . . . . . . . . . . . . . . . . . .
`2.6 Location labeling from numbers of received IR-IDs at each re-
`ceiver within a 1-second window in time line . . . . . . . . . .
`2.7 Subject wearing four Bluetooth-based triaxial accelerometers
`2.8 Nursing workflow model . . . . . . . . . . . . . . . . . .
`2.9 Confirming detected errors in observed nursing activities
`2.10 Event-driven voice recording set .
`2.11 Nurse A's observed data . . . . . . . . .
`
`3.1 Registry and non-Registry architectures
`3.2 Logical non-Registry topologies. . . . . .
`. . . . . . .
`3.3 Logical Registry topologies.
`3.4 Summary of operational design aspects and solutions.
`3.5 Taxonomy of state-of-the-art solutions to operational aspects.
`Shaded service discovery systems support the proposed solu(cid:173)
`tions. Appl means the solution to the operational aspect is
`supported by the application layer. Some systems depend on
`solutions provided by the undeJ:'lying protocol stacks, such as
`TCP, IP, Bluetooth and ad-hoc routing protocols.
`3.6 Taxonomy of state-of-the-art functional implementation. . . .
`
`4.1 Ontology alignment is a set of equivalences between nodes of
`both ontologies. This schema presents the three classical so(cid:173)
`lutions: alignment based on the structural properties, align-
`ment based on the concepts instances and alignment based on
`. . . . . . . . . . . . . . . . . . . .
`a "background ontology."
`4.2 Structural alignment error example based on hierarchy analy-
`sis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`Instance-based alignment allows construction of subsumption
`alignment in addition to equivalence alignment.
`4.4 Mediated alignment approach. . . . . .
`4.5 Abstract view of Campus architecture. . . . . .
`
`4.3
`
`20
`21
`22
`23
`26
`
`28
`28
`31
`34
`35
`37
`
`49
`51
`52
`60
`
`69
`70
`
`106
`
`107
`
`108
`109
`112
`
`xxi
`
`Page 23 of 202
`
`

`

`xxii
`
`4.6 Campus multi-agent architecture ...
`4. 7 CATO ontology alignment strategy.
`
`5.1 Elements involved in Web delivery.
`5.2 HTTP request example.
`. .
`5.3 CC/PP profile example. . . . . . .
`5.4 CC/PPex request example.
`. . . .
`5.5 Device capabilities detection process.
`5.6 Proxy Web navigation. . . . . . .
`5.7 Proxy deployment configurations.
`5.8 System architecture.
`. . . . . . .
`5.9 Deployment diagram. . . . . . . .
`5.10 External detection use case sequence diagram. .
`5.11 Local detection use case sequence diagram.
`. .
`5.12 Average size of HTTP requests in uplink [bytes].
`5.13 Average improvement in response time (%)
`.
`
`6.1 Flow of starting a diesel engine 50 years ago .
`6.2 Relationship between service provider and service consumer
`6.3 Service decomposition
`. . . . . . . . . . . . . . . . . .
`6.4 TMF key indicator hierarchy
`. . . . . . . . . . . . . .
`6.5 Manage the communication infrastructure intuitively .
`6.6 Top-down approach for business objectives . .
`6. 7 Virtualization layer for network management
`6.8 Cisco embedded event manager . . . . . . .
`6.9 Self-optimizing with Cisco IP SLA
`. . . . .
`6.10 Self-protection through user authentication
`
`7.4
`
`7.1 Closed-loop controller
`. . . . . . . . . . . .
`7.2 Functional diagram of IBM's autonomic manager (K-MAPE)
`7.3 Mapping of proposed high-level framework to autonomic man-
`ager component . . . . . . . . . . . . . . . . . . . . . . . . . .
`IETF's framework for PBM (a) block diagram, (b) generic
`UML notation . . . . . . . . . . . . . . . . . . . . . . . . . . .
`7.5 Taxonomy of context information . . . . . . . . . . . . . . . .
`7.6 General diagram of closed-loop management with context and
`policies
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`7.7 Organizational models: (a) hybrid, (b) hierarchical,
`( c) distributed
`. . . . . . . . . . . . . . . . . . . . . . . . . .
`7.8 Block diagram of each role and internal components
`. . . . .
`7.9 Hybrid organizational model with internal components and in(cid:173)
`formation flow
`. . . . . . . . . . . . . . . . . . . . . . . . . .
`7.10 Policy-based and context-aware components and interactions
`7.11 Traditional (left) and proposed (right) policy repository deploy-
`ment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`
`114
`118
`
`130
`136
`137
`138
`144
`150
`151
`154
`159
`167
`168
`169
`170
`
`178
`187
`188
`189
`191
`192
`194
`196
`197
`198
`
`203
`204
`
`205
`
`209
`216
`
`224
`
`· 225
`228
`
`229
`230
`
`238
`
`Page 24 of 202
`
`

`

`xxiii
`
`7.12 Diagram of closed-loop adaptation at different levels
`.
`7.13 Replication degrees depending on network fluidity
`. . . .
`7.14 Wireless ad hoc network testbed deployment
`7.15 Packet measurements at node Z for same channel deployment
`. . . . . .
`(1,1) and for consecutive channel deployment (2,1)
`7.16 Policy-based channel assignment measurements . . . . . . . .
`7.17 Testbed measurements of goodput using dynamic channel switch.
`Top: Moving average, Bottom: Instantaneous
`. . .
`7.18 Policy free and policy conforming objects
`
`8.1 Dynamic machine learning detection algorithm
`8.2 Machine tuning algorithm . . . . . . . . . . . .
`Initialization of all parameters . . . . . . . . . .
`8.3
`8.4 Randomized algorithm to locate action with maximum state-
`action value mapping . . . . . . . . . . . . . .
`8.5 Action simulation algorithm . . . . . . . . . .
`8.6 Update state-action value mapping algorithm
`. . . . . . . . . . . .
`8. 7 Locate policy algorithm
`8.8 KDDCup99 attack classes . . . . . . . . . . .
`8.9 Classification prediction result for Q learning
`8.10 MP prediction result for Q learning.
`8.11 Autonomous tuning scenario
`
`9.1 A model of fault propagation.
`9.2 Model of dynamic Bayesian network.
`9.3 Detailed model of network management with FDA.
`9.4 The structure of fault diagnosis agent.
`9.5 The procedure of event management.
`. . . .
`9.6 Dependency analysis in events.
`
`240
`242
`249
`
`251
`252
`
`254
`257
`
`289
`290
`291
`
`292
`292
`293
`293
`293
`298
`299
`300
`
`314
`323
`328
`329
`330
`338
`
`Page 25 of 202
`
`

`

`Page 26 of 202
`
`Page 26 of 202
`
`

`

`Chapter 1
`
`Context and Self-Management
`
`Waltenegus Dargie
`Technical University of Dresden, 01062, Dresden, Germany
`
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`Introduction
`1.1
`1.2 Aspects of Self-Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . .. . .. . . .. . . .. . .. .. .. .. . . . .. . .. . . ..
`1.3 Examples of Self-Managing Systems
`1.4 Context-Aware Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`1.5 Context-Aware, Self-Managing Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`1.6 Organization of the Book .. . . .. .. . .. .. . .. . .. .. .. .. .. . .. .. .. . .. . .. .. .. .. ..
`. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`References
`
`1
`2
`3
`5
`11
`12
`12
`
`Abstract
`This chapter provides an introduction to Context-Aware Computing and
`Self-Managing Systems. It begins by explaining why self-management is de(cid:173)
`sirable in complex systems and by describing self-management aspects (self(cid:173)
`configuration, self-optimization, self-healing and self-protection). For all these
`features, a self-managing system's needs to have a perpetual awareness of what
`is taking place both within itself and without. It is this duly awareness of one's
`state and surrounding that leads to self-adaptation. As a result, the chapter
`tries to demonstrate the scope and usefulness of context-aware computing in
`developing self-managing systems.
`
`Introduction
`1. 1
`Computing systems are becoming very complex, highly heterogeneous and
`distributed. At the same time, the users of these systems are usually mo(cid:173)
`bile and demand greater flexibility and efficiency in terms of response time,
`resource utilization, robustness, etc., to achieve critical business goals. The
`implication is that operating and maintaining computing systems is becoming
`an increasingly expensive business. In fact, Fox and Patterson claim that an(cid:173)
`nual outlays for maintenance, repair and operations far excerd total hardware
`and software costs, for both individuals and corporations [l].
`This high cost of ownership of computing systems has resulted in a number
`
`1
`
`Page 27 of 202
`
`

`

`2
`
`Context-Aware Computing and Self-Managing Systems
`
`of industry initiatives to reduce the burden of operations and management
`by making computing systems - at least gradually - self-managing. A few
`examples are IBM's Autonomic Computing, HP's Adaptive Infrastructure
`and Microsoft's Dynamic System Initiatives [2].
`Self-management derives its basic principles from the autonomous nervous
`system, which governs our heart rate and body temperature, thus freeing our
`conscious brain from the burden of dealing with these and many other low(cid:173)
`level, yet vital, functions [3]. This essential principle, if transferred well, en(cid:173)
`ables computing systems, whether acting individually or collectively, to receive
`higher-level objectives from their operators (users) but manage to maintain
`and adjust their operation in the face of changing components, workloads,
`demands and external conditions as well as imminent hardware and software
`failures.
`According to Kephart and Chess [3] and Tesauro et al. [4], a self-managing
`system contains an autonomic manager software and a (hardware or software)
`managed element. The managed element is what is being made self-managing
`and provides a sensing and actuating interface. Through the sensing interface,
`an array of sensors measure vital internal as well as external (environmental)
`phenomena which may potentially influence the system's short and long term
`performance. The actuating interface provides a way for the autonomic man(cid:173)
`ager to modify the behavior of the managed element. The autonomic manager
`itself contains components for monitoring and analyzing sensor data and for
`planning and executing management policies. Common to all of these compo(cid:173)
`nents is knowledge of the computing environment and service-level agreement
`as well as other related facts.
`The monitoring component inside the autonomic manager is responsible for
`reducing the amount of raw sensor data by applying filtering and correlation
`operations on the data. The analysis component gets refined data from the
`monitoring component in order to identify emerging or foreseeable problems
`or potential causes of adaptation. The planning component accommodates
`workflows that specify a partial order of actions which should be carried out
`in accordance with the results of the analysis component. And finally, the
`execution component controls the execution of such workflows and provides
`coordination if there are multiple concurrent workflows.
`
`1.2 Aspects of Self-Management
`
`A system is said to be self-managing if it exhibits one or more of the fol(cid:173)
`lowing characteristics: self-configuration, self-optimization, self-healing, and
`self-protecting.
`Self-configuration refers to the capability of a system to dynamically ad-
`
`Page 28 of 202
`
`

`

`Context and Self-Management
`
`3
`
`just one or more parameters to accommodate expected or unexpected change
`within itself or in the operating environment. The change may be due to de(cid:173)
`parture, arrival or failure of a component; a change in the business policy of
`the user; or environmental, social or political constraints. A self-configuration
`capability of a system enables it to keep on functioning in the presence of con(cid:173)
`tinually changing and unforeseen obstacles.
`Self-optimization refers to the ability of a system to tune its parameters so
`that it can function most efficiently. Efficiency can be measured in terms of
`cost, quality of service, throughput, etc. A self-optimizing system improves
`its performance by finding, verifying and applying the latest software updates.
`Self-healing refers to the ability of a system to detect, localize, diagnose,
`and repair problems resulting from bugs or failures in software and hardware.
`Finally, self-protection refers to the abilit

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket