Abstract is missing.
- Requirements on Quality Specification Posed by Service OrientationMarkus Garschhammer, Harald Rölle. 1-14 [doi]
- Automating the Provisioning of Application Services with the BPEL4WS Workflow LanguageAlexander Keller, Remi Badonnel. 15-27 [doi]
- HiFi+: A Monitoring Virtual Machine for Autonomic Distributed ManagementEhab S. Al-Shaer, Bin Zhang. 28-39 [doi]
- Defining Reusable Business-Level QoS Policies for DiffServAndré Beller, Edgard Jamhour, Marcelo Eduardo Pellenz. 40-51 [doi]
- Policy Driven Business Performance ManagementJun-Jang Jeng, Henry Chang, Kumar Bhaskaran. 52-63 [doi]
- Business Driven Prioritization of Service IncidentsClaudio Bartolini, Mathias Sallé. 64-75 [doi]
- A Case-Based Reasoning Approach for Automated Management in Policy-Based NetworksNancy Samaan, Ahmed Karmouch. 76-87 [doi]
- An Analysis Method for the Improvement of Reliability and Performance in Policy-Based Management SystemsNaoto Maeda, Toshio Tonouchi. 88-99 [doi]
- Policy-Based Resource Assignment in Utility Computing EnvironmentsCipriano A. Santos, Akhil Sahai, Xiaoyun Zhu, Dirk Beyer 0002, Vijay Machiraju, Sharad Singhal. 100-111 [doi]
- Failure Recovery in Distributed Environments with Advance Reservation Management SystemsLars-Olof Burchard, Barry Linnert. 112-123 [doi]
- Autonomous Management of Clustered Server Systems Using JINIChul Lee, Seung Ho Lim, Sang Seok Lim, Kyu Ho Park. 124-134 [doi]
- Event-Driven Management Automation in the ALBM Cluster SystemDugki Min, Eunmi Choi. 135-146 [doi]
- A Formal Validation Model for the Netconf ProtocolSylvain Hallé, Rudy Deca, Omar Cherkaoui, Roger Villemaire, Daniel Puche. 147-158 [doi]
- Using Object-Oriented Constraint Satisfaction for Automated Configuration GenerationTim Hinrichs, Nathaniel Love, Charles J. Petrie, Lyle Ramshaw, Akhil Sahai, Sharad Singhal. 159-170 [doi]
- Problem Determination Using Dependency Graphs and Run-Time Behavior ModelsManoj K. Agarwal, Karen Appleby, Manish Gupta 0007, Gautam Kar, Anindya Neogi, Anca Sailer. 171-182 [doi]
- Role-Based Access Control for XML Enabled Management GatewaysVincent Cridlig, Olivier Festor, Radu State. 183-195 [doi]
- Spotting Intrusion Scenarios from Firewall Logs Through a Case-Based Reasoning ApproachFábio Elias Locatelli, Luciano Paschoal Gaspary, Cristina Melchiors, Samir Lohmann, Fabiane Dillenburg. 196-207 [doi]
- A Reputation Management and Selection Advisor Schemes for Peer-to-Peer SystemsLoubna Mekouar, Youssef Iraqi, Raouf Boutaba. 208-219 [doi]
- Using Process Restarts to Improve Dynamic ProvisioningRaquel Vigolvino Lopes, Walfredo Cirne, Francisco Vilar Brasileiro. 220-231 [doi]
- Server Support Approach to Zero Configuration In-Home NetworkingKiyohito Yoshihara, Takeshi Kouyama, Masayuki Nishikawa, Hiroki Horiuchi. 232-244 [doi]
- Rule-Based CIM Query Facility for Dependency ResolutionShinji Nakadai, Masato Kudo, Koichi Konishi. 245-256 [doi]
- Work in Progress: Availability-Aware Self-Configuration in Autonomic SystemsDavid M. Chess, Vibhore Kumar, Alla Segal, Ian Whalley. 257-258 [doi]
- ABHA: A Framework for Autonomic Job RecoveryCharles Earl, Emilio Remolina, Jim Ong, John Brown, Chris Kuszmaul, Brad Stone. 259-262 [doi]
- Can ISPs and Overlay Networks Form a Synergistic Co-existence?Ram Keralapura, Nina Taft, Gianluca Iannaccone, Chen-Nee Chuah. 263-265 [doi]
- Simplifying Correlation Rule Creation for Effective Systems MonitoringC. Araujo, A. Biazetti, Anthony Bussani, J. Dinger, Metin Feridun, A. Tanner. 266-268 [doi]